Disappearing Cryptography
  • Author : Peter Wayner
  • Release Date : 12 June 2009
  • Publisher : Morgan Kaufmann
  • Genre : Computers
  • Pages : 456
  • ISBN 13 : 0080922708

Disappearing Cryptography Book Summary

Cryptology is the practice of hiding digital information by means of various obfuscatory and steganographic techniques. The application of said techniques facilitates message confidentiality and sender/receiver identity authentication, and helps to ensure the integrity and security of computer passwords, ATM card information, digital signatures, DVD and HDDVD content, and electronic commerce. Cryptography is also central to digital rights management (DRM), a group of techniques for technologically controlling the use of copyrighted material that is being widely implemented and deployed at the behest of corporations that own and create revenue from the hundreds of thousands of mini-transactions that take place daily on programs like iTunes. This new edition of our best-selling book on cryptography and information hiding delineates a number of different methods to hide information in all types of digital media files. These methods include encryption, compression, data embedding and watermarking, data mimicry, and scrambling. During the last 5 years, the continued advancement and exponential increase of computer processing power have enhanced the efficacy and scope of electronic espionage and content appropriation. Therefore, this edition has amended and expanded outdated sections in accordance with new dangers, and includes 5 completely new chapters that introduce newer more sophisticated and refined cryptographic algorithms and techniques (such as fingerprinting, synchronization, and quantization) capable of withstanding the evolved forms of attack. Each chapter is divided into sections, first providing an introduction and high-level summary for those who wish to understand the concepts without wading through technical explanations, and then presenting concrete examples and greater detail for those who want to write their own programs. This combination of practicality and theory allows programmers and system designers to not only implement tried and true encryption procedures, but also consider probable future developments in their designs, thus fulfilling the need for preemptive caution that is becoming ever more explicit as the transference of digital media escalates. Includes 5 completely new chapters that delineate the most current and sophisticated cryptographic algorithms, allowing readers to protect their information against even the most evolved electronic attacks Conceptual tutelage in conjunction with detailed mathematical directives allows the reader to not only understand encryption procedures, but also to write programs which anticipate future security developments in their design

Disappearing Cryptography

Disappearing Cryptography

Author : Peter Wayner
Publisher : Morgan Kaufmann
Genre : Computers
Total View : 1456 Views
File Size : 45,8 Mb
Get Book

Cryptology is the practice of hiding digital information by means of various obfuscatory and steganographic techniques. The application of said techniques facilitates message confidentiality and sender/receiver identity authentication, and helps to ensure the integrity and security of computer passwords, ATM card information, digital signatures, DVD and HDDVD content, and ...

Disappearing Cryptography

Disappearing Cryptography

Author : Peter Wayner
Publisher : Morgan Kaufmann
Genre : Computers
Total View : 2204 Views
File Size : 49,8 Mb
Get Book

The bestselling first edition of "Disappearing Cryptography" was known as the best introduction to information hiding. This fully revised and expanded second edition describes a number of different techniques that people can use to hide information, such as encryption....

Theory of Cryptography

Theory of Cryptography

Author : Kobbi Nissim,Brent Waters
Publisher : Springer Nature
Genre : Computers
Total View : 7059 Views
File Size : 46,6 Mb
Get Book

The three-volume set LNCS 13042, LNCS 13043 and LNCS 13044 constitutes the refereed proceedings of the 19th International Conference on Theory of Cryptography, TCC 2021, held in Raleigh, NC, USA, in November 2021. The total of 66 full papers presented in this three-volume set was carefully reviewed and selected from 161 submissions. They cover topics on proof ...

Contemporary Cryptography  Second Edition

Contemporary Cryptography Second Edition

Author : Rolf Oppliger
Publisher : Artech House
Genre : Computers
Total View : 5114 Views
File Size : 53,6 Mb
Get Book

Whether you're new to the field or looking to broaden your knowledge of contemporary cryptography, this newly revised edition of an Artech House classic puts all aspects of this important topic into perspective. Delivering an accurate introduction to the current state-of-the-art in modern cryptography, the book offers you an in-depth ...

Handbook of Communications Security

Handbook of Communications Security

Author : F. Garzia
Publisher : WIT Press
Genre : Technology & Engineering
Total View : 2278 Views
File Size : 55,9 Mb
Get Book

Communications represent a strategic sector for privacy protection and for personal, company, national and international security. The interception, damage or lost of information during communication can generate material and non material economic damages from both a personal and collective point of view. The purpose of this book is to give ...

Practical UNIX and Internet Security

Practical UNIX and Internet Security

Author : Simson Garfinkel,Gene Spafford,Alan Schwartz
Publisher : "O'Reilly Media, Inc."
Genre : Computers
Total View : 5841 Views
File Size : 47,8 Mb
Get Book

The definitive book on UNIX security, this volume covers every aspect of computer security on UNIX machines and the Internet....

Internet and the Law

Internet and the Law

Author : Aaron Schwabach
Publisher : ABC-CLIO
Genre : Computers
Total View : 9594 Views
File Size : 41,9 Mb
Get Book

Focusing on laws relating to intellectual property and freedom of expression, this book covers legal issues relating to information technology and the Internet. Exploring such legal battles as A & M Records v Napster and Apple Computer v Franklin Computer, it allows readers a look into stories of trade secrets, music ...

Handbook of Surveillance Technologies

Handbook of Surveillance Technologies

Author : J.K. Petersen,Pamela Taylor
Publisher : CRC Press
Genre : Business & Economics
Total View : 6950 Views
File Size : 55,9 Mb
Get Book

From officially sanctioned, high-tech operations to budget spy cameras and cell phone video, this updated and expanded edition of a bestselling handbook reflects the rapid and significant growth of the surveillance industry. The Handbook of Surveillance Technologies, Third Edition is the only comprehensive work to chronicle the background and curre...