Contents
1. Introduction 1
2. Cryptography 7
2.1 Ciphers and Cryptosystems 8
2.2 Stream Ciphers 15
2.3 Information-The oretic Cryptanalysis 22
2.4 Feasibility of Cryptanalysis 28
2.5 Modern Block Ciphers 33
2.6 Intractability and Cryptanalysis 52
2.7 Bibliographic Notes 61
3. Computer System Security Models 63
3.1 Operating System Models 63
3.2 Multilevel Security 99
3.3 Databases and Inference 104
3.4 Bibliographic Notes 122
4. Protocols and Security ..125
4 .1 Arbiters 130
4.2 Digital Signatures 131
4.3 Mental Poker 143
4.4 Secret Ballot Elections 146
4.5 Password Authentication 147
4.6 Using Randomness 148
4.7 Key Distribution 151
4.8 Distributing Subkeys 152
4 .9 Shaking Hands 155
4.10 Secure Computer Systems 157
4.11 Compromising Protocols 170
4.12 Establishing Protocols Security 179
4.13 Bibliographic Notes 184
5. Bibliography 187
Previous Page Next Page