Security Engineering. Ross Anderson
Чтение книги онлайн.
Читать онлайн книгу Security Engineering - Ross Anderson страница 5
4 Chapter 5Figure 5.1: Monoalphabetic substitution cipherFigure 5.9: The random oracleFigure 5.10: A simple 16-bit SP-network block cipherFigure 5.11: The AES linear transformation, illustrated by its effect on byt...Figure 5.12: The Feistel cipher structureFigure 5.13: The DES round functionFigure 5.14: The Linux penguin, in clear and ECB encrypted (from Wikipedia, ...Figure 5.15: Cipher Block Chaining (CBC) modeFigure 5.16: Feedforward mode (hash function)
5 Chapter 6Figure 6.5: Stack smashing attack
6 Chapter 8Figure 8.1: The market for apartments
7 Chapter 9Figure 9.1: typical corporate policy languageFigure 9.3: The NRL pumpFigure 9.4: Insecure composition of secure systems with feedbackFigure 9.5: The cascade problem
8 Chapter 10Figure 10.3: A lattice of security labels
9 Chapter 11Figure 11.3: Table lattice for a database with three attributes
10 Chapter 12Figure 12.1: Clay envelope and its content of tokens representing 7 jars of ...Figure 12.2: Architecture of SWIFTFigure 12.3: IBM method for generating bank card PINsFigure 12.4: Card fraud in the UK from 2004 to 2018Figure 12.5: A rigid wire is inserted through a hole in the Ingenico's conce...
11 Chapter 13Figure 13.1: A cutaway pin-tumbler lock (courtesy of Marc Weber Tobias)Figure 13.2: Key for a sidebar lockFigure 13.3: Sidebar bump key
12 Chapter 14Figure 14.1: A prepayment electricity meter (courtesy of Schlumberger)Figure 14.2: A tachograph chartFigure 14.3: A tachograph with an interruptor controlled by the driver using...Figure 14.4: One of the new formats for US postal meters (courtesy of Symbol...
13 Chapter 15Figure 15.1: Shared control using geometry
14 Chapter 16Figure 16.1: Scanning electron micrograph of paper (courtesy Ingenia Technol...Figure 16.2: A wristband seal from our local swimming pool
15 Chapter 17Figure 17.1: The prints in the McKie caseFigure 17.2: an iris with iris code (courtesy John Daugman)
16 Chapter 18Figure 18.1: The IBM 4758 cryptoprocessor (courtesy of Steve Weingart)Figure 18.2: The 4758 partially opened showing (from top left downward) the ...Figure 18.3: Our probing stationFigure 18.4: The data bus of an ST16 smartcard prepared for probing by excav...Figure 18.5: The protective mesh of an ST16 smartcard with a FIB cross for p...Figure 18.6: SX28 microcontroller with ‘glue logic’ (courtesy of Sergei Skor...
17 Chapter 19Figure 19.1: RF signal from a Toshiba laptop reconstructed several rooms awa...Figure 19.2: Normal textFigure 19.3: Text low-pass filteredFigure 19.4: Screen, normal textFigure 19.5: Screen, filtered textFigure 19.6: Page of normal textFigure 19.7: Page of filtered textFigure 19.8: Hz AM signalFigure 19.9: 1200 Hz AM signalFigure 19.10: Plot of the current measured during 256 single attempts to gue...
18 Chapter 21Figure 21.2: complex firewalls for an MLS network
19 Chapter 22Figure 22.1: GSM authentication system components
20 Chapter 23Figure 23.1: Spreading in DSSS (courtesy of Roche and Dugelay)Figure 23.2: Unspreading in DSSS (courtesy of Roche and Dugelay)
21 Chapter 24Figure 24.1: Cut-and-rotate scramblingFigure 24.2: Scrambled video frameFigure 24.3: Processed video frameFigure 24.4: The multiplexer generatorFigure 24.5: Binary revocation treeFigure 24.6: The Mosaic attack (courtesy Jet Photographic, www.jetphotograph
...
22 Chapter 27Figure 27.2: Hazard elimination in motor reversing circuitFigure 27.3: A threat treeFigure 27.4: The waterfall modelFigure 27.5: The spiral model
23 Chapter 28Figure 28.1: Two infusion pumps that are apparently of the same model (photo...
Guide
1 Cover
2 Table of Contents
Pages
1 iii
2 xxxvii
3 xxxviii
4 xxxix
5 xli
6 xlii
7 xliii
8 xliv
9 xlv
10 xlvi
11 xlvii
12 xlviii
13 xlix
14 l
15 1
16 2
17 3
18 4
19
5