Table of contents for Cryptography and security services : mechanisms and applications / Manuel Mogollon.

Bibliographic record and links to related information available from the Library of Congress catalog.

Note: Contents data are machine generated based on pre-publication provided by the publisher. Contents may have variations from the printed book or be incomplete or contain other coding.


Counter
Table of Contents
I used in the document Word styling and formating, Heading 1 to 6. Heading 1 is used for the chapter number, so figures and formulas numeration are controlled by Heading 1. 
Foreword
Preface
Acknowledgments
CHAPTER 1: CLASSIC CRYPTOGRAPHY
	Introduction
	Classic Cipher Techniques
	Early Cipher Machines
	The Vernam Cipher
	The Rotor Crypto Machines
	Cryptanalysis in World War II
	Summary
	Learning Objectives Review
CHAPTER 2: INFORMATION ASSURANCE
	Introduction
	Computer Network Architecture
	The OSI Model
	The TCP/IP Model
	Security Policies, Services, and Mechanisms
	Placeholder Names Used in Cryptography
	The Transformation of the Crypto Industry
	US Export Regulations for Encryption Equipment
	Summary
	Learning Objectives Review
CHAPTER 3: NUMBER THEORY AND FINITE FIELDS
	Introduction
	Principle of Counting
	The Euclidean Algorithm
	Congruence Arithmetic
	Summary of Properties
	Calculation of the Reciprocal (Multiplicative Inverse)
	Multiplication and Exponentiation in Modulo p
	Finite Fields
	Boolean Binary Expressions
	Summary
	Learning Objectives Review
CHAPTER 4: CONFIDENTIALITY ¿ SYMMETRIC ENCRYPTION
	Introduction
	Crypto Systems
	Stream Cipher Symmetric Encryption
	Basic Theory of Enciphering
	Perfect Secrecy
	Shift Registers
	Block Encryption Algorithms
	Data Encryption Standard (DES)
	Advanced Encryption Standard (AES)
	Block Cipher Modes of Operation
	Summary
	Learning Objectives Review
CHAPTER 5: CONFIDENTIALITY ¿ ASYMMETRIC ENCRYPTION
	Introduction
	Exponentiation and Public-Key Ciphers
	Key Management
	Security Services and Public-Key Encryption
	Combining Asymmetric and Symmetric Ciphers
	Variation of ElGamal System
	Summary
	Learning Objectives Review
CHAPTER 6: INTEGRITY AND AUTHENTICATION
	Introduction
	Message Authentication Code (MAC)
	Hash Functions
	Secure Hash Standard
	MD5 Message Digest Algorithm
	Keyed-Hash Message Authentication Code (HMAC)
	Authentication (Digital Signatures)
	Digital Signature Standard (FIPS 186-2)
	Summary
	Learning Objectives Review
CHAPTER 7: ACCESS AUTHENTICATION
	Introduction
	Authentication Concepts
	IEEE 802.1X Authentication
	Extensible Authentication Protocol (EAP)
	EAP Password Mechanisms
	Other Password Mechanisms
	Password Security Considerations
	EAP Authentication Servers
	Remote Authentication Dial-in User Service (RADIUS)
	Needham and Schroeder
	Kerberos
	ITU-T X.509 ¿ Authentication Framework
	Hash, and Encryption Recommendations
	Summary
	Learning Objectives Review
CHAPTER 8: ELLIPTIC CURVE CRYPTOGRAPHY
	Introduction
	Finite Fields
	Elliptic Curves and Points
	Selecting an Elliptic Curve and G, the Generator Point
	Elliptic Curve Domain Parameters
	Cryptography Using Elliptic Curves
	EC Cipher Suites
	Summary
	Learning Objectives Review
CHAPTER 9: CERTIFICATES AND PUBLIC KEY INFRASTRUCTURE
	Introduction
	X.509 Basic Certificate Fields
	RSA Certification
	Cylink (Seek) Certification
	Cylink Certification Based on ElGamal
	Variation of ElGamal Certification
	Public Key Infrastructure (PKI)
	PKI Management Model
	Certificate Life-Cycle
	PKI Management Operations
	CRL Basic Fields
	CA Trust Models
	Encryption Algorithms Supported in PKI
	Private Key Proof of Possession (POP)
	Two Models for PKI Deployment
	Summary
	Learning Objectives Review
CHAPTER 10: ELECTRONIC MAIL SECURITY
	Introduction
	Pretty Good Privacy (PGP)
	PGP Email Compatibility
	Key Rings
	PGP Digital Certificates
	Establishment of Trust
	Secure MIME (S/MIME)
	S/MIME Message Formats
	Creating a Signed-only Message
	Creating an Enveloped-Only Message
	Signed and Enveloped MIME Entities
	Summary
	Learning Objectives Review
CHAPTER 11: VPNS AND IPSEC
	Introduction
	VPN Services
	IPsec
	Security Associations
	Security Protocols
	Algorithms for Encryption and Authentication in IPsec
	Internet Key Exchange (IKE v2)
	IPsec and IKE v2 Identifiers
	Summary
	Learning Objectives Review
CHAPTER 12: TLS, SSL, AND SET
	Introduction
	Transport Layer Security (TLS)
	TLS Architecture
	TLS Record Protocol
	Handshake Protocol
	Alert Message Protocol
	Change Cipher Spec Protocol
	Application Protocol
	SSL VPN
	Secure Electronic Transaction Protocol (SET)
	Summary
	Learning Objectives Review
CHAPTER 13: WEB SERVICES SECURITY
	Web Services
	Extensible Markup Language, XML
	Simple Object Access Protocol (SOAP)
	Universal Discovery, Description, and Integration, UDDI
	Web Services Description Language, WSDL
	Web Services Security
	XML Security
	XML Encryption
	XML Signature
	XML Key Management Specification
	Security Assertion Markup Language (SAML)
	Web Services Security Language (WS-Security)
	Summary
	Learning Objectives Review
CHAPTER 14: WIRELESS SECURITY
	Introduction
	WIMAX
	WIMAX (IEEE 802.16e) Security
	Wi-Fi
	IEE802.11 Wireless LAN
	802.11i ¿ WLAN Security Enhancement
	Wi-Fi Protected Access (WPA or WPA1) and WPA2
	Bluetooth
	Summary
	Learning Objectives Review
GLOSSARY OF SECURITY TERMS
Index

Library of Congress Subject Headings for this publication:

Computers -- Access control.
Data encryption (Computer science).