Chapter 1:
Foundations
 | Terminology
|
 | STEGANOGRAPHY
|
 | Substitution Ciphers and Transposition Ciphers
|
 | Simple XOR |
 | One-Time Pads
|
 | Computer Algorithms
|
 | Large Numbers |
Part I: Cryptographic Protocols
Chapter 2:
Protocol Building Blocks
 | Introduction to Protocols
|
 | Communications using Symmetric Cryptography
|
 | One-Way Functions
|
 | One-Way Hash Functions
|
 | Communications using Public-Key Cryptography
|
 | Digital Signatures
|
 | Digital Signatures with Encryption
|
 | Random and Pseudo-Random Sequence Generation |
Chapter 3:
Basic Protocols
 | Key Exchange
|
 | Authentication
|
 | AUTHENTICATION AND KEY EXCHANGE
|
 | FORMAL ANALYSIS OF AUTHENTICATION AND KEY-EXCHANGE PROTOCOLS
|
 | Multiple-Key Public-Key Cryptography
|
 | Secret Splitting
|
 | Secret Sharing
|
 | Cryptographic Protection of Databases |
Chapter 4:
Intermediate Protocols
 | Timestamping Services |
 | Subliminal Channel
|
 | Undeniable Digital Signatures
|
 | DESIGNATED CONFIRMER SIGNATURES
|
 | PROXY SIGNATURES
|
 | Group Signatures
|
 | Fail-Stop Digital Signatures
|
 | Computing with Encrypted Data
|
 | Bit Commitment
|
 | Fair Coin Flips
|
 | Mental Poker
|
 | ONE-WAY ACCUMULATORS
|
 | All-or-Nothing Disclosure of Secrets
|
 | KEY ESCROW |
Chapter 5:
Advanced Protocols
 | ZERO-KNOWLEDGE PROOFS
|
 | Zero-Knowledge Proofs of Identity
|
 | Blind Signatures
|
 | IDENTITY-BASED PUBLIC-KEY CRYPTOGRAPHY
|
 | Oblivious Transfer
|
 | OBLIVIOUS SIGNATURES
|
 | Simultaneous Contract Signing
|
 | Digital Certified Mail
|
 | Simultaneous Exchange of Secrets |
Chapter 6: Esoteric Protocols
 | SECURE ELECTIONS
|
 | Secure Multiparty Computation
|
 | Anonymous Message Broadcast
|
 | DIGITAL CASH |
Part II: Cryptographic Techniques
Chapter 7: Key Length
 | SYMMETRIC KEY LENGTH
|
 | PUBLIC-KEY KEY LENGTH
|
 | COMPARING SYMMETRIC AND PUBLIC-KEY KEY LENGTH
|
 | BIRTHDAY ATTACKS AGAINST ONE-WAY HASH FUNCTIONS
|
 | How Long Should a Key Be?
|
 | Caveat Emptor |
Chapter 8: Key Management
 | Generating Keys
|
 | NONLINEAR KEYSPACES |
 | Transferring Keys
|
 | Verifying Keys
|
 | Using Keys
|
 | UPDATING KEYS
|
 | Storing Keys
|
 | Backup Keys
|
 | Compromised Keys
|
 | Lifetime of Keys
|
 | Destroying Keys
|
 | Public-Key Key Management |
Chapter 9: Algorithm Types and
Modes
 | Electronic Codebook Mode
|
 | Block Replay
|
 | Cipher Block Chaining Mode
|
 | Stream Ciphers
|
 | Self-Synchronizing Stream Ciphers
|
 | Cipher-Feedback Mode
|
 | Synchronous Stream Ciphers
|
 | Output-Feedback Mode
|
 | Counter Mode
|
 | Other Block-Cipher Modes
|
 | CHOOSING A CIPHER MODE
|
 | INTERLEAVING
|
 | Block Ciphers vs. Stream Ciphers |
Chapter 10: Using Algorithms
 | Choosing an Algorithm
|
 | Public-Key Cryptography vs. Symmetric Cryptography
|
 | Encrypting Communications Channels
|
 | ENCRYPTING DATA FOR STORAGE
|
 | Hardware Encryption vs. Software Encryption
|
 | COMPRESSION, ENCODING, AND ENCRYPTION
|
 | DETECTING ENCRYPTION
|
 | HIDING CIPHERTEXT IN CIPHERTEXT |
 | DESTROYING INFORMATION |
Chapter 11: Mathematical
Background
 | Information Theory
|
 | Complexity Theory
|
 | NUMBER THEORY
|
 | FACTORING
|
 | Prime Number Generation
|
 | Discrete Logarithms in a Finite Field |
Chapter 12: Data Encryption
Standard
 | Background
|
 | Description of DES
|
 | Security of DES
|
 | DIFFERENTIAL AND LINEAR CRYPTANALYSIS
|
 | THE REAL DESIGN CRITERIA
|
 | DES VARIANTS
|
 | HOW SECURE IS DES TODAY? |
Chapter 13: Other Block
Algorithms
 | Lucifer
|
 | Madryga
|
 | Newdes
|
 | Feal-N
|
 | Redoc
|
 | LOKI
|
 | Khufu and Khafre |
 | RC2
|
 | Idea
|
 | Mmb
|
 | CA-1.1
|
 | SKIPJACK |
Chapter 14: Still Other Block
Algorithms
 | GOST
|
 | CAST
|
 | BLOWFISH
|
 | SAFER K-64
|
 | 3-WAY
|
 | CRAB
|
 | SXAL8/MBAL
|
 | RC5
|
 | OTHER BLOCK ALGORITHMS
|
 | THEORY OF BLOCK CIPHER DESIGN
|
 | USING ONE-WAY HASH FUNCTIONS
|
 | CHOOSING A BLOCK ALGORITHM |
|