Trends in Data Protection and Encryption Technologies.

Saved in:
Bibliographic Details
:
TeilnehmendeR:
Place / Publishing House:Cham : : Springer,, 2023.
©2023.
Year of Publication:2023
Edition:1st ed.
Language:English
Online Access:
Physical Description:1 online resource (255 pages)
Tags: Add Tag
No Tags, Be the first to tag this record!
Table of Contents:
  • Intro
  • Foreword by Quentin Ladetto
  • Foreword by Florian Schütz
  • Preface
  • Acknowledgements
  • Contents
  • List of Contributors
  • Part I Encryption Foundations
  • 1 One-Time Pad
  • 1.1 Introduction
  • 1.2 Analysis
  • 1.2.1 Definition
  • 1.2.2 Trends
  • 1.3 Consequences for Switzerland
  • 1.3.1 Implementation Possibilities
  • 1.4 Conclusion
  • References
  • 2 Symmetric Cryptography
  • 2.1 Introduction
  • 2.2 Analysis
  • 2.2.1 Definition
  • 2.2.2 Trends
  • 2.3 Consequences for Switzerland
  • 2.3.1 Implementation Possibilities
  • 2.4 Conclusion
  • References
  • 3 Asymmetric Encryption
  • 3.1 Introduction
  • 3.2 Analysis
  • 3.2.1 Definition
  • 3.2.2 Trends
  • 3.3 Consequences for Switzerland
  • 3.3.1 Implementation Possibilities: Make or Buy
  • 3.3.2 Variation and Recommendation
  • 3.4 Conclusion
  • References
  • 4 Key Management
  • 4.1 Introduction
  • 4.2 Analysis
  • 4.2.1 Definition
  • 4.2.1.1 Key Creation
  • 4.2.1.2 Key Storage
  • 4.2.1.3 Key Distribution
  • 4.2.1.4 Key Usage
  • 4.2.2 Trends
  • 4.3 Consequences for Switzerland
  • 4.3.1 Implementation Possibilities: Make or Buy
  • 4.3.2 Variations and Recommendation
  • 4.4 Conclusion
  • References
  • 5 Hash Functions
  • 5.1 Introduction
  • 5.2 Analysis
  • 5.2.1 Definition
  • 5.2.2 Trends
  • 5.3 Consequences for Switzerland
  • 5.3.1 Implementation Possibilities
  • 5.4 Conclusion
  • References
  • 6 Zero-Knowledge Proof
  • 6.1 Introduction
  • 6.2 Analysis
  • 6.2.1 Definition
  • 6.2.2 Trends
  • 6.3 Consequences for Switzerland
  • 6.3.1 Public Sector
  • 6.3.2 Private Sector
  • 6.3.3 Civil Society
  • 6.3.4 Implementation Possibilities: Make or Buy
  • 6.3.5 Variation and Recommendation
  • 6.4 Conclusion
  • References
  • 7 Random Number Generator
  • 7.1 Introduction
  • 7.2 Analysis
  • 7.2.1 Definition
  • 7.2.2 Trends
  • 7.3 Consequences for Switzerland.
  • 7.3.1 Implementation Possibilities: Make or Buy
  • 7.3.2 Variation and Recommendation
  • 7.4 Conclusion
  • References
  • 8 Homomorphic Encryption
  • 8.1 Introduction
  • 8.2 Definition and Analysis
  • 8.2.1 Trends
  • 8.3 Consequences for Switzerland
  • 8.3.1 Implementation Possibilities: Make or Buy
  • 8.3.2 Variations and Recommendation
  • 8.4 Conclusion
  • References
  • 9 Quantum Key Distribution
  • 9.1 Introduction
  • 9.2 Analysis
  • 9.2.1 Definition
  • 9.2.2 Trends
  • 9.3 Consequences for Switzerland
  • 9.3.1 Implementation Possibilities: Make or Buy
  • 9.3.2 Variations and Recommendation
  • 9.4 Conclusion
  • References
  • 10 Post-quantum Cryptography
  • 10.1 Introduction
  • 10.2 Analysis
  • 10.2.1 Definition
  • 10.2.2 Trends
  • 10.3 Consequences for Switzerland
  • 10.3.1 Implementation Possibilities: Make or Buy
  • 10.3.2 Variations and Recommendation
  • 10.4 Conclusion
  • References
  • Part II Low-Level Applications
  • 11 Functional Encryption
  • 11.1 Introduction
  • 11.2 Analysis
  • 11.2.1 Definition
  • 11.2.2 Trends
  • 11.3 Consequences for Switzerland
  • 11.3.1 Implementation Possibilities: Make or Buy
  • 11.3.2 Variations and Recommendation
  • 11.4 Conclusion
  • References
  • 12 Identity-Based Cryptography
  • 12.1 Introduction
  • 12.2 Analysis
  • 12.2.1 Definition
  • 12.2.2 Trends
  • 12.3 Consequences for Switzerland
  • 12.3.1 Implementation Possibilities: Make or Buy
  • 12.3.2 Variations and Recommendation
  • 12.4 Conclusion
  • References
  • 13 Multi-Party Threshold Cryptography
  • 13.1 Introduction
  • 13.2 Analysis
  • 13.2.1 Definition
  • 13.2.2 Trends
  • 13.3 Consequences for Switzerland
  • 13.3.1 Implementation Possibilities: Make or Buy
  • 13.3.2 Variations and Recommendation
  • 13.4 Conclusion
  • References
  • 14 Searchable Symmetric Encryption
  • 14.1 Introduction
  • 14.2 Analysis
  • 14.2.1 Definition
  • 14.2.2 Trends.
  • 14.3 Consequences for Switzerland
  • 14.3.1 Implementation Possibilities: Make or Buy
  • 14.3.2 Variations and Recommendation
  • 14.4 Conclusion
  • References
  • 15 Digital Signature
  • 15.1 Introduction
  • 15.2 Analysis
  • 15.2.1 Definition
  • 15.2.2 Trends
  • 15.3 Consequences for Switzerland
  • 15.3.1 Implementation Possibilities: Make or Buy
  • 15.3.1.1 Distinction from Electronic Signature
  • 15.3.1.2 Code Signing
  • 15.4 Conclusion
  • References
  • 16 Hardware Security Module
  • 16.1 Introduction
  • 16.2 Analysis
  • 16.2.1 Definition
  • 16.2.2 Trends
  • 16.3 Consequences for Switzerland
  • 16.3.1 Maturity
  • 16.3.2 Recommendation and Options
  • 16.4 Conclusion
  • References
  • 17 Secure Multi-Party Computation
  • 17.1 Introduction
  • 17.2 Analysis
  • 17.2.1 Definition
  • 17.2.2 Trends
  • 17.3 Consequences for Switzerland
  • 17.3.1 Implementation Possibilities: Make or Buy
  • 17.3.2 Variations and Recommendation
  • 17.4 Conclusion
  • References
  • Part III High-Level Applications
  • 18 Trusted Execution Environment
  • 18.1 Introduction
  • 18.2 Analysis
  • 18.2.1 Definition
  • 18.2.2 Trends
  • 18.2.2.1 Application on Mobile Phones
  • 18.2.2.2 Security in Cloud Data Processing
  • 18.2.2.3 Data Protection Laws
  • 18.2.2.4 Cryptocurrency Usage
  • 18.2.2.5 Demand
  • 18.2.2.6 Actors
  • 18.2.2.7 Research
  • 18.3 Consequences for Switzerland
  • 18.3.1 Maturity
  • 18.3.1.1 Recommendations and Options
  • 18.4 Conclusion
  • References
  • 19 Confidential Computing
  • 19.1 Introduction
  • 19.2 Analysis
  • 19.2.1 Definition
  • 19.2.2 Trends
  • 19.3 Consequences for Switzerland
  • 19.3.1 Implementation Possibilities: Make or Buy
  • 19.4 Conclusion
  • References
  • 20 Hardware Acceleration
  • 20.1 Introduction
  • 20.2 Analysis
  • 20.2.1 Definition
  • 20.2.2 Trends
  • 20.3 Consequences for Switzerland
  • 20.3.1 Implementation Possibilities: Make or Buy.
  • 20.3.2 Variations and Recommendation
  • 20.4 Conclusion
  • References
  • 21 Secure Operating System
  • 21.1 Introduction
  • 21.2 Analysis
  • 21.2.1 Definition
  • 21.2.2 Trends
  • 21.3 Consequences for Switzerland
  • 21.3.1 Implementation Possibilities: Make or Buy
  • 21.4 Conclusion
  • References
  • 22 Biometrics
  • 22.1 Introduction
  • 22.2 Analysis
  • 22.2.1 Definition
  • 22.2.2 Trends
  • 22.3 Consequences for Switzerland
  • 22.3.1 Implementation Possibilities: Make or Buy
  • 22.3.2 Variation and Recommendation
  • 22.4 Conclusion
  • References
  • 23 Electronic Voting
  • 23.1 Introduction
  • 23.2 Analysis
  • 23.2.1 Definition
  • 23.2.2 Trends
  • 23.3 Consequences for Switzerland
  • 23.3.1 Implementation Possibilities: Make or Buy
  • 23.3.2 Variations and Recommendation
  • 23.4 Conclusion
  • References
  • 24 Data in Transit Security
  • 24.1 Introduction
  • 24.2 Analysis
  • 24.2.1 Definition
  • 24.2.2 Trends
  • 24.3 Consequences for Switzerland
  • 24.3.1 Implementation Possibilities: Make or Buy
  • 24.4 Conclusion
  • References
  • 25 Blockchain
  • 25.1 Introduction
  • 25.2 Analysis
  • 25.2.1 Definition
  • 25.2.2 Trends
  • 25.3 Consequences for Switzerland
  • 25.3.1 Implementation Possibilities: Make or Buy
  • 25.3.2 Use Cases
  • 25.4 Conclusion
  • References
  • 26 Tunneling and VPN
  • 26.1 Introduction
  • 26.2 Analysis
  • 26.2.1 Definition
  • 26.2.2 Trends
  • 26.3 Consequences for Switzerland
  • 26.3.1 Implementation Possibilities: Make or Buy
  • 26.3.2 Variation and Recommendation
  • 26.4 Conclusion
  • References
  • Part IV Data Protection
  • 27 Differential Privacy
  • 27.1 Introduction
  • 27.2 Analysis
  • 27.2.1 Definition
  • 27.2.2 Trends
  • 27.3 Consequences for Switzerland
  • 27.3.1 Implementation Possibilities: Make or Buy
  • 27.4 Conclusion
  • References
  • 28 Digital Rights Management
  • 28.1 Introduction
  • 28.2 Analysis
  • 28.2.1 Definition.
  • 28.2.2 Trends
  • 28.3 Consequences for Switzerland
  • 28.3.1 Implementation Possibilities: Make or Buy
  • 28.3.2 Variation and Recommendation
  • 28.4 Conclusion
  • References
  • 29 Authentication
  • 29.1 Introduction
  • 29.2 Analysis
  • 29.2.1 Definition
  • 29.2.2 Trends
  • 29.3 Consequences for Switzerland
  • 29.3.1 Implementation Possibilities: Make or Buy
  • 29.4 Conclusion
  • References
  • Part V Use-Cases
  • 30 Secure Media
  • 30.1 Introduction
  • 30.2 Analysis
  • 30.2.1 Definition
  • 30.2.2 Trends
  • 30.3 Consequences for Switzerland
  • 30.3.1 Implementation Possibilities: Make or Buy
  • 30.3.2 Variations and Recommendation
  • 30.4 Conclusion
  • References
  • 31 Secure Positioning and Localization
  • 31.1 Introduction
  • 31.2 Analysis
  • 31.2.1 Definition
  • 31.2.2 Trends
  • 31.3 Consequences for Switzerland
  • 31.3.1 Implementation Possibilities: Make or Buy
  • 31.3.2 Variations and Recommendation
  • 31.4 Conclusion
  • References
  • 32 Secure Payment
  • 32.1 Introduction
  • 32.2 Analysis
  • 32.2.1 Definition
  • 32.2.2 Trends
  • 32.3 Consequences for Switzerland
  • 32.3.1 Implementation Possibilities: Make or Buy
  • 32.3.2 Variation and Recommendation
  • 32.4 Conclusion
  • References
  • 33 Disk, File and Database Encryption
  • 33.1 Introduction
  • 33.2 Analysis
  • 33.3 Definition
  • 33.3.1 Full Disk Encryption (FDE)
  • 33.3.2 File-Based Encryption (FBE)
  • 33.3.3 Manual File Encryption
  • 33.3.4 Database Encryption (DBE)
  • 33.4 Security Considerations
  • 33.4.1 Encryption Algorithms
  • 33.4.2 Key Management
  • 33.4.3 Coercion
  • 33.5 OS Examples
  • 33.6 Trends
  • 33.7 Consequences for Switzerland
  • 33.8 Conclusion
  • References
  • 34 WEB3
  • 34.1 Introduction
  • 34.2 Analysis
  • 34.2.1 Definition
  • 34.2.2 Technologies
  • 34.2.3 Risks
  • 34.2.4 Trends
  • 34.3 Consequences for Switzerland
  • 34.3.1 Adoption and Efficacy
  • 34.4 Conclusion.
  • References.