Confidentiality: Symmetric Encryption

Confidentiality: Symmetric Encryption

Manuel Mogollon (University of Dallas, USA)
Copyright: © 2008 |Pages: 50
DOI: 10.4018/978-1-59904-837-6.ch004
OnDemand PDF Download:
$37.50

Abstract

In the world of communications, assurance is sought that (1) a message is not accidentally or deliberately modified in transit by replacement, insertion, or deletion; (2) the message is coming from the source from which it claims to come; (3) the message is protected against unauthorized individuals reading information that is supposed to be kept private; and (4) there is protection against an individual denying that the individual sent or received a message. These assurances are provided through the use of security mechanisms. Chapters IV, V, VI, and VII discuss security mechanisms such as confidentiality, integrity, and access authentication that are used to implement the security services listed above. This chapter covers two types of symmetric encryption: stream ciphers and block ciphers. The theory behind using shift registers as stream ciphers, as well as the DES and the Advanced Encryption Standard (AES), are also covered in this chapter.

Complete Chapter List

Search this Book:
Reset
Table of Contents
Foreword
John H. Nugent
Acknowledgment
Manuel Mogollon
Chapter 1
Classic Cryptography  (pages 1-14)
Manuel Mogollon
Chapters 1 and 2 cover information on classic cryptography and the aspects of information security related to security services and mechanisms. The... Sample PDF
Classic Cryptography
$37.50
Chapter 2
Information Assurance  (pages 15-32)
Manuel Mogollon
The TCP/IP protocol is becoming the world standard for network and computer communications. The number of TCP/IP applications on the Internet and in... Sample PDF
Information Assurance
$37.50
Chapter 3
Manuel Mogollon
Mathematics plays an important role in encryption, public-key, authentication, and digital signatures. Knowing certain basic math concepts such as... Sample PDF
Number Theory and Finite Fields
$37.50
Chapter 4
Manuel Mogollon
In the world of communications, assurance is sought that (1) a message is not accidentally or deliberately modified in transit by replacement... Sample PDF
Confidentiality: Symmetric Encryption
$37.50
Chapter 5
Manuel Mogollon
Asymmetric encryption is a form of cryptography in which one key is used to encipher and the other to decipher. The two keys are mathematically... Sample PDF
Confidentiality: Asymmertic Encrypton
$37.50
Chapter 6
Manuel Mogollon
In this chapter, methods that can check if a message was modified are explained; this includes the Message Authentication Code (MAC), hash... Sample PDF
Integrity and Authentication
$37.50
Chapter 7
Access Authentication  (pages 152-188)
Manuel Mogollon
Unless a corporation can reliably authenticate its network users, it is not possible to keep unauthorized users out of its networks. Authentication... Sample PDF
Access Authentication
$37.50
Chapter 8
Manuel Mogollon
For the same level of security that public-key cryptosystems such as RSA have, elliptic curve cryptography (ECC) offers the benefit of smaller key... Sample PDF
Elliptic Curve Cryptograpy
$37.50
Chapter 9
Manuel Mogollon
In public-key encryption, the secrecy of the public key is not required, but the authenticity of the public key is necessary to guarantee its... Sample PDF
Certificates and Public Key Infrastructure
$37.50
Chapter 10
Electronic Mail Security  (pages 246-265)
Manuel Mogollon
In previous chapters of this book, crypto systems, security mechanisms, and security services have been discussed and reviewed as separate crypto... Sample PDF
Electronic Mail Security
$37.50
Chapter 11
VPNS and IPSEC  (pages 266-299)
Manuel Mogollon
Virtual private networks (VPN) and IPsec are discussed in this chapter. A VPN emulates a private wide area network (WAN) facility using IP networks... Sample PDF
VPNS and IPSEC
$37.50
Chapter 12
TLS, SSL, and SET  (pages 300-333)
Manuel Mogollon
In an Internet commercial transaction, the secure Web server and the buyer’s computer authenticate each other and encipher the data transmitted... Sample PDF
TLS, SSL, and SET
$37.50
Chapter 13
Web Services Security  (pages 334-408)
Manuel Mogollon
A service is an application offered by an organization that can be accessed through a programmable interface. Web services allow computers running... Sample PDF
Web Services Security
$37.50
Chapter 14
Wireless Security  (pages 409-446)
Manuel Mogollon
The nature of wireless is that of a physically open medium which makes authentication, access control, and confidentiality necessary in the... Sample PDF
Wireless Security
$37.50
Glossary of Terms
About the Author