Hugendubel.info - Die B2B Online-Buchhandlung 

Merkliste
Die Merkliste ist leer.
Bitte warten - die Druckansicht der Seite wird vorbereitet.
Der Druckdialog öffnet sich, sobald die Seite vollständig geladen wurde.
Sollte die Druckvorschau unvollständig sein, bitte schliessen und "Erneut drucken" wählen.

The New Era Of Exponential Encryption

- Beyond Cryptographic Routing with the Echo Protocol [Paperback]
BuchKartoniert, Paperback
232 Seiten
Englisch
Books on Demanderschienen am08.01.2019
In their book "Era of Exponential Encryption - Beyond Cryptographic Routing" the authors provide a vision that can demonstrate an increasing multiplication of options for encryption and decryption processes:Similar to a grain of rice that doubles exponentially in every field of a chessboard, more and more newer concepts and programming in the area of cryptography increase these manifolds: both, encryption and decryption, require more session-related and multiple keys, so that numerous options even exist for configuring hybrid encryption: with different keys and algorithms, symmetric and asymmetrical methods, or even modern multiple encryption, with that ciphertext is converted again and again to ciphertext.It will be analyzed how a handful of newer applications like e.g. Spot-On and GoldBug E-Mail Client & Crypto Chat Messenger and other open source software programming implement these encryption mechanisms.Renewing a key several times - within the dedicated session with "cryptographic calling" - has forwarded the term of "perfect forward secrecy" to "instant perfect forward secrecy" (IPFS). But even more: if in advance a bunch of keys is sent, a decoding of a message has to consider not only one present session key, but over dozens of keys are sent - prior before the message arrives. The new paradigm of IPFS has already turned into the newer concept of these Fiasco Keys. Fiasco Keys are keys, which provide over a dozen possible ephemeral keys within one session and define Fiasco Forwarding, the approach which complements and follows IPFS.And further: by adding routing- and graph-theory to the encryption process, which is a constant part of the so called Echo Protocol, an encrypted packet might take different graphs and routes within the network. This shifts the current status to a new age: The Era of Exponential Encryption, so the vision and description of the authors. If routing does not require destination information but is replaced by cryptographic insights, then it is "beyond cryptographic routing". "Cryptographic Discovery" means: If the cryptographic token is matching, the message belongs to me. The Echo Protocol is in this regard an initial welcome within the Era of Exponential Encryption. The authors identify also four arms within the Era of Exponential Encryption and derive from these developments social, legal, political and economic recommendations.mehr

Produkt

KlappentextIn their book "Era of Exponential Encryption - Beyond Cryptographic Routing" the authors provide a vision that can demonstrate an increasing multiplication of options for encryption and decryption processes:Similar to a grain of rice that doubles exponentially in every field of a chessboard, more and more newer concepts and programming in the area of cryptography increase these manifolds: both, encryption and decryption, require more session-related and multiple keys, so that numerous options even exist for configuring hybrid encryption: with different keys and algorithms, symmetric and asymmetrical methods, or even modern multiple encryption, with that ciphertext is converted again and again to ciphertext.It will be analyzed how a handful of newer applications like e.g. Spot-On and GoldBug E-Mail Client & Crypto Chat Messenger and other open source software programming implement these encryption mechanisms.Renewing a key several times - within the dedicated session with "cryptographic calling" - has forwarded the term of "perfect forward secrecy" to "instant perfect forward secrecy" (IPFS). But even more: if in advance a bunch of keys is sent, a decoding of a message has to consider not only one present session key, but over dozens of keys are sent - prior before the message arrives. The new paradigm of IPFS has already turned into the newer concept of these Fiasco Keys. Fiasco Keys are keys, which provide over a dozen possible ephemeral keys within one session and define Fiasco Forwarding, the approach which complements and follows IPFS.And further: by adding routing- and graph-theory to the encryption process, which is a constant part of the so called Echo Protocol, an encrypted packet might take different graphs and routes within the network. This shifts the current status to a new age: The Era of Exponential Encryption, so the vision and description of the authors. If routing does not require destination information but is replaced by cryptographic insights, then it is "beyond cryptographic routing". "Cryptographic Discovery" means: If the cryptographic token is matching, the message belongs to me. The Echo Protocol is in this regard an initial welcome within the Era of Exponential Encryption. The authors identify also four arms within the Era of Exponential Encryption and derive from these developments social, legal, political and economic recommendations.
Details
ISBN/GTIN978-3-7481-5886-8
ProduktartBuch
EinbandartKartoniert, Paperback
Erscheinungsjahr2019
Erscheinungsdatum08.01.2019
Seiten232 Seiten
SpracheEnglisch
MasseBreite 148 mm, Höhe 210 mm, Dicke 15 mm
Gewicht342 g
Artikel-Nr.46123743

Autor

Mele Gasakis:Mele Gasakis is author of the book "Beyond Cryptographic Routing: The Echo Protocol in the Era of Exponential Encryption".Max Schmidt:Max Schmidt is author of the book "Beyond Cryptographic Routing: The Echo Protocol in the Era of Exponential Encryption".