Table of Contents
Preface
Introduction
Why Did We Write This Book?
Part 1. Essentials of Cryptography
-
Introduction
Chapter 1: Cryptography Techniques
-
Introduction
-
Key Length
-
Key Management
-
Algorithmic Principles
-
Usage
Chapter 2: Cryptography Protocols
-
Introduction
-
Basic Components of Cryptographic Protocols
-
Security Applications of Cryptographic Protocols
-
Categories of Cryptographic Protocols
Chapter 3: Algorithms and Modes
-
Introduction
-
Behind the Scene Mathematics
-
Block Ciphers
-
Stream Ciphers
-
One-Way Hash Functions
-
Public-Key Algorithms
-
Symmetric Key Distribution using Symmetric Encryption
-
Symmetric Key Distribution using Asymmetric Encryption
-
Distribution of Public Keys
-
X.509 Certificates
-
Public-Key Infrastructure (PKI)
-
Cryptographic Attacks
-
Key-Exchange Algorithms
-
Elliptic Curve Cryptography (ECC)
-
Digital Signatures With Encryption
-
Data Encryption Standard (DES)
-
Secure Hash Algorithm (SHA)
-
Message Digest Algorithms (MD5)
-
Rivest, Shamir, Adleman (RSA)
-
Zero-Knowledge Proofs
-
Elliptical Curve Digital Signature Algorithm (ECDSA)
-
Probabilistic Encryption
-
Quantum Cryptography
Part 2. Essentials of Blockchain
-
Introduction
-
What is Blockchain?
-
The Need for Decentralization
-
Demystifying Disintermediation Principles in Blockchain Architectures
Chapter 4: Introduction: Distributed Consensus & Consensus Mechanisms
-
Proof of Work (PoW)
-
Proof of Stake (PoS)
-
Proof of Elapsed Time (PoET)
-
Byzantine Fault Tolerance (BFT) and Variants
-
Federated Byzantine Agreement
-
Ripple Consensus Protocol Algorithm
-
Stellar Consensus Protocol
-
Delegated Proof of Stake (DPoS)
Chapter 5: Types of Blockchain
-
Public Blockchain
-
Private Blockchain
-
Federated or Permissioned Blockchain
Chapter 6: Key Considerations for Blockchain Implementations
-
Scalability
-
Interoperability
-
Sustainability
-
Contracts
-
Currency
-
Application
Chapter 7 : Strategic Roadmap for Digital Enterprise Adoption
-
Convergence of Principles
-
Legacy of Cypherpunks
-
Digital Enterprise Use Cases
-
Digital Transformation Perspective
-
Decentralized Operating Models
-
Prominent Trust Patterns
-
Major Challenges and Constraints
Chapter 8: Blockchain – The New Generation Tool for Cybersecurity
-
Blockchain with Turin Complete State Machine
-
Private and Consortium/Permissioned Blockchains
-
Overview of Security Tools in Blockchain
-
Vulnerabilities in Blockchain Security
-
Challenges to the Growth of Blockchain Eco-system
Part 3: The Superimposition of Blockchain and Cybersecurity
Chapter 9: Cyberattack Prevention Strategies
-
Evolution of Security
-
Endpoint Detection and Response (EDR)
-
Deception Technology
-
Cyberthreat Intelligence (CTI)
-
Deploying Blockchain-based DDoS
Chapter 10: Blockchain-based Security Mechanisms
-
Blockchain-based DNS Alternatives
-
Public Key Cryptography
-
PKI Components and Functions
-
Decentralizing the PKI System
-
Deploying Blockchain-based PKI Identity Mechanisms
-
Multi-Factor Authentication with Blockchain
-
Blockchain-based Interaction Model for Security
Chapter 11: Threats for Blockchain systems
-
Cyberthreats with Public and Permissioned Blockchains
-
Major Potential Attacks on Blockchain Networks
Chapter 12: Practical Implementations and Use Cases
-
IBM ADEPT Platform
-
Digital Identity as a Distributed Data Structure
-
Cyber-liability Management: A Connected Car Use Case
-
A Smart Home Security Implementation Use Case
Chapter 13: Security in Popular Public Blockchain Networks
-
Project in Discussion: Corda
-
Point-to-Point TLS-encrypted Communications
-
Security using Notary Trust
-
Pluggable Consensus Mechanism
Chapter 14: Cryptography as a Digital Labor for the Integration of Distributed Finance
-
New Generation Payment Infrastructure Powering Secure Global Finance
-
Libra
-
JP Money
-
Ripple
-
Stellar Lumens
Part 4: Standards and Frameworks
Chapter 15: ISO 27001
-
ISO 27001
-
Introduction
-
Scope
-
Terms and Definitions
-
Structure
-
Information Security Policies
-
Organization of Information Security
-
Human Resource Security
-
Asset Management
-
Access Control
-
Cryptography
-
Physical and Environmental Security
-
Operations Security
-
Communications Security
-
Supplier Relationships
-
Information Security Incident Management
-
Implementation of ISO 27001 in Organizations
Chapter 16:
-
NIST
-
Introduction to NIST and HIPAA
-
HIPAA Security Rule
-
NIST and its role in Information Security
-
A Framework for Managing Risk
-
HIPAA Risk Assessment Requirements
Part 5: Smart Contract Security, Auditing and Testing in Blockchain
Chapter 17: Smart Contract Auditing
-
Why is a Security Audit Necessary
-
Types of Smart Contracts
-
Smart Contract Vulnerabilities and Known Attacks
-
Ownership Attack
-
Re-entrancy Attack
-
Underflow and Overflow Attacks
-
Short Address Attack
-
Storage Injection Vulnerability
-
Risks in ICO Crowdfunding Smart Contracts
-
An Ideal Audit Process
Chapter 18: Testing in Blockchain
-
Blockchain Attacks
-
Network Attacks
-
User Wallet Attacks
-
Transaction Verification Mechanism Attacks
-
Mining Pool Attacks
-
Security Testing Phases in Blockchain
-
Testing Framework
-
Quality Issues in Blockchain
-
Practices and Governing Mechanisms
-
Popular Tools for Testing
Part 6: Blockchain Power Automation for Industry 4.0
Chapter 19: Risks posed by the ‘Smart’ Economy Paradigms
-
Zigbee Chain Reaction Attack
-
Controlling Drones through Blockchain for Security & Auditing
-
Securing Robots through Blockchain
-
Secured Access and Management of Automobiles using Blockchain
Chapter 20: Summary & Conclusion:
A Safer and Secure World with Blockchain-based Solutions