You are previewing Cryptography and Security Services: Mechanisms and applications.
O'Reilly logo
Cryptography and Security Services: Mechanisms and applications

Book Description

"Today's information technology and security networks demand increasingly complex algorithms and cryptographic systems. Individuals implementing security policies for their companies must utilize technical skill and information technology knowledge to implement these security mechanisms.

Cryptography and Security Devices: Mechanisms and Applications addresses cryptography from the perspective of the security services and mechanisms available to implement these services: discussing issues such as e-mail security, public-key architecture, virtual private networks, Web services security, wireless security, and the confidentiality and integrity of security services. This book provides scholars and practitioners in the field of information assurance working knowledge of fundamental encryption algorithms and systems supported in information technology and secure communication networks."

Table of Contents

  1. Copyright
  2. Foreword
  3. Preface
  4. Acknowledgment
  5. Classic Cryptography
    1. Classic Cryptography
    2. Objectives
    3. Introduction
    4. Classic Cipher Techniques
    5. Early Cipher Machines
    6. Cryptanalysis in World War II
    7. Summary
    8. Learning Objectives Review
    9. References
  6. Information Assurance
    1. Information Assurance
    2. Objectives
    3. Introduction
    4. Computer Network Architecture
    5. The OSI Model
    6. The TCP/IP Model
    7. Security Policies, Services, and Mechanisms
    8. Placeholder Names Used in Cryptography
    9. The Transformation of the Crypto Industry
    10. U.S. Export Regulations for Encryption Equipment
    11. Summary
    12. Learning Objectives Review
    13. References
  7. Number Theory and Finite Fields
    1. Number Theory and Finite Fields
    2. Objectives
    3. Introduction
    4. Principle of Counting
    5. Exponentiation and Prime Numbers
    6. The Euclidean Algorithm
    7. Congruence Arithmetic
    8. Summary of Properties
    9. Calculation of the Reciprocal (Multiplicative Inverse)
    10. Multiplication and Exponentiation in Modulo p
    11. RSA Algorithm
    12. Finite Fields
    13. Boolean Binary Expressions
    14. Summary
    15. Learning Objectives Review
    16. References
  8. Confidentiality: Symmetric Encryption
    1. Confidentiality: Symmetric Encryption
    2. Objectives
    3. Introduction
    4. Crypto Systems
    5. Stream Cipher Symmetric Encryption
    6. Basic Theory of Enciphering
    7. Perfect Secrecy
    8. Shift Registers
    9. Block Encryption Algorithms
    10. Block Cipher Modes of Operation
    11. Summary
    12. Learning Objectives Review
    13. References
  9. Confidentiality: Asymmetric Encryption
    1. Confidentiality: Asymmetric Encryption
    2. Objectives
    3. Introduction
    4. Exponentiation and Public-Key Ciphers
    5. Pohlig-Hellman Algorithm
    6. The RSA Algorithm
    7. ElGamal Algorithm
    8. Key Management
    9. Security Services and Public-Key Encryption
    10. Combining Asymmetric and Symmetric Ciphers
    11. The Diffie-Hellman Key Agreement System
    12. The Diffie-Hellman Key Agreement Method
    13. The RSA Key Transport System
    14. Variation of ElGamal System
    15. Summary
    16. Learning Objectives Review
    17. References
  10. Integrity and Authentication
    1. Integrity and Authentication
    2. Objectives
    3. Introduction
    4. Message Authentication Code (MAC)
    5. Hash Functions
    6. Secure Hash Standard
    7. Secure Hash Algorithm: SHA-1
    8. MD5 Message Digest Algorithm
    9. Keyed-Hash Message Authentication Code (HMAC)
    10. Authentication (Digital Signatures)
    11. Digital Signature Standard (FIPS 186-2)
    12. Digital Signature Algorithm (ANSI X9.30)
    13. RSA Digital Signature (ANSI X9.31)
    14. Elliptic Curve Digital Signature Algorithm (ANSI X9.62)
    15. ElGamal Digital Signature
    16. Summary
    17. Learning Objectives Review
    18. References
  11. Access Authentication
    1. Access Authentication
    2. Objectives
    3. Introduction
    4. Authentication Concepts
    5. IEEE 802.1X Authentication
    6. Extensible Authentication Protocol (EAP)
    7. Other Password Mechanisms
    8. Password Security Considerations
    9. EAP Authentication Servers
    10. Remote Authentication Dial-in User Service (RADIUS)
    11. Needham and Schroeder
    12. Kerberos
    13. ITU-X.509: Authentication Framework
    14. Hash and Encryption Recommendations
    15. Summary
    16. Learning Objectives Review
    17. References
  12. Elliptic Curve Cryptography
    1. Elliptic Curve Cryptography
    2. Objectives
    3. Introduction
    4. Finite Fields
    5. Elliptic Curves and Points
    6. Arithmetic in an Elliptic Curve Group over Fp
    7. Arithmetic in an Elliptic Curve Group over F2m
    8. Order of a Point
    9. Curve Order
    10. Selecting an Elliptic Curve and G, the Generator Point
    11. Elliptic Curve Domain Parameters
    12. Elliptic Curve Domain Parameters Over Fp
    13. Elliptic Curve Domain Parameters over F2m
    14. Cryptography Using Elliptic Curves
    15. Attacks on the Elliptic Curve Discrete Logarithm Problem (ECDLP)
    16. Public Key Systems Public Key Size Comparisons
    17. Software Implementations
    18. Key Pair Generation
    19. Enciphering and Deciphering a Message Using ElGamal
    20. ECDH Key Agreement
    21. ECDSA Signature Generation
    22. ECDSA Signature Verification
    23. EC Cipher Suites
    24. Summary
    25. Learning Objectives Review
    26. References
  13. Certificates and Public Key Infrastructure
    1. Certificates and Public Key Infrestructure
    2. Objectives
    3. Introduction
    4. X.509 Basic Certificate Fields
    5. RSA Certification
    6. Cylink (Seek) Certification
    7. Cylink Certification Based on ElGamal
    8. Variation of ElGamal Certification
    9. Public-Key Infrastructure (PKI)
    10. PKI Management Model
    11. PKI Management Requirements
    12. Certificate Life-Cycle
    13. PKI Management Operations
    14. CRL Basic Fields
    15. CA Trust Models
    16. Encryption Algorithms Supported in PKI
    17. Private Key Proof of Possession (POP)
    18. Two Models for PKI Deployment
    19. Summary
    20. Learning Objectives Review
    21. References
  14. Electronic Mail Security
    1. Electronic Mail Security
    2. Objectives
    3. Introduction
    4. Pretty Good Privacy (PGP)
    5. PGP E-Mail Compatibility
    6. RADIX-64: E-Mail Format Compatibility
    7. E-Mail Size Compatibility
    8. Key Rings
    9. PGP Digital Certificates
    10. Establishment of Trust
    11. Secure MIME (S/MIME)
    12. S/MIME Message Formats
    13. Creating a Signed-Only Message
    14. Creating an Enveloped-Only Message
    15. Signed and Enveloped MIME Entities
    16. Summary
    17. Learning Objectives Review
    18. References
  15. VPNS and IPSEC
    1. VPNS and IPSEC
    2. Objectives
    3. Introduction
    4. VPN Services
    5. IP Tunneling Mechanisms
    6. IPsec
    7. IPsec Architecture
    8. IPsec Protocols
    9. IPsec Negotiation
    10. Security Associations
    11. Security Protocols
    12. Authentication Header
    13. Encapsulating Security Protocol (ESP)
    14. AH and ESP Modes of Operation
    15. Algorithms for Encryption and Authentication in IPsec
    16. Internet Key Exchange (IKE v2)
    17. IKE Message Exchanges
    18. IKE_SA_INIT
    19. IKE_SA_AUTH
    20. CREATE_CHILD_SAs
    21. Informational Exchange in IKE
    22. Integrity and Authentication in IKE
    23. Diffie-Hellman Group Descriptors
    24. IPsec and IKE v2 Identifiers
    25. Summary
    26. Learning Objectives Review
    27. References
  16. TLS, SSL, and SET
    1. TLS, SSL, and SET
    2. Objectives
    3. Introduction
    4. Transport Layer Security (TLS)
    5. Handshake Protocol
    6. Alert Message Protocol
    7. Change Cipher Spec Protocol
    8. Application Protocol
    9. SSL VPN
    10. Secure Electronic Transaction Protocol (SET)
    11. Summary
    12. Learning Objectives Review
    13. References
  17. Web Services Security
    1. Web Services Security
    2. Objectives
    3. Web Services
    4. Extensible Markup Language, XML
    5. Simple Object Access Protocol (SOAP)
    6. Universal Discovery, Description, and Integration, UDDI
    7. Web Services Description Language, WSDL
    8. Web Services Security
    9. XML Security
    10. XML Encryption
    11. XML Signature
    12. XML Key Management Specification
    13. Security Assertion Markup Language (SAML)
    14. Web Services Security Language (WS-Security)
    15. Summary
    16. Learning Objectives Review
    17. References
  18. Wireless Security
    1. Wireless Security
    2. Objectives
    3. Introduction
    4. WIMAX
    5. WIMAX (IEEE 802.16e) Security
    6. Wi-Fi
    7. IEE802.11 Wireless LAN
    8. 802.11i: WLAN Security Enhancement
    9. Wi-Fi Protected Access (WPA or WPA1) and WPA2
    10. Bluetooth
    11. Summary
    12. Learning Objectives Review
    13. References
  19. Glossary of Terms
    1. A
    2. B
    3. C
    4. D
    5. E
    6. F
    7. H
    8. I
    9. K
    10. L
    11. M
    12. N
    13. O
    14. P
    15. R
    16. S
    17. T
    18. U
    19. V
    20. W
    21. X
    22. References
  20. About the Author
  21. Index