Information Security Principles and Practice Mark Stamp
Information Security Principles and Practice Mark Stamp
Mark Stamp
San Jose State University
'INTERSCIENCE
A JOHN WILEY & SONS, INC., PUBLICATION
CONTENTS
Preface xv
About The Author xix
Acknowledgments xxi
1 INTRODUCTION 1
1 CRYPTO 9
2 CRYPTO BASICS 11
2.1 Introduction 11
2.2 How to Speak Crypto 12
2.3 Classic Crypto 13
2.3.1 Simple Substitution Cipher 13
2.3.2 Cryptanalysis of a Simple Substitution 15
2.3.3 Definition of Secure 16
2.3.4 Double Transposition Cipher 17
2.3.5 One-Time Pad 18
2.3.6 Project VENONA 21
Viii CONTENTS
3.1 Introduction 33
3.2 Stream Ciphers 34
3.2.1 A5/1 34
3.2.2 RC4 36
3.3 Block Ciphers 38
3.3.1 Feistel Cipher 38
3.3.2 DES 39
3.3.3 Triple DES 44
3.3.4 AES 45
3.3.5 Three More Block Ciphers 48
3.3.6 TEA 49
3.3.7 Block Cipher Modes 50
3.4 Integrity 54
3.5 Summary 55
3.6 Problems 56
4.1 Introduction 61
4.2 Knapsack 63
4.3 RSA 66
4.3.1 RSA Example 67
4.3.2 Repeated Squaring 68
4.3.3 Speeding Up RSA 69
4.4 Diffie-Hellman 70
4.5 Elliptic Curve Cryptography 72
4.5.1 Elliptic Curve Math 72
4.5.2 ECC Diffie-Hellman 74
4.6 Public Key Notation 75
4.7 Uses for Public Key Crypto 76
4.7.1 Confidentiality in the Real World 76
CONTENTS ix
8 AUTHORIZATION 177
I V SOFTWARE 265
1 1 SOFTWARE FLAWS AND MALWARE 267
APPENDIX 341
INDEX 381