Preface
Introduction
Why Did We Write This Book?
Part 1. Essentials of Cryptography
  • Introduction
Chapter 1: Cryptography Techniques
  • Introduction
  • Key Length
  • Key Management
  • Algorithmic Principles
  • Usage
Chapter 2: Cryptography Protocols
  • Introduction
  • Basic Components of Cryptographic Protocols
  • Security Applications of Cryptographic Protocols
  • Categories of Cryptographic Protocols
Chapter 3: Algorithms and Modes
  • Introduction
  • Behind the Scene Mathematics
  • Block Ciphers
  • Stream Ciphers
  • One-Way Hash Functions
  • Public-Key Algorithms
  • Symmetric Key Distribution using Symmetric Encryption
  • Symmetric Key Distribution using Asymmetric Encryption
  • Distribution of Public Keys
  • X.509 Certificates
  • Public-Key Infrastructure (PKI)
  • Cryptographic Attacks
  • Key-Exchange Algorithms
  • Elliptic Curve Cryptography (ECC)
  • Digital Signatures With Encryption
  • Data Encryption Standard (DES)
  • Secure Hash Algorithm (SHA)
  • Message Digest Algorithms (MD5)
  • Rivest, Shamir, Adleman (RSA)
  • Zero-Knowledge Proofs
  • Elliptical Curve Digital Signature Algorithm (ECDSA)
  • Probabilistic Encryption
  • Quantum Cryptography
Part 2. Essentials of Blockchain
  • Introduction
  • What is Blockchain?
  • The Need for Decentralization
  • Demystifying Disintermediation Principles in Blockchain Architectures
Chapter 4: Introduction: Distributed Consensus & Consensus Mechanisms
  • Proof of Work (PoW)
  • Proof of Stake (PoS)
  • Proof of Elapsed Time (PoET)
  • Byzantine Fault Tolerance (BFT) and Variants
  • Federated Byzantine Agreement
  • Ripple Consensus Protocol Algorithm
  • Stellar Consensus Protocol
  • Delegated Proof of Stake (DPoS)
Chapter 5: Types of Blockchain
  • Public Blockchain
  • Private Blockchain
  • Federated or Permissioned Blockchain
Chapter 6: Key Considerations for Blockchain Implementations
  • Scalability
  • Interoperability
  • Sustainability
  • Contracts
  • Currency
  • Application
Chapter 7 : Strategic Roadmap for Digital Enterprise Adoption
  • Convergence of Principles
  • Legacy of Cypherpunks
  • Digital Enterprise Use Cases
  • Digital Transformation Perspective
  • Decentralized Operating Models
  • Prominent Trust Patterns
  • Major Challenges and Constraints
Chapter 8: Blockchain – The New Generation Tool for Cybersecurity
  • Blockchain with Turin Complete State Machine
  • Private and Consortium/Permissioned Blockchains 
  • Overview of Security Tools in Blockchain
  • Vulnerabilities in Blockchain Security
  • Challenges to the Growth of Blockchain Eco-system
Part 3: The Superimposition of Blockchain and Cybersecurity

Chapter 9: Cyberattack Prevention Strategies
  • Evolution of Security
  • Endpoint Detection and Response (EDR)
  • Deception Technology
  • Cyberthreat Intelligence (CTI)
  • Deploying Blockchain-based DDoS
Chapter 10: Blockchain-based Security Mechanisms
  • Blockchain-based DNS Alternatives
  • Public Key Cryptography
  • PKI Components and Functions
  • Decentralizing the PKI System
  • Deploying Blockchain-based PKI Identity Mechanisms
  • Multi-Factor Authentication with Blockchain
  • Blockchain-based Interaction Model for Security
Chapter 11: Threats for Blockchain systems
  • Cyberthreats with Public and Permissioned Blockchains
  • Major Potential Attacks on Blockchain Networks
Chapter 12: Practical Implementations and Use Cases
  • IBM ADEPT Platform
  • Digital Identity as a Distributed Data Structure
  • Cyber-liability Management: A Connected Car Use Case
  • A Smart Home Security Implementation Use Case
Chapter 13: Security in Popular Public Blockchain Networks
  • Project in Discussion: Corda
    • Point-to-Point TLS-encrypted Communications
    • Security using Notary Trust
    • Pluggable Consensus Mechanism
Chapter 14: Cryptography as a Digital Labor for the Integration of Distributed Finance
  • New Generation Payment Infrastructure Powering Secure Global Finance
    • Libra
    • JP Money
    • Ripple
    • Stellar Lumens
Part 4: Standards and Frameworks

Chapter 15: ISO 27001
  • ISO 27001
    • Introduction
    • Scope
    • Terms and Definitions
    • Structure
    • Information Security Policies
    • Organization of Information Security
    • Human Resource Security
    • Asset Management
    • Access Control
    • Cryptography
    • Physical and Environmental Security
    • Operations Security
    • Communications Security
    • Supplier Relationships
    • Information Security Incident Management
  • Implementation of ISO 27001 in Organizations
Chapter 16:
  • NIST
    • Introduction to NIST and HIPAA
    • HIPAA Security Rule
    • NIST and its role in Information Security
    • A Framework for Managing Risk
    • HIPAA Risk Assessment Requirements
Part 5: Smart Contract Security, Auditing and Testing in Blockchain

Chapter 17: Smart Contract Auditing
  • Why is a Security Audit Necessary
  • Types of Smart Contracts
  • Smart Contract Vulnerabilities and Known Attacks
    • Ownership Attack
    • Re-entrancy Attack
    • Underflow and Overflow Attacks
    • Short Address Attack
    • Storage Injection Vulnerability
  • Risks in ICO Crowdfunding Smart Contracts
  • An Ideal Audit Process
Chapter 18: Testing in Blockchain
  • Blockchain Attacks
    • Network Attacks
    • User Wallet Attacks
    • Transaction Verification Mechanism Attacks
    • Mining Pool Attacks
  • Security Testing Phases in Blockchain
  • Testing Framework
  • Quality Issues in Blockchain
  • Practices and Governing Mechanisms
  • Popular Tools for Testing
Part 6: Blockchain Power Automation for Industry 4.0
   Chapter 19: Risks posed by the ‘Smart’ Economy Paradigms 
  • Zigbee Chain Reaction Attack
  • Controlling Drones through Blockchain for Security & Auditing
  • Securing Robots through Blockchain
  • Secured Access and Management of Automobiles using Blockchain
 Chapter 20: Summary & Conclusion:
  A Safer and Secure World with Blockchain-based Solutions