Trends in Data Protection and Encryption Technologies.
Main Author: | |
---|---|
Other Authors: | , , |
Format: | eBook |
Language: | English |
Published: |
Cham :
Springer,
2023.
|
Edition: | 1st ed. |
Subjects: | |
Online Access: | Click to View |
Table of Contents:
- Intro
- Foreword by Quentin Ladetto
- Foreword by Florian Schütz
- Preface
- Acknowledgements
- Contents
- List of Contributors
- Part I Encryption Foundations
- 1 One-Time Pad
- 1.1 Introduction
- 1.2 Analysis
- 1.2.1 Definition
- 1.2.2 Trends
- 1.3 Consequences for Switzerland
- 1.3.1 Implementation Possibilities
- 1.4 Conclusion
- References
- 2 Symmetric Cryptography
- 2.1 Introduction
- 2.2 Analysis
- 2.2.1 Definition
- 2.2.2 Trends
- 2.3 Consequences for Switzerland
- 2.3.1 Implementation Possibilities
- 2.4 Conclusion
- References
- 3 Asymmetric Encryption
- 3.1 Introduction
- 3.2 Analysis
- 3.2.1 Definition
- 3.2.2 Trends
- 3.3 Consequences for Switzerland
- 3.3.1 Implementation Possibilities: Make or Buy
- 3.3.2 Variation and Recommendation
- 3.4 Conclusion
- References
- 4 Key Management
- 4.1 Introduction
- 4.2 Analysis
- 4.2.1 Definition
- 4.2.1.1 Key Creation
- 4.2.1.2 Key Storage
- 4.2.1.3 Key Distribution
- 4.2.1.4 Key Usage
- 4.2.2 Trends
- 4.3 Consequences for Switzerland
- 4.3.1 Implementation Possibilities: Make or Buy
- 4.3.2 Variations and Recommendation
- 4.4 Conclusion
- References
- 5 Hash Functions
- 5.1 Introduction
- 5.2 Analysis
- 5.2.1 Definition
- 5.2.2 Trends
- 5.3 Consequences for Switzerland
- 5.3.1 Implementation Possibilities
- 5.4 Conclusion
- References
- 6 Zero-Knowledge Proof
- 6.1 Introduction
- 6.2 Analysis
- 6.2.1 Definition
- 6.2.2 Trends
- 6.3 Consequences for Switzerland
- 6.3.1 Public Sector
- 6.3.2 Private Sector
- 6.3.3 Civil Society
- 6.3.4 Implementation Possibilities: Make or Buy
- 6.3.5 Variation and Recommendation
- 6.4 Conclusion
- References
- 7 Random Number Generator
- 7.1 Introduction
- 7.2 Analysis
- 7.2.1 Definition
- 7.2.2 Trends
- 7.3 Consequences for Switzerland.
- 7.3.1 Implementation Possibilities: Make or Buy
- 7.3.2 Variation and Recommendation
- 7.4 Conclusion
- References
- 8 Homomorphic Encryption
- 8.1 Introduction
- 8.2 Definition and Analysis
- 8.2.1 Trends
- 8.3 Consequences for Switzerland
- 8.3.1 Implementation Possibilities: Make or Buy
- 8.3.2 Variations and Recommendation
- 8.4 Conclusion
- References
- 9 Quantum Key Distribution
- 9.1 Introduction
- 9.2 Analysis
- 9.2.1 Definition
- 9.2.2 Trends
- 9.3 Consequences for Switzerland
- 9.3.1 Implementation Possibilities: Make or Buy
- 9.3.2 Variations and Recommendation
- 9.4 Conclusion
- References
- 10 Post-quantum Cryptography
- 10.1 Introduction
- 10.2 Analysis
- 10.2.1 Definition
- 10.2.2 Trends
- 10.3 Consequences for Switzerland
- 10.3.1 Implementation Possibilities: Make or Buy
- 10.3.2 Variations and Recommendation
- 10.4 Conclusion
- References
- Part II Low-Level Applications
- 11 Functional Encryption
- 11.1 Introduction
- 11.2 Analysis
- 11.2.1 Definition
- 11.2.2 Trends
- 11.3 Consequences for Switzerland
- 11.3.1 Implementation Possibilities: Make or Buy
- 11.3.2 Variations and Recommendation
- 11.4 Conclusion
- References
- 12 Identity-Based Cryptography
- 12.1 Introduction
- 12.2 Analysis
- 12.2.1 Definition
- 12.2.2 Trends
- 12.3 Consequences for Switzerland
- 12.3.1 Implementation Possibilities: Make or Buy
- 12.3.2 Variations and Recommendation
- 12.4 Conclusion
- References
- 13 Multi-Party Threshold Cryptography
- 13.1 Introduction
- 13.2 Analysis
- 13.2.1 Definition
- 13.2.2 Trends
- 13.3 Consequences for Switzerland
- 13.3.1 Implementation Possibilities: Make or Buy
- 13.3.2 Variations and Recommendation
- 13.4 Conclusion
- References
- 14 Searchable Symmetric Encryption
- 14.1 Introduction
- 14.2 Analysis
- 14.2.1 Definition
- 14.2.2 Trends.
- 14.3 Consequences for Switzerland
- 14.3.1 Implementation Possibilities: Make or Buy
- 14.3.2 Variations and Recommendation
- 14.4 Conclusion
- References
- 15 Digital Signature
- 15.1 Introduction
- 15.2 Analysis
- 15.2.1 Definition
- 15.2.2 Trends
- 15.3 Consequences for Switzerland
- 15.3.1 Implementation Possibilities: Make or Buy
- 15.3.1.1 Distinction from Electronic Signature
- 15.3.1.2 Code Signing
- 15.4 Conclusion
- References
- 16 Hardware Security Module
- 16.1 Introduction
- 16.2 Analysis
- 16.2.1 Definition
- 16.2.2 Trends
- 16.3 Consequences for Switzerland
- 16.3.1 Maturity
- 16.3.2 Recommendation and Options
- 16.4 Conclusion
- References
- 17 Secure Multi-Party Computation
- 17.1 Introduction
- 17.2 Analysis
- 17.2.1 Definition
- 17.2.2 Trends
- 17.3 Consequences for Switzerland
- 17.3.1 Implementation Possibilities: Make or Buy
- 17.3.2 Variations and Recommendation
- 17.4 Conclusion
- References
- Part III High-Level Applications
- 18 Trusted Execution Environment
- 18.1 Introduction
- 18.2 Analysis
- 18.2.1 Definition
- 18.2.2 Trends
- 18.2.2.1 Application on Mobile Phones
- 18.2.2.2 Security in Cloud Data Processing
- 18.2.2.3 Data Protection Laws
- 18.2.2.4 Cryptocurrency Usage
- 18.2.2.5 Demand
- 18.2.2.6 Actors
- 18.2.2.7 Research
- 18.3 Consequences for Switzerland
- 18.3.1 Maturity
- 18.3.1.1 Recommendations and Options
- 18.4 Conclusion
- References
- 19 Confidential Computing
- 19.1 Introduction
- 19.2 Analysis
- 19.2.1 Definition
- 19.2.2 Trends
- 19.3 Consequences for Switzerland
- 19.3.1 Implementation Possibilities: Make or Buy
- 19.4 Conclusion
- References
- 20 Hardware Acceleration
- 20.1 Introduction
- 20.2 Analysis
- 20.2.1 Definition
- 20.2.2 Trends
- 20.3 Consequences for Switzerland
- 20.3.1 Implementation Possibilities: Make or Buy.
- 20.3.2 Variations and Recommendation
- 20.4 Conclusion
- References
- 21 Secure Operating System
- 21.1 Introduction
- 21.2 Analysis
- 21.2.1 Definition
- 21.2.2 Trends
- 21.3 Consequences for Switzerland
- 21.3.1 Implementation Possibilities: Make or Buy
- 21.4 Conclusion
- References
- 22 Biometrics
- 22.1 Introduction
- 22.2 Analysis
- 22.2.1 Definition
- 22.2.2 Trends
- 22.3 Consequences for Switzerland
- 22.3.1 Implementation Possibilities: Make or Buy
- 22.3.2 Variation and Recommendation
- 22.4 Conclusion
- References
- 23 Electronic Voting
- 23.1 Introduction
- 23.2 Analysis
- 23.2.1 Definition
- 23.2.2 Trends
- 23.3 Consequences for Switzerland
- 23.3.1 Implementation Possibilities: Make or Buy
- 23.3.2 Variations and Recommendation
- 23.4 Conclusion
- References
- 24 Data in Transit Security
- 24.1 Introduction
- 24.2 Analysis
- 24.2.1 Definition
- 24.2.2 Trends
- 24.3 Consequences for Switzerland
- 24.3.1 Implementation Possibilities: Make or Buy
- 24.4 Conclusion
- References
- 25 Blockchain
- 25.1 Introduction
- 25.2 Analysis
- 25.2.1 Definition
- 25.2.2 Trends
- 25.3 Consequences for Switzerland
- 25.3.1 Implementation Possibilities: Make or Buy
- 25.3.2 Use Cases
- 25.4 Conclusion
- References
- 26 Tunneling and VPN
- 26.1 Introduction
- 26.2 Analysis
- 26.2.1 Definition
- 26.2.2 Trends
- 26.3 Consequences for Switzerland
- 26.3.1 Implementation Possibilities: Make or Buy
- 26.3.2 Variation and Recommendation
- 26.4 Conclusion
- References
- Part IV Data Protection
- 27 Differential Privacy
- 27.1 Introduction
- 27.2 Analysis
- 27.2.1 Definition
- 27.2.2 Trends
- 27.3 Consequences for Switzerland
- 27.3.1 Implementation Possibilities: Make or Buy
- 27.4 Conclusion
- References
- 28 Digital Rights Management
- 28.1 Introduction
- 28.2 Analysis
- 28.2.1 Definition.
- 28.2.2 Trends
- 28.3 Consequences for Switzerland
- 28.3.1 Implementation Possibilities: Make or Buy
- 28.3.2 Variation and Recommendation
- 28.4 Conclusion
- References
- 29 Authentication
- 29.1 Introduction
- 29.2 Analysis
- 29.2.1 Definition
- 29.2.2 Trends
- 29.3 Consequences for Switzerland
- 29.3.1 Implementation Possibilities: Make or Buy
- 29.4 Conclusion
- References
- Part V Use-Cases
- 30 Secure Media
- 30.1 Introduction
- 30.2 Analysis
- 30.2.1 Definition
- 30.2.2 Trends
- 30.3 Consequences for Switzerland
- 30.3.1 Implementation Possibilities: Make or Buy
- 30.3.2 Variations and Recommendation
- 30.4 Conclusion
- References
- 31 Secure Positioning and Localization
- 31.1 Introduction
- 31.2 Analysis
- 31.2.1 Definition
- 31.2.2 Trends
- 31.3 Consequences for Switzerland
- 31.3.1 Implementation Possibilities: Make or Buy
- 31.3.2 Variations and Recommendation
- 31.4 Conclusion
- References
- 32 Secure Payment
- 32.1 Introduction
- 32.2 Analysis
- 32.2.1 Definition
- 32.2.2 Trends
- 32.3 Consequences for Switzerland
- 32.3.1 Implementation Possibilities: Make or Buy
- 32.3.2 Variation and Recommendation
- 32.4 Conclusion
- References
- 33 Disk, File and Database Encryption
- 33.1 Introduction
- 33.2 Analysis
- 33.3 Definition
- 33.3.1 Full Disk Encryption (FDE)
- 33.3.2 File-Based Encryption (FBE)
- 33.3.3 Manual File Encryption
- 33.3.4 Database Encryption (DBE)
- 33.4 Security Considerations
- 33.4.1 Encryption Algorithms
- 33.4.2 Key Management
- 33.4.3 Coercion
- 33.5 OS Examples
- 33.6 Trends
- 33.7 Consequences for Switzerland
- 33.8 Conclusion
- References
- 34 WEB3
- 34.1 Introduction
- 34.2 Analysis
- 34.2.1 Definition
- 34.2.2 Technologies
- 34.2.3 Risks
- 34.2.4 Trends
- 34.3 Consequences for Switzerland
- 34.3.1 Adoption and Efficacy
- 34.4 Conclusion.
- References.