Modern cryptosystems, used in numerous applications that require secrecy or privacy - electronic mail, financial transactions, medical-record keeping, government affairs, social media etc. - are based on sophisticated...
ISBN:
(数字)9783030341428
ISBN:
(纸本)9783030341411
Modern cryptosystems, used in numerous applications that require secrecy or privacy - electronic mail, financial transactions, medical-record keeping, government affairs, social media etc. - are based on sophisticated mathematics and algorithms that in implementation involve much computer arithmetic. And for speed it is necessary that the arithmetic be realized at the hardware (chip) level. This book is an introduction to the implementation of cryptosystems at that level. The aforementioned arithmetic is mostly the arithmetic of finite fields, and the book is essentially one on the arithmetic of prime fields and binary fields in the context of cryptography. The book has three main parts. The first part is on generic algorithms and hardware architectures for the basic arithmetic operations: addition, subtraction, multiplication, and division. The second part is on the arithmetic of prime fields. And the third part is on the arithmetic of binary fields. The mathematical fundamentals necessary for the latter two parts are included, as are descriptions of various types of cryptosystems, to provide appropriate context. This book is intended for advanced-level students in Computer Science, Computer Engineering, and Electrical and Electronic Engineering. Practitioners too will find it useful, as will those with a general interest in "hard" applications of mathematics.
This book revises the strategic objectives of information Warfare, interpreting them according to the modern canons of information age, focusing on the fabric of society, the economy, and critical Infrastructures. The...
ISBN:
(数字)9783030606183
ISBN:
(纸本)9783030606176
This book revises the strategic objectives of information Warfare, interpreting them according to the modern canons of information age, focusing on the fabric of society, the economy, and critical Infrastructures. The authors build plausible detailed real-world scenarios for each entity, showing the related possible threats from the information Warfare point of view. In addition, the authors dive into the description of the still open problems, especially when it comes to critical infrastructures, and the countermeasures that can be implemented, possibly inspiring further research in the domain.
This book explores the genesis of ransomware and how the parallel emergence of encryption technologies has elevated ransomware to become the most prodigious cyber threat that enterprises are confronting. It also inves...
ISBN:
(数字)9783030665838
ISBN:
(纸本)9783030665821
This book explores the genesis of ransomware and how the parallel emergence of encryption technologies has elevated ransomware to become the most prodigious cyber threat that enterprises are confronting. It also investigates the driving forces behind what has been dubbed the ‘ransomware revolution’ after a series of major attacks beginning in 2013, and how the advent of cryptocurrencies provided the catalyst for the development and increased profitability of ransomware, sparking a phenomenal rise in the number and complexity of ransomware attacks.
This book provides a comprehensive review of the most up to date research related to cloud security auditing and discusses auditing the cloud infrastructure from the structural point of view, while focusing on virtual...
ISBN:
(数字)9783030231286
ISBN:
(纸本)9783030231279
This book provides a comprehensive review of the most up to date research related to cloud security auditing and discusses auditing the cloud infrastructure from the structural point of view, while focusing on virtualization-related security properties and consistency between multiple control layers. It presents an off-line automated framework for auditing consistent isolation between virtual networks in OpenStack-managed cloud spanning over overlay and layer 2 by considering both cloud layers' views. A runtime security auditing framework for the cloud with special focus on the user-level including common access control and authentication mechanisms e.g., RBAC, ABAC and SSO is covered as well. This book also discusses a learning-based proactive security auditing system, which extracts probabilistic dependencies between runtime events and applies such dependencies to proactively audit and prevent security violations resulting from critical events. Finally, this book elaborates the design and implementation of a middleware as a pluggable interface to OpenStack for intercepting and verifying the legitimacy of user requests at runtime. Many companies nowadays leverage cloud services for conducting major business operations (e.g., Web service, inventory management, customer service, etc.). However, the fear of losing control and governance still persists due to the inherent lack of transparency and trust in clouds. The complex design and implementation of cloud infrastructures may cause numerous vulnerabilities and misconfigurations, while the unique properties of clouds (elastic, self-service, multi-tenancy) can bring novel security challenges. In this book, the authors discuss how state-of-the-art security auditing solutions may help increase cloud tenants' trust in the service providers by providing assurance on the compliance with the applicable laws, regulations, policies, and standards. This book introduces the latest research results on both traditional retroactiv
This book discusses and summarizes current research issues, identifies challenges, and outlines future directions for proactive and dynamic network defense. This book also presents the latest fundamental research resu...
ISBN:
(数字)9783030105976
ISBN:
(纸本)9783030105969
This book discusses and summarizes current research issues, identifies challenges, and outlines future directions for proactive and dynamic network defense. This book also presents the latest fundamental research results toward understanding proactive and dynamic network defense by top researchers in related areas. It includes research results that offer formal frameworks to define proactive and dynamic network defense, and develop novel models to analyze and evaluate proactive designs and strategies in computer systems, network systems, cyber-physical systems and wireless networks. A wide variety of scientific techniques have been highlighted to study these problems in the fundamental domain. As the convergence of our physical and digital worlds grows fast pace, protecting information systems from being tampered or unauthorized access is becoming one of the most importance issues. The traditional mechanisms of network defense are built upon a static, passive, and reactive nature, which has insufficient to defend against today's attackers that attempt to persistently analyze, probe, circumvent or fool such mechanisms. It has not yet been fully investigated to address the early stage of "cyber kill chain" when adversaries carry out sophisticated reconnaissance to plan attacks against a defense system. Recently, proactive and dynamic network defense has been proposed as an important alternative towards comprehensive network defense. Two representative types of such defense are moving target defense (MTD) and deception-based techniques. These emerging approaches show great promise to proactively disrupt the cyber-attack kill chain and are increasingly gaining interest within both academia and industry. However, these approaches are still in their preliminary design stage. Despite the promising potential, there are research issues yet to be solved regarding the effectiveness, efficiency, costs and usability of such approaches. In addition, it is also necessary to identi
暂无评论