VOOZH about

URL: https://clemens.endorphin.org/nmihde/nmihde-A4-ds.pdf


%PDF-1.4 5 0 obj << /S /GoTo /D (chapter*.1) >> endobj 8 0 obj (Preface) endobj 9 0 obj << /S /GoTo /D (chapter.1) >> endobj 12 0 obj (Introduction) endobj 13 0 obj << /S /GoTo /D (chapter.2) >> endobj 16 0 obj (Design ingredients) endobj 17 0 obj << /S /GoTo /D (section.2.1) >> endobj 20 0 obj (The many faces of n) endobj 21 0 obj << /S /GoTo /D (section.2.2) >> endobj 24 0 obj (Galois Field arithmetic) endobj 25 0 obj << /S /GoTo /D (section.2.3) >> endobj 28 0 obj (Algorithms for GF\(2\)) endobj 29 0 obj << /S /GoTo /D (section.2.4) >> endobj 32 0 obj (Sequences of multiplications in GF\(2\)) endobj 33 0 obj << /S /GoTo /D (section.2.5) >> endobj 36 0 obj (Gray Code) endobj 37 0 obj << /S /GoTo /D (chapter.3) >> endobj 40 0 obj (Cipher Modes) endobj 41 0 obj << /S /GoTo /D (section.3.1) >> endobj 44 0 obj (Traditional cipher modes and their shortcomings) endobj 45 0 obj << /S /GoTo /D (section.3.2) >> endobj 48 0 obj (Modes for authentication) endobj 49 0 obj << /S /GoTo /D (section.3.3) >> endobj 52 0 obj (Modes accepted for NIST consideration) endobj 53 0 obj << /S /GoTo /D (section.3.4) >> endobj 56 0 obj (NIST: Authenticated Encryption modes) endobj 57 0 obj << /S /GoTo /D (section.3.5) >> endobj 60 0 obj (NIST: Encryption modes) endobj 61 0 obj << /S /GoTo /D (section.3.6) >> endobj 64 0 obj (SISWG) endobj 65 0 obj << /S /GoTo /D (section.3.7) >> endobj 68 0 obj (NIST: Authentication modes) endobj 69 0 obj << /S /GoTo /D (section.3.8) >> endobj 72 0 obj (Evaluating the modes for Hard Disk Encryption) endobj 73 0 obj << /S /GoTo /D (section.3.9) >> endobj 76 0 obj (Summary of Cipher Modes) endobj 77 0 obj << /S /GoTo /D (section.3.10) >> endobj 80 0 obj (Implementation Guide) endobj 81 0 obj << /S /GoTo /D (chapter.4) >> endobj 84 0 obj (CBC attacks) endobj 85 0 obj << /S /GoTo /D (section.4.1) >> endobj 88 0 obj (Initialisation Vector Modes) endobj 89 0 obj << /S /GoTo /D (section.4.2) >> endobj 92 0 obj (Content leak attack) endobj 93 0 obj << /S /GoTo /D (section.4.3) >> endobj 96 0 obj (Watermarking) endobj 97 0 obj << /S /GoTo /D (section.4.4) >> endobj 100 0 obj (Data modification leak) endobj 101 0 obj << /S /GoTo /D (section.4.5) >> endobj 104 0 obj (Malleability) endobj 105 0 obj << /S /GoTo /D (section.4.6) >> endobj 108 0 obj (Movable cipher blocks) endobj 109 0 obj << /S /GoTo /D (section.4.7) >> endobj 112 0 obj (Threat models) endobj 113 0 obj << /S /GoTo /D (chapter.5) >> endobj 116 0 obj (Password management) endobj 117 0 obj << /S /GoTo /D (section.5.1) >> endobj 120 0 obj (Key hierarchies for passwords) endobj 121 0 obj << /S /GoTo /D (section.5.2) >> endobj 124 0 obj (Anti-forensic data storage) endobj 125 0 obj << /S /GoTo /D (section.5.3) >> endobj 128 0 obj (Passwords from entropy weak sources) endobj 129 0 obj << /S /GoTo /D (section.5.4) >> endobj 132 0 obj (TKS1: Template Key Setup 1) endobj 133 0 obj << /S /GoTo /D (chapter.6) >> endobj 136 0 obj (A tour of LUKS: Linux Unified Key Setup) endobj 137 0 obj << /S /GoTo /D (section.6.1) >> endobj 140 0 obj (Disk layout) endobj 141 0 obj << /S /GoTo /D (section.6.2) >> endobj 144 0 obj (Semantics) endobj 145 0 obj << /S /GoTo /D (section.6.3) >> endobj 148 0 obj (LUKS for dm-crypt) endobj 149 0 obj << /S /GoTo /D (appendix.A) >> endobj 152 0 obj (Mathematical supplements) endobj 153 0 obj << /S /GoTo /D (section*.29) >> endobj 156 0 obj (Bibliography) endobj 157 0 obj << /S /GoTo /D [158 0 R /Fit ] >> endobj 160 0 obj << /Length 474 /Filter /FlateDecode >> stream xڅRMo�0���ё��؉?$��-T�S��J�ID�Y僪���x�n��43��yo`?` A8g=�`�T�d�~#Y��� ���;��_���*)$w�M��ŤD??���|�6o��eP]Ūݳ�҂��{�-