| |
| |
(NOTE: Each chapter concludes with For Further Information.) | |
| |
| |
Preface | |
| |
| |
Who This Book Is For | |
| |
| |
How This Book Is Organized | |
| |
| |
Crypto Today and Tomorrow | |
| |
| |
Comments and Questions | |
| |
| |
Acknowledgments | |
| |
| |
| |
Introduction | |
| |
| |
The Basic Problem | |
| |
| |
Essentials of Crypto | |
| |
| |
Crypto Is Hard to Use | |
| |
| |
Balancing Crypto Use with Your Objectives | |
| |
| |
Essentials of Networking and the Internet | |
| |
| |
Protocol Layers and Network Products | |
| |
| |
Internet Technology | |
| |
| |
Internet Protocols in Your Host | |
| |
| |
The Internet Security Problem | |
| |
| |
An Internet Rogue's Gallery | |
| |
| |
Setting Realistic Security Objectives | |
| |
| |
Appropriate Communications Security | |
| |
| |
Communications Security Goals | |
| |
| |
Internet Crypto Techniques | |
| |
| |
Legal Restrictions | |
| |
| |
| |
Encryption Basics | |
| |
| |
Encryption Building Blocks | |
| |
| |
Stream Ciphers | |
| |
| |
Block Ciphers | |
| |
| |
How Crypto Systems Fail | |
| |
| |
Cryptanalysis and Modern Codes | |
| |
| |
Brute Force Cracking of Secret Keys | |
| |
| |
Attacks on Improper Crypto Use | |
| |
| |
Choosing Between Strong and Weak Crypto | |
| |
| |
Properties of Good Crypto Algorithms | |
| |
| |
Crypto Algorithms to Consider | |
| |
| |
Selecting a Block Cipher Mode | |
| |
| |
Identifying a Safe Key Length | |
| |
| |
Levels of Risk for Different Applications | |
| |
| |
| |
Link Encryption | |
| |
| |
Security Objectives | |
| |
| |
Product Example: In-line Encryptor | |
| |
| |
Red/Black Separation | |
| |
| |
Crypto Algorithm and Keying | |
| |
| |
Encryptor Vulnerabilities | |
| |
| |
Product Security Requirements | |
| |
| |
Deployment Example: Point-to-Point Encryption | |
| |
| |
Point-to-Point Practical Limitations | |
| |
| |
Physical Protection and Control | |
| |
| |
Deployment Security Requirements | |
| |
| |
Deployment Example: IP-routed Configuration | |
| |
| |
Site Protection | |
| |
| |
Networkwide Security | |
| |
| |
Deployment Security Requirements | |
| |
| |
Key Recovery and Escrowed Encryption | |
| |
| |
| |
Managing Secret Keys | |