Cryptography and Public Key Infrastructure on the Internet

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

Cryptography and Public Key Infrastructure on the Internet provides a thorough overview of the subject. It explains how susceptible networks are to hacking and how cryptography can help. This comprehensive and practical guide covers:
  • Public Key Infrastructures (PKIs); important when using cryptography in a large organisation,

  • the difference between the SSL protocol and the IPSec standard,

  • integration of cryptography into the different OSI-layers, and how to decide whether hardware or software solutions are the right means to achieve this.
The book also includes sections on::
  • standardisation
  • authentication
  • elliptic curve cryptography
  • chip cards
  • algorithm modes and protocols - including SSL, TLS, IPSec, SMIME and PGP protocols
  • cryptography's connection with biometry (using biological characteristics for authentication purposes).
Cryptography and Public Key Infrastructure on the Internet is an indispensable guide for all levels of reader. It contains valuable reference material about statutes and standards affecting encryption, which companies are active in the market, and a reference guide to people, organisations, books and websites to go to for further information.

Author(s): Klaus Schmeh
Publisher: Wiley
Year: 2003

Language: English
Pages: 490
City: Chichester, West Sussex, England
Tags: Информатика и вычислительная техника;Информационная безопасность;Криптология и криптография;

Cryptography and Public Key Infrastructure on the Internet......Page 3
Contents......Page 7
Foreword by Carl Ellison......Page 13
PART 1 WHY CRYPTOGRAPHY ON THE INTERNET?......Page 19
1.1 If the Internet were a car …......Page 21
1.2 Security on the Internet......Page 22
1.4 Why yet another cryptography book?......Page 24
1.5 My regrets, my requests and my thanks......Page 26
2.1 The name of the game......Page 27
2.2 Why is cryptography so important?......Page 31
2.3 Uses of cryptography......Page 33
2.4 And who the devil is Alice?......Page 34
2.5 Summary......Page 35
3 How is it possible to eavesdrop on the Internet?......Page 37
3.1 The structure of the Internet......Page 38
3.2 How is it possible to eavesdrop on the Internet?......Page 42
3.3 Some practical examples......Page 54
3.4 Summary......Page 56
PART 2 THE PRINCIPLES OF CRYPTOGRAPHY......Page 57
4 Symmetric encryption......Page 59
4.1 What is symmetric encryption?......Page 60
4.2 Elementary encryption methods......Page 64
4.3 Polyalphabetic ciphers......Page 67
4.4 The Enigma and other rotor cipher machines......Page 70
5.1 The Data Encryption Standard (DES)......Page 77
5.2 Other symmetrical ciphers......Page 85
5.3 AES......Page 93
6.1 The key exchange problem......Page 101
6.2 A little maths......Page 104
6.3 One-way functions and trapdoor functions......Page 110
6.4 The Diffie–Hellman key exchange......Page 111
6.5 RSA......Page 113
6.6 Other asymmetrical algorithms......Page 118
6.7 Hybrid algorithms......Page 119
6.8 Differences between public and secret key......Page 120
7.1 What is a digital signature?......Page 123
7.2 RSA as a signature algorithm......Page 124
7.3 Signatures based on the discrete logarithm......Page 125
7.4 Security of signature algorithms......Page 129
7.5 Differences between DLSSs and RSA......Page 130
7.6 Other signature algorithms......Page 131
8 Cryptographic hash functions......Page 133
8.1 What is a cryptographic hash function?......Page 134
8.2 The most important cryptographic hash functions......Page 141
8.3 Key-dependent hash functions......Page 146
8.4 Further applications......Page 147
9 Cryptographic random generators......Page 149
9.2 Random numbers in cryptography......Page 150
9.3 The most important pseudo-random generators......Page 154
9.4 Stream ciphers......Page 157
9.5 Prime number generators......Page 161
PART 3 ADVANCED CRYPTOGRAPHY......Page 163
10.1 Standards......Page 165
10.2 Standards in the real world......Page 167
10.4 PKCS standards......Page 168
10.5 IEEE P1363......Page 171
11.1 Block cipher modes of operation......Page 173
11.2 Data transformation for the RSA algorithm......Page 178
12.1 Protocols......Page 183
12.2 Protocol properties......Page 186
12.4 Attributes of cryptographic protocols......Page 188
12.5 Attacks on cryptographic protocols......Page 191
12.6 An example of a protocol: blind signatures......Page 195
12.7 Other protocols......Page 196
13.1 Authentication and identification......Page 197
13.2 Authentication procedures......Page 198
13.3 Biometric authentication......Page 201
13.4 Authentication on the Internet......Page 209
13.5 Kerberos......Page 215
13.6 RADIUS and TACACS......Page 217
13.7 Packaging of authentication mechanisms......Page 220
14.1 Mathematical principles......Page 223
14.2 Cryptosystems based on elliptic curves......Page 226
14.3 Examples and standards for ECCs......Page 227
15.1 Crypto hardware and software......Page 231
15.2 Smart cards......Page 233
15.3 Other crypto hardware......Page 238
15.4 Crypto software......Page 241
15.5 Universal crypto interfaces......Page 244
15.6 Real-world attacks......Page 247
15.7 Evaluation and certification......Page 251
PART 4 PUBLIC KEY INFRASTRUCTURES......Page 255
16.1 Trust models in public key cryptography......Page 257
16.2 Variants of hierarchical PKIs......Page 265
16.3 PKI standards......Page 267
17.1 Components of a PKI......Page 273
17.2 Certificate management......Page 278
17.3 Enrolment......Page 281
17.4 Certificate policy and CPS......Page 283
18 Digital certificates......Page 287
18.2 X.509v2 certificates......Page 288
18.3 PKCS#6 certificates......Page 289
18.4 X.509v3 certificates......Page 290
18.5 The PKIX and ISIS X.509v3 extensions......Page 293
18.6 Attribute certificates......Page 294
18.8 PGP certificates......Page 296
19.1 Directory service......Page 299
19.2 Certificate servers and directory services......Page 303
19.3 Requesting certificate revocation information......Page 304
20.1 The course of the construction of a PKI......Page 313
20.2 Basic questions about PKI construction......Page 314
20.3 The most important PKI suppliers......Page 318
PART 5 CRYPTO PROTOCOLS FOR THE INTERNET......Page 327
21.1 The OSI model......Page 329
21.2 In which layer can encryption be undertaken?......Page 333
22.1 Crypto extensions for ISDN (Layer 1)......Page 339
22.2 Cryptography in the GSM standard (Layer 1)......Page 341
22.3 Crypto extensions for PPP (Layer 2)......Page 343
22.4 Virtual private networks......Page 345
23.1 IPSec and IKE......Page 351
23.2 IPSec......Page 352
23.3 IKE......Page 354
23.4 SKIP......Page 357
23.5 Critical assessment of IPSec......Page 358
23.6 Virtual private networks with IPSec......Page 359
24 SSL, TLS and WTLS (Layer 4)......Page 361
24.1 SSL working method......Page 362
24.2 SSL protocol operation......Page 363
24.4 Technical comparison between IPSec and SSL......Page 365
24.5 WTLS......Page 366
25 Cryptographic standards for the World Wide Web (Layer 7)......Page 369
25.2 Digest Access Authentication......Page 370
25.3 HTTP on top of SSL (HTTPS)......Page 371
25.4 Digital signatures on the World Wide Web......Page 372
25.5 Sundries......Page 375
26.1 E-mails on the Internet......Page 377
26.2 PEM......Page 379
26.3 OpenPGP......Page 381
26.4 S/MIME......Page 383
26.5 Mailtrust......Page 385
26.6 Which standard is standard?......Page 387
26.7 Retrieving e-mails: POP and IMAP......Page 388
27.1 Internet payment systems in general......Page 391
27.2 Credit card systems......Page 392
27.3 Account systems......Page 396
27.4 Cash systems......Page 398
27.5 The payment system crisis......Page 402
28.1 Secure Shell (SecSH)......Page 403
28.2 SASL......Page 405
28.3 Crypto extensions for SNMP......Page 406
28.4 Online banking with HBCI......Page 407
28.5 Crypto extensions for SAP R/3......Page 409
PART 6 MORE ABOUT CRYPTOGRAPHY......Page 411
29 Political aspects of cryptography......Page 413
29.1 How governments control encryption......Page 414
29.2 The German signature law......Page 418
29.3 Cryptography and policy in the USA......Page 422
30.1 The ten most important people......Page 425
30.2 The ten most important companies......Page 431
30.3 The ten most important non-profit organisations......Page 435
31.1 The ten most important sources of information......Page 441
31.2 The ten most important cryptography books......Page 444
31.3 The ten most important Web sites......Page 448
32.1 The ten greatest crypto flops......Page 451
32.2 Ten indications of snake oil......Page 455
32.3 Ten examples of snake oil......Page 457
32.4 Ten popular crypto misapprehensions......Page 461
32.5 Murphy’s ten laws of cryptography......Page 463
Appendix A: List of abbreviations......Page 465
Appendix B: Bibliography......Page 471
Index......Page 481