Security
- Textbook
- Applied Cryptography by Bruce Schneier
- Handbook of Applied Cryptography
- Finite Fields
- Finite Fields for Computer Scientists and Engineers
- Rudolf Lidl and Harald Niederreiter
- Finite Fields (Encyclopedia of Mathematics and its Applications)
- Introduction to Finite Fields and Their Applications
- Discrete Mathematics and Its Applications by Kenneth H. Rosen
- Network Security
- IEEE 802.1X(port-based authentication)
- Wireless
- IEEE 802.11i(WPA, WPA2/RSN)
- WEP(Wired Equivalent Privacy)(defined in 802.11)
- 40 bits = 4x10 : each character is a hexadecimal (Hex) characters (0-9 and A-F), so uses 4bits. In fact it is 64 bits = 4x10+24(initialization vector)
- 128 bits = 4x26+24(initialization vector)
- Symmetric-key
- pseudorandom process
- a process that appears to be random but it is not
- Pseudorandom sequences typically exhibit statistical randomness while being generated by an entirely deterministic causal process.
- It can be used again and again to produce exactly the same numbers.
- The Advanced Encryption Standard published in 2001 uses a key size of (at minimum) 128 bits. It also can use keys up to 256 bits (a specification requirement for submissions to the AES contest). 128 bits is currently thought, by many observers, to be sufficient for the foreseeable future for symmetric algorithms of AES's quality. The U.S. Government requires 192 or 256-bit AES keys for highly sensitive data.
- Performance
- Digest
- hash functions
- cryptographic hash functions
- Galois field
- Finite Group
- MAC
- Digital Signature
- Random Key Generation
- /dev/ramdon
- Checksum
- CRC(Cycle Redundancy Check)
- Modulo-2 binary division
- CHAPTER 14 CYCLIC REDUNDANCY CHECK
- The CRC is based on polynomial arithmetic, in particular, on computing the remainder of dividing one polynomial in GF(2) (Galois field with two elements)
Authentication | Encryption |
---|---|
Open System | None or WEP |
Shared Key | None or WEP |
WPAPSK, WPS2PSK | AES or TKIP |
WPAEAP, WPA2EAP | AES or TKIP |
- Public Key Cryptography
- RSA Laboratories
- Public-Key Cryptography Standards (PKCS)
- PKCS #1 v2.1: RSA Cryptography Standard
- encoding methods for signatures with appendix
- EMSA-PASS
- EMSA-PSS-ENCODE (M, emBits)
- EMSA-PSS-VERIFY (M, EM, emBits)
- EMSA-PKCS1-v1_5-ENCODE (M, emLen)
- EMSA-PASS
- encoding methods for signatures with appendix
- PKCS #1 v2.1: RSA Cryptography Standard
- Public-Key Cryptography Standards (PKCS)
- Attack
page revision: 113, last edited: 18 Nov 2016 03:38