Details

Cryptography Engineering


Cryptography Engineering

Design Principles and Practical Applications
1. Aufl.

von: Niels Ferguson, Bruce Schneier, Tadayoshi Kohno

36,99 €

Verlag: Wiley
Format: PDF
Veröffentl.: 16.07.2012
ISBN/EAN: 9781118502822
Sprache: englisch
Anzahl Seiten: 384

DRM-geschütztes eBook, Sie benötigen z.B. Adobe Digital Editions und eine Adobe ID zum Lesen.

Beschreibungen

<b>The ultimate guide to cryptography, updated from an author team of the world's top cryptography experts.</b> <p>Cryptography is vital to keeping information safe, in an era when the formula to do so becomes more and more challenging. Written by a team of world-renowned cryptography experts, this essential guide is the definitive introduction to all major areas of cryptography: message security, key negotiation, and key management. You'll learn how to think like a cryptographer. You'll discover techniques for building cryptography into products from the start and you'll examine the many technical changes in the field.</p> <p>After a basic overview of cryptography and what it means today, this indispensable resource covers such topics as block ciphers, block modes, hash functions, encryption modes, message authentication codes, implementation issues, negotiation protocols, and more. Helpful examples and hands-on exercises enhance your understanding of the multi-faceted field of cryptography.</p> <ul> <li>An author team of internationally recognized cryptography experts updates you on vital topics in the field of cryptography</li> <li>Shows you how to build cryptography into products from the start</li> <li>Examines updates and changes to cryptography</li> <li>Includes coverage on key servers, message security, authentication codes, new standards, block ciphers, message authentication codes, and more</li> </ul> <p><i>Cryptography Engineering</i> gets you up to speed in the ever-evolving field of cryptography.</p>
<p><b>Preface to Cryptography Engineering xxiii</b></p> <p>History xxiv</p> <p>Example Syllabi xxiv</p> <p>Additional Information xxvi</p> <p><b>Preface to Practical Cryptography (the 1st Edition) xxvii</b></p> <p>How to Read this Book xxix</p> <p><b>Part I Introduction 1</b></p> <p><b>Chapter 1 The Context of Cryptography 3</b></p> <p>1.1 The Role of Cryptography 4</p> <p>1.2 The Weakest Link Property 5</p> <p>1.3 The Adversarial Setting 7</p> <p>1.4 Professional Paranoia 8</p> <p>1.4.1 Broader Benefits 9</p> <p>1.4.2 Discussing Attacks 9</p> <p>1.5 Threat Model 10</p> <p>1.6 Cryptography Is Not the Solution 12</p> <p>1.7 Cryptography Is Very Difficult 13</p> <p>1.8 Cryptography Is the Easy Part 13</p> <p>1.9 Generic Attacks 14</p> <p>1.10 Security and Other Design Criteria 14</p> <p>1.10.1 Security Versus Performance 14</p> <p>1.10.2 Security Versus Features 17</p> <p>1.10.3 Security Versus Evolving Systems 17</p> <p>1.11 Further Reading 18</p> <p>1.12 Exercises for Professional Paranoia 18</p> <p>1.12.1 Current Event Exercises 19</p> <p>1.12.2 Security Review Exercises 20</p> <p>1.13 General Exercises 21</p> <p><b>Chapter 2 Introduction to Cryptography 23</b></p> <p>2.1 Encryption 23</p> <p>2.1.1 Kerckhoffs’ Principle 24</p> <p>2.2 Authentication 25</p> <p>2.3 Public-Key Encryption 27</p> <p>2.4 Digital Signatures 29</p> <p>2.5 PKI 29</p> <p>2.6 Attacks 31</p> <p>2.6.1 The Ciphertext-Only Model 31</p> <p>2.6.2 The Known-Plaintext Model 31</p> <p>2.6.3 The Chosen-Plaintext Model 32</p> <p>2.6.4 The Chosen-Ciphertext Model 32</p> <p>2.6.5 The Distinguishing Attack Goal 32</p> <p>2.6.6 Other Types of Attack 33</p> <p>2.7 Under the Hood 33</p> <p>2.7.1 Birthday Attacks 33</p> <p>2.7.2 Meet-in-the-Middle Attacks 34</p> <p>2.8 Security Level 36</p> <p>2.9 Performance 37</p> <p>2.10 Complexity 37</p> <p>2.11 Exercises 38</p> <p><b>Part II Message Security 41</b></p> <p><b>Chapter 3 Block Ciphers 43</b></p> <p>3.1 What Is a Block Cipher? 43</p> <p>3.2 Types of Attack 44</p> <p>3.3 The Ideal Block Cipher 46</p> <p>3.4 Definition of Block Cipher Security 46</p> <p>3.4.1 Parity of a Permutation 49</p> <p>3.5 Real Block Ciphers 50</p> <p>3.5.1 DES 51</p> <p>3.5.2 AES 54</p> <p>3.5.3 Serpent 56</p> <p>3.5.4 Twofish 57</p> <p>3.5.5 Other AES Finalists 58</p> <p>3.5.6 Which Block Cipher Should I Choose? 59</p> <p>3.5.7 What Key Size Should I Use? 60</p> <p>3.6 Exercises 61</p> <p><b>Chapter 4 Block Cipher Modes 63</b></p> <p>4.1 Padding 64</p> <p>4.2 ECB 65</p> <p>4.3 CBC 65</p> <p>4.3.1 Fixed IV 66</p> <p>4.3.2 Counter IV 66</p> <p>4.3.3 Random IV 66</p> <p>4.3.4 Nonce-Generated IV 67</p> <p>4.4 OFB 68</p> <p>4.5 CTR 70</p> <p>4.6 Combined Encryption and Authentication 71</p> <p>4.7 Which Mode Should I Use? 71</p> <p>4.8 Information Leakage 72</p> <p>4.8.1 Chances of a Collision 73</p> <p>4.8.2 How to Deal With Leakage 74</p> <p>4.8.3 About Our Math 75</p> <p>4.9 Exercises 75</p> <p><b>Chapter 5 Hash Functions 77</b></p> <p>5.1 Security of Hash Functions 78</p> <p>5.2 Real Hash Functions 79</p> <p>5.2.1 A Simple But Insecure Hash Function 80</p> <p>5.2.2 MD5 81</p> <p>5.2.3 SHA-1 82</p> <p>5.2.4 SHA-224, SHA-256, SHA-384, and SHA-512 82</p> <p>5.3 Weaknesses of Hash Functions 83</p> <p>5.3.1 Length Extensions 83</p> <p>5.3.2 Partial-Message Collision 84</p> <p>5.4 Fixing the Weaknesses 84</p> <p>5.4.1 Toward a Short-term Fix 85</p> <p>5.4.2 A More Efficient Short-term Fix 85</p> <p>5.4.3 Another Fix 87</p> <p>5.5 Which Hash Function Should I Choose? 87</p> <p>5.6 Exercises 87</p> <p>Chapter 6 Message Authentication Codes 89</p> <p>6.1 What a MAC Does 89</p> <p>6.2 The Ideal MAC and MAC Security 90</p> <p>6.3 CBC-MAC and CMAC 91</p> <p>6.4 HMAC 93</p> <p>6.5 GMAC 94</p> <p>6.6 Which MAC to Choose? 95</p> <p>6.7 Using a MAC 95</p> <p>6.8 Exercises 97</p> <p><b>Chapter 7 The Secure Channel 99</b></p> <p>7.1 Properties of a Secure Channel 99</p> <p>7.1.1 Roles 99</p> <p>7.1.2 Key 100</p> <p>7.1.3 Messages or Stream 100</p> <p>7.1.4 Security Properties 101</p> <p>7.2 Order of Authentication and Encryption 102</p> <p>7.3 Designing a Secure Channel: Overview 104</p> <p>7.3.1 Message Numbers 105</p> <p>7.3.2 Authentication 106</p> <p>7.3.3 Encryption 106</p> <p>7.3.4 Frame Format 107</p> <p>7.4 Design Details 107</p> <p>7.4.1 Initialization 107</p> <p>7.4.2 Sending a Message 108</p> <p>7.4.3 Receiving a Message 109</p> <p>7.4.4 Message Order 111</p> <p>7.5 Alternatives 112</p> <p>7.6 Exercises 113</p> <p><b>Chapter 8 Implementation Issues (I) 115</b></p> <p>8.1 Creating Correct Programs 116</p> <p>8.1.1 Specifications 117</p> <p>8.1.2 Test and Fix 118</p> <p>8.1.3 Lax Attitude 119</p> <p>8.1.4 So How Do We Proceed? 119</p> <p>8.2 Creating Secure Software 120</p> <p>8.3 Keeping Secrets 120</p> <p>8.3.1 Wiping State 121</p> <p>8.3.2 Swap File 122</p> <p>8.3.3 Caches 124</p> <p>8.3.4 Data Retention by Memory 125</p> <p>8.3.5 Access by Others 127</p> <p>8.3.6 Data Integrity 127</p> <p>8.3.7 What to Do 128</p> <p>8.4 Quality of Code 128</p> <p>8.4.1 Simplicity 129</p> <p>8.4.2 Modularization 129</p> <p>8.4.3 Assertions 130</p> <p>8.4.4 Buffer Overflows 131</p> <p>8.4.5 Testing 131</p> <p>8.5 Side-Channel Attacks 132</p> <p>8.6 Beyond this Chapter 133</p> <p>8.7 Exercises 133</p> <p><b>Part III Key Negotiation 135</b></p> <p><b>Chapter 9 Generating Randomness 137</b></p> <p>9.1 Real Random 138</p> <p>9.1.1 Problems With Using Real Random Data 139</p> <p>9.1.2 Pseudorandom Data 140</p> <p>9.1.3 Real Random Data and PRNGS 140</p> <p>9.2 Attack Models for a PRNG 141</p> <p>9.3 Fortuna 142</p> <p>9.4 The Generator 143</p> <p>9.4.1 Initialization 145</p> <p>9.4.2 Reseed 145</p> <p>9.4.3 Generate Blocks 146</p> <p>9.4.4 Generate Random Data 146</p> <p>9.4.5 Generator Speed 147</p> <p>9.5 Accumulator 147</p> <p>9.5.1 Entropy Sources 147</p> <p>9.5.2 Pools 148</p> <p>9.5.3 Implementation Considerations 150</p> <p>9.5.3.1 Distribution of Events Over Pools 150</p> <p>9.5.3.2 Running Time of Event Passing 151</p> <p>9.5.4 Initialization 152</p> <p>9.5.5 Getting Random Data 153</p> <p>9.5.6 Add an Event 154</p> <p>9.6 Seed File Management 155</p> <p>9.6.1 Write Seed File 156</p> <p>9.6.2 Update Seed File 156</p> <p>9.6.3 When to Read and Write the Seed File 157</p> <p>9.6.4 Backups and Virtual Machines 157</p> <p>9.6.5 Atomicity of File System Updates 158</p> <p>9.6.6 First Boot 158</p> <p>9.7 Choosing Random Elements 159</p> <p>9.8 Exercises 161</p> <p><b>Chapter 10 Primes 163</b></p> <p>10.1 Divisibility and Primes 163</p> <p>10.2 Generating Small Primes 166</p> <p>10.3 Computations Modulo a Prime 167</p> <p>10.3.1 Addition and Subtraction 168</p> <p>10.3.2 Multiplication 169</p> <p>10.3.3 Groups and Finite Fields 169</p> <p>10.3.4 The GCD Algorithm 170</p> <p>10.3.5 The Extended Euclidean Algorithm 171</p> <p>10.3.6 Working Modulo 2 172</p> <p>10.4 Large Primes 173</p> <p>10.4.1 Primality Testing 176</p> <p>10.4.2 Evaluating Powers 178</p> <p>10.5 Exercises 179</p> <p><b>Chapter 11 Diffie-Hellman 181</b></p> <p>11.1 Groups 182</p> <p>11.2 Basic DH 183</p> <p>11.3 Man in the Middle 184</p> <p>11.4 Pitfalls 185</p> <p>11.5 Safe Primes 186</p> <p>11.6 Using a Smaller Subgroup 187</p> <p>11.7 The Size of p 188</p> <p>11.8 Practical Rules 190</p> <p>11.9 What Can Go Wrong? 191</p> <p>11.10 Exercises 193</p> <p><b>Chapter 12 RSA 195</b></p> <p>12.1 Introduction 195</p> <p>12.2 The Chinese Remainder Theorem 196</p> <p>12.2.1 Garner’s Formula 196</p> <p>12.2.2 Generalizations 197</p> <p>12.2.3 Uses 198</p> <p>12.2.4 Conclusion 199</p> <p>12.3 Multiplication Modulo n 199</p> <p>12.4 RSA Defined 200</p> <p>12.4.1 Digital Signatures with RSA 200</p> <p>12.4.2 Public Exponents 201</p> <p>12.4.3 The Private Key 202</p> <p>12.4.4 The Size of n 203</p> <p>12.4.5 Generating RSA Keys 203</p> <p>12.5 Pitfalls Using RSA 205</p> <p>12.6 Encryption 206</p> <p>12.7 Signatures 209</p> <p>12.8 Exercises 211</p> <p><b>Chapter 13 Introduction to Cryptographic Protocols 213</b></p> <p>13.1 Roles 213</p> <p>13.2 Trust 214</p> <p>13.2.1 Risk 215</p> <p>13.3 Incentive 215</p> <p>13.4 Trust in Cryptographic Protocols 217</p> <p>13.5 Messages and Steps 218</p> <p>13.5.1 The Transport Layer 219</p> <p>13.5.2 Protocol and Message Identity 219</p> <p>13.5.3 Message Encoding and Parsing 220</p> <p>13.5.4 Protocol Execution States 221</p> <p>13.5.5 Errors 221</p> <p>13.5.6 Replay and Retries 223</p> <p>13.6 Exercises 225</p> <p><b>Chapter 14 Key Negotiation 227</b></p> <p>14.1 The Setting 227</p> <p>14.2 A First Try 228</p> <p>14.3 Protocols Live Forever 229</p> <p>14.4 An Authentication Convention 230</p> <p>14.5 A Second Attempt 231</p> <p>14.6 A Third Attempt 232</p> <p>14.7 The Final Protocol 233</p> <p>14.8 Different Views of the Protocol 235</p> <p>14.8.1 Alice’s View 235</p> <p>14.8.2 Bob’s View 236</p> <p>14.8.3 Attacker’s View 236</p> <p>14.8.4 Key Compromise 238</p> <p>14.9 Computational Complexity of the Protocol 238</p> <p>14.9.1 Optimization Tricks 239</p> <p>14.10 Protocol Complexity 240</p> <p>14.11 A Gentle Warning 241</p> <p>14.12 Key Negotiation from a Password 241</p> <p>14.13 Exercises 241</p> <p><b>Chapter 15 Implementation Issues (II) 243</b></p> <p>15.1 Large Integer Arithmetic 243</p> <p>15.1.1 Wooping 245</p> <p>15.1.2 Checking DH Computations 248</p> <p>15.1.3 Checking RSA Encryption 248</p> <p>15.1.4 Checking RSA Signatures 249</p> <p>15.1.5 Conclusion 249</p> <p>15.2 Faster Multiplication 249</p> <p>15.3 Side-Channel Attacks 250</p> <p>15.3.1 Countermeasures 251</p> <p>15.4 Protocols 252</p> <p>15.4.1 Protocols Over a Secure Channel 253</p> <p>15.4.2 Receiving a Message 253</p> <p>15.4.3 Timeouts 255</p> <p>15.5 Exercises 255</p> <p><b>Part IV Key Management 257</b></p> <p><b>Chapter 16 The Clock 259</b></p> <p>16.1 Uses for a Clock 259</p> <p>16.1.1 Expiration 259</p> <p>16.1.2 Unique Value 260</p> <p>16.1.3 Monotonicity 260</p> <p>16.1.4 Real-Time Transactions 260</p> <p>16.2 Using the Real-Time Clock Chip 261</p> <p>16.3 Security Dangers 262</p> <p>16.3.1 Setting the Clock Back 262</p> <p>16.3.2 Stopping the Clock 262</p> <p>16.3.3 Setting the Clock Forward 263</p> <p>16.4 Creating a Reliable Clock 264</p> <p>16.5 The Same-State Problem 265</p> <p>16.6 Time 266</p> <p>16.7 Closing Recommendations 267</p> <p>16.8 Exercises 267</p> <p><b>Chapter 17 Key Servers 269</b></p> <p>17.1 Basics 270</p> <p>17.2 Kerberos 270</p> <p>17.3 Simpler Solutions 271</p> <p>17.3.1 Secure Connection 272</p> <p>17.3.2 Setting Up a Key 272</p> <p>17.3.3 Rekeying 272</p> <p>17.3.4 Other Properties 273</p> <p>17.4 What to Choose 273</p> <p>17.5 Exercises 274</p> <p><b>Chapter 18 The Dream of PKI 275</b></p> <p>18.1 A Very Short PKI Overview 275</p> <p>18.2 PKI Examples 276</p> <p>18.2.1 The Universal PKI 276</p> <p>18.2.2 VPN Access 276</p> <p>18.2.3 Electronic Banking 276</p> <p>18.2.4 Refinery Sensors 277</p> <p>18.2.5 Credit Card Organization 277</p> <p>18.3 Additional Details 277</p> <p>18.3.1 Multilevel Certificates 277</p> <p>18.3.2 Expiration 278</p> <p>18.3.3 Separate Registration Authority 279</p> <p>18.4 Summary 280</p> <p>18.5 Exercises 280</p> <p><b>Chapter 19 PKI Reality 281</b></p> <p>19.1 Names 281</p> <p>19.2 Authority 283</p> <p>19.3 Trust 284</p> <p>19.4 Indirect Authorization 285</p> <p>19.5 Direct Authorization 286</p> <p>19.6 Credential Systems 286</p> <p>19.7 The Modified Dream 288</p> <p>19.8 Revocation 289</p> <p>19.8.1 Revocation List 289</p> <p>19.8.2 Fast Expiration 290</p> <p>19.8.3 Online Certificate Verification 291</p> <p>19.8.4 Revocation Is Required 291</p> <p>19.9 So What Is a PKI Good For? 292</p> <p>19.10 What to Choose 293</p> <p>19.11 Exercises 294</p> <p><b>Chapter 20 PKI Practicalities 295</b></p> <p>20.1 Certificate Format 295</p> <p>20.1.1 Permission Language 295</p> <p>20.1.2 The Root Key 296</p> <p>20.2 The Life of a Key 297</p> <p>20.3 Why Keys Wear Out 298</p> <p>20.4 Going Further 300</p> <p>20.5 Exercises 300</p> <p><b>Chapter 21 Storing Secrets 301</b></p> <p>21.1 Disk 301</p> <p>21.2 Human Memory 302</p> <p>21.2.1 Salting and Stretching 304</p> <p>21.3 Portable Storage 306</p> <p>21.4 Secure Token 306</p> <p>21.5 Secure UI 307</p> <p>21.6 Biometrics 308</p> <p>21.7 Single Sign-On 309</p> <p>21.8 Risk of Loss 310</p> <p>21.9 Secret Sharing 310</p> <p>21.10 Wiping Secrets 311</p> <p>21.10.1 Paper 311</p> <p>21.10.2 Magnetic Storage 312</p> <p>21.10.3 Solid-State Storage 313</p> <p>21.11 Exercises 313</p> <p><b>Part V Miscellaneous 315</b></p> <p><b>Chapter 22 Standards and Patents 317</b></p> <p>22.1 Standards 317</p> <p>22.1.1 The Standards Process 317</p> <p>22.1.1.1 The Standard 319</p> <p>22.1.1.2 Functionality 319</p> <p>22.1.1.3 Security 320</p> <p>22.1.2 SSL 320</p> <p>22.1.3 AES: Standardization by Competition 321</p> <p>22.2 Patents 322</p> <p><b>Chapter 23 Involving Experts 323</b></p> <p>Bibliography 327</p> <p>Index 339</p>
<b>Niels Ferguson</b> is a cryptographer for Microsoft who has designed and implemented cryptographic algorithms, protocols, and large-scale security infrastructures. <p><b>Bruce Schneier</b> is an internationally renowned security technologist whose advice is sought by business, government, and the media. He is the author of <i>Applied Cryptography, Secrets and Lies</i>, and <i>Schneier on Security</i>.</p> <p><b>Tadayoshi Kohno</b> is a professor at the University of Washington. He is known for his research and for developing innovative new approaches to cryptography and computer security education.</p>
<b>Learn to build cryptographic protocols that work in the real world</b> <p>Knowing how a camera works does not make you a great photographer. Knowing what cryptographic designs are and how existing cryptographic protocols work does not give you proficiency in using cryptography. You must learn to think like a cryptographer.</p> <p>That is what this book will teach you. Dive deeply into specific, concrete cryptographic protocols and learn why certain decisions were made. Recognize the challenges and how to overcome them. With this book, which is suitable for both classroom and self-study, you will learn to use cryptography effectively in real-world systems.</p> <ul> <li> <p>Understand what goes into designing cryptographic protocols</p> </li> <li> <p>Develop an understanding of the interface between cryptography and the surrounding system, including people, economics, hardware, software, ethics, policy, and other aspects of the real world</p> </li> <li> <p>Look beyond the security protocol to see weaknesses in the surrounding system</p> </li> <li> <p>Thwart the adversary by understanding how adversaries think</p> </li> <li> <p>Learn how to build cryptography into new products</p> </li> </ul>

Diese Produkte könnten Sie auch interessieren:

Quantifiers in Action
Quantifiers in Action
von: Antonio Badia
PDF ebook
96,29 €
Managing and Mining Uncertain Data
Managing and Mining Uncertain Data
von: Charu C. Aggarwal
PDF ebook
96,29 €