Network Security: Private Communication in a Public WorldPTR Prentice Hall, 1995 - 504 pagina's A comprehensive yet comprehensible and witty guide to the latest advances in computer network security protocols. In this book the authors go beyond documenting standards and technology; they contrast competing schemes, explain weaknesses and strengths, and describe common mistakes people make when intending to design secure systems.* examines the state of computer network security - what works, what doesnt, and why. * explains clearly the cryptographic algorithms on which most network data systems depend. * provides comprehensive descriptions of many authentication systems, including Kerberos, NetWare, Lotus Notes, DASS, and KryptoKnight. * offers a rigorous treatment of secure electronic mail standards, including PEM, PGP, and X.400. * describes classic security pitfalls and how to avoid them when designing protocols. |
Inhoudsopgave
Introduction to Cryptography | 39 |
Secret Key Cryptography | 57 |
4 | 74 |
Copyright | |
21 andere gedeelten niet getoond
Overige edities - Alles bekijken
Network Security: Private Communications in a Public World Mike Speciner,Radia Perlman,Charlie Kaufman Gedeeltelijke weergave - 2002 |
Veelvoorkomende woorden en zinsdelen
Alice and Bob Alice sends attack block Bob's public key byte Carol certificate checksum ciphertext Clipper chip compute cryptographic algorithms database decrypt Diffie-Hellman digits directory service eavesdropping encoded encrypted message field hash header impersonate Alice input instance integrity check K₁ KAlice-Bob Kerberos V4 key algorithms key encrypted login master key message digest message digest function message integrity code message to Bob MIC-ONLY modified multiple network layer network layer address node octets operations output packet padding password password guessing per-message key permutation plaintext PRIVACY-ENHANCED MESSAGE private key problem protocol public key cryptography quantity random number realm recipient relatively prime request router RSA key sage scheme secret key sequence number session key shared secret signature signed someone specify stored TGS_REQ ticket to Bob timestamp transmitted Trudy trust unencrypted verify version number workstation