Bibliographic record and links to related information available from the Library of Congress catalog.
Note: Contents data are machine generated based on pre-publication provided by the publisher. Contents may have variations from the printed book or be incomplete or contain other coding.
Table of Contents I used in the document Word styling and formating, Heading 1 to 6. Heading 1 is used for the chapter number, so figures and formulas numeration are controlled by Heading 1. Foreword Preface Acknowledgments CHAPTER 1: CLASSIC CRYPTOGRAPHY Introduction Classic Cipher Techniques Early Cipher Machines The Vernam Cipher The Rotor Crypto Machines Cryptanalysis in World War II Summary Learning Objectives Review CHAPTER 2: INFORMATION ASSURANCE Introduction Computer Network Architecture The OSI Model The TCP/IP Model Security Policies, Services, and Mechanisms Placeholder Names Used in Cryptography The Transformation of the Crypto Industry US Export Regulations for Encryption Equipment Summary Learning Objectives Review CHAPTER 3: NUMBER THEORY AND FINITE FIELDS Introduction Principle of Counting The Euclidean Algorithm Congruence Arithmetic Summary of Properties Calculation of the Reciprocal (Multiplicative Inverse) Multiplication and Exponentiation in Modulo p Finite Fields Boolean Binary Expressions Summary Learning Objectives Review CHAPTER 4: CONFIDENTIALITY ¿ SYMMETRIC ENCRYPTION Introduction Crypto Systems Stream Cipher Symmetric Encryption Basic Theory of Enciphering Perfect Secrecy Shift Registers Block Encryption Algorithms Data Encryption Standard (DES) Advanced Encryption Standard (AES) Block Cipher Modes of Operation Summary Learning Objectives Review CHAPTER 5: CONFIDENTIALITY ¿ ASYMMETRIC ENCRYPTION Introduction Exponentiation and Public-Key Ciphers Key Management Security Services and Public-Key Encryption Combining Asymmetric and Symmetric Ciphers Variation of ElGamal System Summary Learning Objectives Review CHAPTER 6: INTEGRITY AND AUTHENTICATION Introduction Message Authentication Code (MAC) Hash Functions Secure Hash Standard MD5 Message Digest Algorithm Keyed-Hash Message Authentication Code (HMAC) Authentication (Digital Signatures) Digital Signature Standard (FIPS 186-2) Summary Learning Objectives Review CHAPTER 7: ACCESS AUTHENTICATION Introduction Authentication Concepts IEEE 802.1X Authentication Extensible Authentication Protocol (EAP) EAP Password Mechanisms Other Password Mechanisms Password Security Considerations EAP Authentication Servers Remote Authentication Dial-in User Service (RADIUS) Needham and Schroeder Kerberos ITU-T X.509 ¿ Authentication Framework Hash, and Encryption Recommendations Summary Learning Objectives Review CHAPTER 8: ELLIPTIC CURVE CRYPTOGRAPHY Introduction Finite Fields Elliptic Curves and Points Selecting an Elliptic Curve and G, the Generator Point Elliptic Curve Domain Parameters Cryptography Using Elliptic Curves EC Cipher Suites Summary Learning Objectives Review CHAPTER 9: CERTIFICATES AND PUBLIC KEY INFRASTRUCTURE Introduction X.509 Basic Certificate Fields RSA Certification Cylink (Seek) Certification Cylink Certification Based on ElGamal Variation of ElGamal Certification Public Key Infrastructure (PKI) PKI Management Model Certificate Life-Cycle PKI Management Operations CRL Basic Fields CA Trust Models Encryption Algorithms Supported in PKI Private Key Proof of Possession (POP) Two Models for PKI Deployment Summary Learning Objectives Review CHAPTER 10: ELECTRONIC MAIL SECURITY Introduction Pretty Good Privacy (PGP) PGP Email Compatibility Key Rings PGP Digital Certificates Establishment of Trust Secure MIME (S/MIME) S/MIME Message Formats Creating a Signed-only Message Creating an Enveloped-Only Message Signed and Enveloped MIME Entities Summary Learning Objectives Review CHAPTER 11: VPNS AND IPSEC Introduction VPN Services IPsec Security Associations Security Protocols Algorithms for Encryption and Authentication in IPsec Internet Key Exchange (IKE v2) IPsec and IKE v2 Identifiers Summary Learning Objectives Review CHAPTER 12: TLS, SSL, AND SET Introduction Transport Layer Security (TLS) TLS Architecture TLS Record Protocol Handshake Protocol Alert Message Protocol Change Cipher Spec Protocol Application Protocol SSL VPN Secure Electronic Transaction Protocol (SET) Summary Learning Objectives Review CHAPTER 13: WEB SERVICES SECURITY Web Services Extensible Markup Language, XML Simple Object Access Protocol (SOAP) Universal Discovery, Description, and Integration, UDDI Web Services Description Language, WSDL Web Services Security XML Security XML Encryption XML Signature XML Key Management Specification Security Assertion Markup Language (SAML) Web Services Security Language (WS-Security) Summary Learning Objectives Review CHAPTER 14: WIRELESS SECURITY Introduction WIMAX WIMAX (IEEE 802.16e) Security Wi-Fi IEE802.11 Wireless LAN 802.11i ¿ WLAN Security Enhancement Wi-Fi Protected Access (WPA or WPA1) and WPA2 Bluetooth Summary Learning Objectives Review GLOSSARY OF SECURITY TERMS Index
Library of Congress Subject Headings for this publication:
Computers -- Access control.
Data encryption (Computer science).