Contents
3 Tools for Security and Insecurity
3.2 Entropy Extraction via Hashing
3.3.1 Von Neumann's Coin Flipping Algorithm
3.3.2 Iterating Neumann's Algorithm
3.4 Combining Weak Sources of Entropy
3.5 Pseudorandom Number Generators
3.5.1 Heuristic Pseudorandom Number Generation
3.5.2 PRNGs Based on Reduction Arguments
3.7 Random Permutation Generation
3.7.1 Shuffling Cards by Repeated Sampling
3.7.2 Shuffling Cards Using Trotter-Johnson
3.8 Sound Approach to Random Number Generation and Use
3.9. RNGs Are the Beating Heart of System Security
3.10. Cryptovirology Benefits from General Advances
3.10.1 Strong Crypto Yields Strong Cryptoviruses
3.10.2 Mix Networks and Cryptovirus Extortion
3.11. Anonymizing Program Propagation
4.1 Anonymity in a Digital Age
4.1.1 From Free Elections to the Unabomber
4.1.2 Electronic Money and Anonymous Payments
4.1.3 Anonymous Assassination Lotteries
4.1.4 Kidnapping and Perfect Crimes
4.1.5 Conducting Criminal Operations with Mixes
4.2 Deniable Password Snatching
4.2.1 Password Snatching and Security by Obscurity
4.2.2 Solving the Problem Using Cryptovirology
4.2.3 Zero-Knowledge Proofs to the Rescue
4.2.4 Improving the Attack Using ElGamal
5.1 Overview of Cryptocounters
Get Malicious Cryptography: Exposing Cryptovirology now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.