Update cookies preferences

E-book: Encryption for Organizations and Individuals: Basics of Contemporary and Quantum Cryptography

  • Format: EPUB+DRM
  • Pub. Date: 18-Aug-2020
  • Publisher: APress
  • Language: eng
  • ISBN-13: 9781484260562
  • Format - EPUB+DRM
  • Price: 67,91 €*
  • * the price is final i.e. no additional discount will apply
  • Add to basket
  • Add to Wishlist
  • This ebook is for personal use only. E-Books are non-refundable.
  • Format: EPUB+DRM
  • Pub. Date: 18-Aug-2020
  • Publisher: APress
  • Language: eng
  • ISBN-13: 9781484260562

DRM restrictions

  • Copying (copy/paste):

    not allowed

  • Printing:

    not allowed

  • Usage:

    Digital Rights Management (DRM)
    The publisher has supplied this book in encrypted form, which means that you need to install free software in order to unlock and read it.  To read this e-book you have to create Adobe ID More info here. Ebook can be read and downloaded up to 6 devices (single user with the same Adobe ID).

    Required software
    To read this ebook on a mobile device (phone or tablet) you'll need to install this free app: PocketBook Reader (iOS / Android)

    To download and read this eBook on a PC or Mac you need Adobe Digital Editions (This is a free app specially developed for eBooks. It's not the same as Adobe Reader, which you probably already have on your computer.)

    You can't read this ebook with Amazon Kindle

Cryptography and encryption aren't just for geeks and spiestheyre also part of our daily lives. This book enlightens you with the basics of digital cryptography and covers the must-do practices organizations need to implement when it comes to fending off data theft and eavesdroppers. You will uncover the concepts of digital encryption and examine key digital encryption algorithms and their various applications. Gauging cryptography from an enterprise perspective, you will get an in-depth look at common attacks that can occur in your systems and lean how to counter them



Moving on to quantum computing, you will discover how it differs from the current computing paradigm and understand its potential for the future. After clearing the basics, you will take a close look at how quantum computers work in practice. Shifting focus to quantum cryptography, you will learn more about quantum key distribution (QKD) and how it differs from present-day encryption methodologies. You will also consider the current implementations of QKD, including distribution systems by SwissQuantum and QKD-distribution networks provided by the DARPA Quantum Network. Ultimately, you will learn the means of defending against cryptographic attacks in the up-and-coming quantum age, such as utilizing zero-knowledge proof (ZKP) systems.

Deepen your knowledge of cryptographic concepts and be introduced to the new paradigm of quantum cryptography with this book.

 

What You Will Learn









Appreciate how digital encryption algorithms work Secure your infrastructure from cryptographic attacks Understand the basics of quantum information science Discover how cryptography relates to quantum computing Implement Quantum Key Distribution (QKD)







































Who This Book Is For This book is aimed at readerswho have an interest in both well-established and up-and-coming types of cryptography, as well as members of organizations to whom privacy is a top priority.
About the Author xvii
About the Technical Reviewers xix
Introduction xxi
Chapter 1 The First Era of Digital Encryption
1(12)
Classical Cryptography
1(2)
The Basics of Frequency Analysis
3(2)
The Wonders of Steganography
5(1)
European Developments in Cryptography
6(2)
At the End of Classical Cryptography
7(1)
The Digital Cryptographic Revolution
8(4)
Digital Encryption 101
8(1)
The Diffie--Hellman Key Exchange
9(2)
The Data Encryption Standard (DES)
11(1)
In Closing
12(1)
Chapter 2 A Medium-Length History of Digital Cryptography
13(12)
RSA: The First Big Public-Key Cryptosystem
13(6)
Generating Keys in RSA
15(1)
Encrypting and Decrypting in RSA
16(1)
In Through the Trapdoor
17(1)
The Strengths and Weaknesses of RSA
17(2)
The EIGamal Cryptosystem
19(1)
Digital Certificates
19(1)
Public-Key Infrastructure (PKI) and Certificate Authorities (CA)
20(1)
Web of Trust (WOT)
21(1)
More on SSL/TLS
21(1)
FIPS and Digital Signature Algorithm (DSA)
22(1)
Have Some Standards for Goodness' Sake
22(2)
In Closing
24(1)
Chapter 3 The AES and Other Established Cryptographic Technologies
25(28)
Variables and Arrays 101
25(1)
Binary and Hexadecimal
26(5)
Converting Decimal to Binary
27(1)
Converting Decimal to Hexadecimal
28(1)
Converting Binary to Hexadecimal (and Vice Versa)
29(1)
Classifying Bits
30(1)
The Indomitable AES
31(10)
Implementations of AES
32(1)
Block Sizes and Key Lengths
33(1)
The Substitution-Permutation Network (SPN)
34(1)
Row- and Column-Major Orders
34(1)
The Steps in an AES Encryption Round
35(6)
Decryption in AES
41(1)
Hash Values: Digital Fingerprints and Checksums
41(4)
Collisions
42(2)
Secure Hash Algorithm 1 (SHA-1)
44(1)
Secure Hash Algorithm 2 (SHA-2)
44(1)
Secure Hash Algorithm 3 (SHA-3)
44(1)
Padding
45(1)
Would You Like Some Salt with Your Data?
45(3)
Best Salting Practices
46(1)
How About Some Pepper?
47(1)
Stretching Keys
47(1)
Cyclic Redundancy Check (CRC)
48(1)
Modes of Operation
48(2)
Block Ciphers and Stream Ciphers
49(1)
Electronic Code Book (ECB)
49(1)
Cipher Block Chaining (CBC)
49(1)
Counter Mode (CTR)
50(1)
In Closing
50(1)
References
51(2)
Chapter 4 You, Your Organization, and Cryptographic Security
53(22)
Storage Devices, Sectors, and Blocks
53(2)
The Wonders of File Systems
55(2)
Volumes and Partitions
57(1)
Full-Disk Encryption (FDE)
58(1)
File Containers
58(1)
Pre-boot Authentication (PBA)
58(1)
Trusted Platform Module (TPM)
59(1)
Block Cipher Operating Modes
59(1)
Encryption in Modern Operating Systems
60(1)
Encryption in MacOS: FileVault and FileVault 2
61(1)
Windows and BitLocker
62(2)
Linux Unified Key Setup (LUKS)
64(1)
Third-Party Encryption Suites
65(4)
BestCrypt by Jetico
66(1)
DiskCryptor by ntldr
66(1)
DriveCrypt by SecurStar
67(1)
eCryptfs
67(1)
ProxyCrypt by v77
68(1)
VeraCrypt by IDRIX
68(1)
Tutorial Time!
69(4)
In Closing
73(2)
Chapter 5 Common Attacks Against Cryptographic Systems
75(28)
Cryptographic Attack Models
76(1)
Cryptanalysis
77(1)
Linear Cryptanalysis
77(1)
Differential Cryptanalysis
77(16)
Birthday Attack
78(1)
Brute-Force Attack (BFA)
78(2)
Contact Analysis
80(1)
Evil Maid Attack
80(1)
Heuristic Attack
81(1)
Man-in-the-Middle (MITM)
81(1)
Meet-in-the-Middle
82(1)
Rainbow Table Attack
83(1)
Replay Attack
84(1)
Related Key Attack
85(1)
Rubber-Hose Attack
85(1)
Side Channel Attack (SCA)
86(5)
Cyberthreats Not Specific to Cryptography
91(1)
Mai ware
92(1)
Trojan Horse
92(1)
Keylogger
92(1)
Man-in-the-Browser (MITB)
93(1)
Boy-in-the-Browser (BITB)
93(1)
Botnet
93(8)
Distributed Denial-of-Service (DDoS) Attack
94(1)
Phishing Attack
94(2)
Policeware
96(1)
Rootkit
97(1)
Spyware
98(1)
Virus
99(1)
Worm
99(1)
Ransomware
100(1)
In Closing
101(2)
Chapter 6 Creating Extremely Secure Encrypted Systems
103(46)
On Multilayer Encryption
104(1)
Small vs. Big Business Readiness
105(1)
A Refresher on Network Security
106(18)
Networks and Routers
107(9)
IPv6
116(1)
Virtual Private Network (VPN)
117(2)
Setting Up a VPN for Windows
119(1)
VPN in MacOS
120(2)
VPN in Ubuntu Linux
122(1)
Safe Emailing with OpenPGP
123(1)
Draft Begone! Securing Windows
124(6)
Windows-Security Musts
125(1)
A Bit More on BitLocker
126(1)
BIOS, UEFI, and TPM
127(1)
TPM 1.2 vs. 2.0
128(1)
A Fresh Start: Resetting a TPM
129(1)
A Nice, Ripe Stick of USB, Please
130(1)
Minding Your MacOS
130(8)
MacOS-Security Musts
131(2)
T2, Judgment Chip: TPM, Apple Style
133(2)
T2 Maintenance 101
135(1)
Security Software for Mac
136(2)
Staying Safer in Linux
138(2)
CryFS
138(1)
FireStarter
139(1)
You vs. Malware
140(8)
Avast Antivirus by Avast
140(2)
Avira Antivirus by Avira Operations GmbH & Co
142(2)
Bitdefender Antivirus
144(1)
SpyBot -- Search and Destroy by Safer-Networking Ltd
145(1)
TDSS Killer and Virus Removal Tool 2015 by Kaspersky Lab
146(1)
Stinger by McAfee
147(1)
In Closing
148(1)
References
148(1)
Chapter 7 Prohibitions and Legal Issues
149(26)
Missiles, Tanks, and Encryption
150(1)
EU's General Data Protection Regulation (GDPR)
151(1)
Cryptography in the United States
152(1)
Encrypted and Crossing the Border
153(1)
Key Disclosure Laws in the United States
154(1)
Key Disclosure Laws in Canada, Europe, and Oceania
154(3)
Key Disclosure Laws in Africa
157(1)
World's Toughest Key Disclosure Laws
158(1)
Criticism and Blowback
159(1)
The Wassenaar Arrangement
160(1)
EU Dual-Use Controls
160(1)
The Import of Cryptography
161(4)
Corporate Data Security Laws
165(3)
The FTC Safeguards Rule
166(2)
More on Privacy Laws in the United States
168(1)
A Few Words on CISPA
169(1)
State-Level Privacy Legislation
169(2)
A Primer on US Legal Terms
171(2)
In Closing
173(2)
Chapter 8 Quantum Computing: The Next Big Paradigm
175(12)
Bits vs. Qubits
175(1)
Into the Bloch Sphere
176(3)
Six Ways Qubits Will Change Our World
179(6)
Cryptography
179(1)
Medicine
180(1)
Crime and Finance
181(2)
Entertainment
183(1)
Manufacturing
183(1)
World Politics
184(1)
In Closing
185(1)
References
185(2)
Chapter 9 The Rollicking World of Quantum Mechanics
187(22)
A Few Words on Classical Mechanics
187(2)
Introducing Modern Physics
189(3)
Atoms and Sub-atomic Particles
191(1)
Black Holes and Their Applications
192(7)
The Quiet Region and the Ergosphere
194(1)
The Event Horizon (No, Not the 1990s Movie)
195(1)
Singularity Speculation
195(1)
The Standard Model
196(2)
A Brief History of the Higgs Boson
198(1)
More Quantum Magic
199(1)
The Uncertainty Principle
199(1)
Double-Slit Experiments: The Wave-Particle Duality
199(2)
Waves, Phase, and Quantum Coherence/Decoherence
201(1)
The Planck Constant and Planck Units
202(1)
The Planck Constant
203(1)
I Planck Length
203(1)
II Planck Time
204(1)
III Planck Temperature
204(1)
IV Planck Charge
205(1)
V Planck Mass
205(1)
Quantum Entanglement
205(1)
And Now We Need to Talk About Cats
206(1)
In Closing
206(1)
References
207(2)
Chapter 10 Quantum Information Science 101
209(18)
Logic Gates
209(3)
Quantum Computer Says No: Error Correction
212(3)
Four Approaches to Quantum Computing
215(1)
I Quantum Gate Array (Quantum Circuit)
215(2)
Universal Quantum Gates
217(1)
Unitary and Permutation Matrices
218(1)
All Things Eigen
218(2)
Pauli Gates
220(1)
The HadamardGate
220(1)
The Swap Gates
221(1)
Toffoli and Fredkin Gates
222(1)
II The Topological Quantum Computer
223(1)
III The Adiabatic Quantum Computer (AQC)
224(1)
IV One-Way Quantum Computer
225(1)
In Closing
225(1)
References
226(1)
Chapter 11 Quantum Cryptography
227(8)
On Quantum Key Distribution (QKD)
227(1)
Let's Go with Light
228(1)
BB84
228(3)
B92
231(1)
The Six-State Protocol (SSP)
231(1)
The Ekert Protocol (E91)
232(1)
Continuous-Variable (CV) Protocols
232(1)
Shor's (Factoring) Algorithm
232(1)
Quantum Coin Flipping
233(1)
In Closing
233(1)
References
234(1)
Chapter 12 Quantum Key Distribution Under Attack
235(12)
Breaking QKD
235(1)
Photon Number Splitting (PNS)
236(1)
Denial of Service
237(1)
Trojan Horse
237(1)
Intercept and Resend (IR)
237(1)
Thermal Blinding Attack
238(1)
Man in the Middle
238(2)
The Hardware of QKD
240(1)
Component Breakdown
240(1)
Field Programmable Array Gate (FPGA)
241(1)
Optical Attenuator, Isolator, and Narrow Band Pass Filter
242(1)
Laser Diode, Intensity Modulator, and Phase Modulator
242(1)
Beam Splitter and Polarizing Beam Splitter
242(1)
Monitoring Detector
243(1)
Delay Line
243(1)
Electronic Polarization Controller
243(1)
Fiber Length Stretcher
243(1)
Avalanche Photodiodes and Self-Differencing Circuits
244(1)
The Externals
244(1)
In Closing
245(1)
References
245(2)
Chapter 13 Implementations of QKD
247(10)
The DARPA Quantum Network
247(4)
Secure Communication Based on Quantum Cryptography (SECOQC)
248(3)
Quantum Experiments at Space Scale (QUESS)
251(1)
SwissQuantum
252(1)
Tokyo QKD Network
253(2)
In Closing
255(1)
References
256(1)
Chapter 14 Post-Quantum Cryptography
257(20)
Post-Quantum Cryptography
257(1)
Hash-Based Cryptography
258(3)
Code-Based Cryptography
261(1)
Multivariate Cryptography
262(1)
Lattice-Based Cryptography
263(3)
Homomorphic Encryption
266(2)
Homomorphic Algorithms
268(1)
Video Gaming for Homomorphism
269(1)
Homomorphism for Coders
270(1)
Standardizing PQC
270(1)
Zero-Knowledge Proof in PQC
271(1)
Commitment Schemes
272(1)
In Closing
273(1)
References
274(3)
Index 277
Robert Ciesla is a freelance writer from Helsinki, Finland. He has worked on many video games on several platforms. He is the author of Game Development with Ren'Py (2019) and Mostly Codeless Game Development (2017). Ever since finishing A Brief History of Time by Stephen Hawking in middle school, Robert has been fascinated by the world of quantum mechanics. Robert's Bachelor's thesis in journalism took on some questions on how to popularize the core concepts of quantum physics and related fields. He has devoured most relevant books in the field since and continues to explore this area of reality.