URL: https://clemens.endorphin.org/nmihde/nmihde-A4-ds.pdf
%PDF-1.4
5 0 obj
<< /S /GoTo /D (chapter*.1) >>
endobj
8 0 obj
(Preface)
endobj
9 0 obj
<< /S /GoTo /D (chapter.1) >>
endobj
12 0 obj
(Introduction)
endobj
13 0 obj
<< /S /GoTo /D (chapter.2) >>
endobj
16 0 obj
(Design ingredients)
endobj
17 0 obj
<< /S /GoTo /D (section.2.1) >>
endobj
20 0 obj
(The many faces of n)
endobj
21 0 obj
<< /S /GoTo /D (section.2.2) >>
endobj
24 0 obj
(Galois Field arithmetic)
endobj
25 0 obj
<< /S /GoTo /D (section.2.3) >>
endobj
28 0 obj
(Algorithms for GF\(2\))
endobj
29 0 obj
<< /S /GoTo /D (section.2.4) >>
endobj
32 0 obj
(Sequences of multiplications in GF\(2\))
endobj
33 0 obj
<< /S /GoTo /D (section.2.5) >>
endobj
36 0 obj
(Gray Code)
endobj
37 0 obj
<< /S /GoTo /D (chapter.3) >>
endobj
40 0 obj
(Cipher Modes)
endobj
41 0 obj
<< /S /GoTo /D (section.3.1) >>
endobj
44 0 obj
(Traditional cipher modes and their shortcomings)
endobj
45 0 obj
<< /S /GoTo /D (section.3.2) >>
endobj
48 0 obj
(Modes for authentication)
endobj
49 0 obj
<< /S /GoTo /D (section.3.3) >>
endobj
52 0 obj
(Modes accepted for NIST consideration)
endobj
53 0 obj
<< /S /GoTo /D (section.3.4) >>
endobj
56 0 obj
(NIST: Authenticated Encryption modes)
endobj
57 0 obj
<< /S /GoTo /D (section.3.5) >>
endobj
60 0 obj
(NIST: Encryption modes)
endobj
61 0 obj
<< /S /GoTo /D (section.3.6) >>
endobj
64 0 obj
(SISWG)
endobj
65 0 obj
<< /S /GoTo /D (section.3.7) >>
endobj
68 0 obj
(NIST: Authentication modes)
endobj
69 0 obj
<< /S /GoTo /D (section.3.8) >>
endobj
72 0 obj
(Evaluating the modes for Hard Disk Encryption)
endobj
73 0 obj
<< /S /GoTo /D (section.3.9) >>
endobj
76 0 obj
(Summary of Cipher Modes)
endobj
77 0 obj
<< /S /GoTo /D (section.3.10) >>
endobj
80 0 obj
(Implementation Guide)
endobj
81 0 obj
<< /S /GoTo /D (chapter.4) >>
endobj
84 0 obj
(CBC attacks)
endobj
85 0 obj
<< /S /GoTo /D (section.4.1) >>
endobj
88 0 obj
(Initialisation Vector Modes)
endobj
89 0 obj
<< /S /GoTo /D (section.4.2) >>
endobj
92 0 obj
(Content leak attack)
endobj
93 0 obj
<< /S /GoTo /D (section.4.3) >>
endobj
96 0 obj
(Watermarking)
endobj
97 0 obj
<< /S /GoTo /D (section.4.4) >>
endobj
100 0 obj
(Data modification leak)
endobj
101 0 obj
<< /S /GoTo /D (section.4.5) >>
endobj
104 0 obj
(Malleability)
endobj
105 0 obj
<< /S /GoTo /D (section.4.6) >>
endobj
108 0 obj
(Movable cipher blocks)
endobj
109 0 obj
<< /S /GoTo /D (section.4.7) >>
endobj
112 0 obj
(Threat models)
endobj
113 0 obj
<< /S /GoTo /D (chapter.5) >>
endobj
116 0 obj
(Password management)
endobj
117 0 obj
<< /S /GoTo /D (section.5.1) >>
endobj
120 0 obj
(Key hierarchies for passwords)
endobj
121 0 obj
<< /S /GoTo /D (section.5.2) >>
endobj
124 0 obj
(Anti-forensic data storage)
endobj
125 0 obj
<< /S /GoTo /D (section.5.3) >>
endobj
128 0 obj
(Passwords from entropy weak sources)
endobj
129 0 obj
<< /S /GoTo /D (section.5.4) >>
endobj
132 0 obj
(TKS1: Template Key Setup 1)
endobj
133 0 obj
<< /S /GoTo /D (chapter.6) >>
endobj
136 0 obj
(A tour of LUKS: Linux Unified Key Setup)
endobj
137 0 obj
<< /S /GoTo /D (section.6.1) >>
endobj
140 0 obj
(Disk layout)
endobj
141 0 obj
<< /S /GoTo /D (section.6.2) >>
endobj
144 0 obj
(Semantics)
endobj
145 0 obj
<< /S /GoTo /D (section.6.3) >>
endobj
148 0 obj
(LUKS for dm-crypt)
endobj
149 0 obj
<< /S /GoTo /D (appendix.A) >>
endobj
152 0 obj
(Mathematical supplements)
endobj
153 0 obj
<< /S /GoTo /D (section*.29) >>
endobj
156 0 obj
(Bibliography)
endobj
157 0 obj
<< /S /GoTo /D [158 0 R /Fit ] >>
endobj
160 0 obj <<
/Length 474
/Filter /FlateDecode
>>
stream
xڅRMo�0���ё��؉?$��-T�S��J�ID�Y僪���x�n��43��yo`?` A8g=�`�T�d�~#Y���
���;��_���*)$w�M��ŤD??���|�6o��eP]Ūݳ�҂��{�-