3.4. Further Resources

Bruce Schneier has written a comprehensive book, that includes a wealth of information on various cryptographic concepts, methods, and their implementations [SCHNEIER].

Going through the mathematics in Schneier's book can however be tedious at times. Charlie Kaufman et al. have written a book on network security [KAUFMAN] that explains the mechanics of many security algorithms such as Message Digest (MD) and Data Encryption Standards (DES) in an algorithmic way. This book also explains Kerberos in a comprehensive manner.

More information about DH standards can be found in the document entitled "PKCS #3 Diffie-Hellman Key Agreement Standard" at RSA Security® web page: http://www.rsasecurity.com/rsalabs/pKcs/.

Edney and Arbaugh have written a book on 802.11 security [EDARB80211] explaining key management framework within 802.11 networks which can be used as an excellent material on real-life applications of EAP key management framework.

A good source of information on the progress of 802.11 WLAN (known as Wi-Fi in the business world), the reader can check the weekly news brief, called "Blue-Print Wi-Fi" at http://www.arcchart.com/. Unfortunately, this publication is not free. However, information on Wi-Fi Alliance can be found for free at Wi-Fi Alliance website [WIFIWEB].

For more information on EAP framework, IKE, and PKI, the reader is referred to Chapters 4, 9, and 10 of this book.

For more information on KINK and its applications in the packet cable industry, ...

Get AAA and Network Security for Mobile Access: Radius, Diameter, EAP, PKI and IP Mobility now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.