Secure communicating systems - M. Huth - Librairie Eyrolles
Tous nos rayons

Déjà client ? Identifiez-vous

Mot de passe oublié ?

Nouveau client ?

CRÉER VOTRE COMPTE
Secure communicating systems
Ajouter à une liste

Librairie Eyrolles - Paris 5e
Indisponible

Secure communicating systems

Secure communicating systems

Desing, analysis and implementation

M. Huth

284 pages, parution le 18/10/2001

Résumé

This volume details what every computer scientist ought to know about cryptographic systems, security protocols, and secure information flow in programs. Highlights include discussions of the new advanced encryption standard "Rijndael"; an optimal public-key encryption using RSA which turns "textbook RSA" into a practical implementation; standard security models for information flow in computer programs or human organizations; and moral, legal, and political issues. Another novel feature is the presentation of a formal model-checking tool for specifying and debugging security protocols.

Table of Contents

Preface
Acknowledgments
1 Secure Communication in Modern Information Societies 1
1.1 Electronic Commerce: The Mantra of Y2K+ 1
1.2 Cryptographic Systems 3
1.3 Legislating Electronic Authentication 6
1.4 The Mathematical Judge 9
1.5 Encryption Policies 10
1.6 Trust and Communities 11
2 Public-Key Cryptography 15
2.1 Specification of RSA 17
2.2 A Realization of PKCs: RSA 23
2.3 Generating Large Primes 27
2.4 Correctness of RSA 59
2.5 Security of RSA 64
2.6 Integer Factorization 73
2.7 Other Key-Exchange Realizations Based on Discrete Logarithms 76
3 Symmetric-Key Cryptography 81
3.1 Stream Ciphers 81
3.2 Block Ciphers 95
4 Security Protocol Design and Analysis 131
4.1 Digital Signatures 131
4.2 Secure Log-In Protocols 142
4.3 Authentication Revisited 149
4.4 Secret-Sharing Protocols 153
4.5 Model Checking Security Protocol Designs 156
5 Optimal Public-Key Encryption with RSA 179
5.1 A Simple Semantically Secure Encryption 180
5.2 A Plain-Text-Aware Encryption 182
5.3 The Random Oracle Methodology 186
5.4 Exact Security for the Simple Encryption 189
5.5 Exact Security for the Plain-Text-Aware Encryption 199
6 Analysis of Secure Information Flow 204
6.1 Motivation 204
6.2 A Type System for Analysis of Secure Information Flow 207
6.3 A Semantic Approach to Analysis of Secure Information Flow 227
6.4 Program Certification 255
6.5 Covert Channels 256
App.: Primitive Roots 259
Bibliography 271
Index 275

Caractéristiques techniques

  PAPIER
Éditeur(s) Cambridge University Press
Auteur(s) M. Huth
Parution 18/10/2001
Nb. de pages 284
Format 18 x 26
Couverture Relié
Poids 401g
Intérieur Noir et Blanc
EAN13 9780521807319

Avantages Eyrolles.com

Livraison à partir de 0,01 en France métropolitaine
Paiement en ligne SÉCURISÉ
Livraison dans le monde
Retour sous 15 jours
+ d'un million et demi de livres disponibles
satisfait ou remboursé
Satisfait ou remboursé
Paiement sécurisé
modes de paiement
Paiement à l'expédition
partout dans le monde
Livraison partout dans le monde
Service clients sav@commande.eyrolles.com
librairie française
Librairie française depuis 1925
Recevez nos newsletters
Vous serez régulièrement informé(e) de toutes nos actualités.
Inscription