Skip to content

Internet Cryptography

Best in textbook rentals since 2012!

ISBN-10: 0201924803

ISBN-13: 9780201924800

Edition: 1997

Authors: Richard E. Smith

List price: $45.95
Blue ribbon 30 day, 100% satisfaction guarantee!
what's this?
Rush Rewards U
Members Receive:
Carrot Coin icon
XP icon
You have reached 400 XP and carrot coins. That is the daily max!

Description:

Cryptography, the modern, mathematically - based version of the ancient art of secret codes, offers a much - needed solution to the problem of Internet security, and there is an urgent need for more information on how to construct Internet sites, services, and systems that utilize cryptographic systems for their protection. This book clearly explains the different categories of cryptographic systems and products available, reveals their pros and cons, and demonstrates how they solve various Internet security challenges. Internet Cryptography uses diagrams to illustrate component relationships and data flows, and makes extensive use of case studies and examples to communicate the real -…    
Customers also bought

Book details

List price: $45.95
Copyright year: 1997
Publisher: Addison Wesley Professional
Publication date: 7/22/1997
Binding: Paperback
Pages: 384
Size: 7.50" wide x 9.50" long x 0.75" tall
Weight: 1.430
Language: English

(NOTE: Each chapter concludes with For Further Information.)
Preface
Who This Book Is For
How This Book Is Organized
Crypto Today and Tomorrow
Comments and Questions
Acknowledgments
Introduction
The Basic Problem
Essentials of Crypto
Crypto Is Hard to Use
Balancing Crypto Use with Your Objectives
Essentials of Networking and the Internet
Protocol Layers and Network Products
Internet Technology
Internet Protocols in Your Host
The Internet Security Problem
An Internet Rogue's Gallery
Setting Realistic Security Objectives
Appropriate Communications Security
Communications Security Goals
Internet Crypto Techniques
Legal Restrictions
Encryption Basics
Encryption Building Blocks
Stream Ciphers
Block Ciphers
How Crypto Systems Fail
Cryptanalysis and Modern Codes
Brute Force Cracking of Secret Keys
Attacks on Improper Crypto Use
Choosing Between Strong and Weak Crypto
Properties of Good Crypto Algorithms
Crypto Algorithms to Consider
Selecting a Block Cipher Mode
Identifying a Safe Key Length
Levels of Risk for Different Applications
Link Encryption
Security Objectives
Product Example: In-line Encryptor
Red/Black Separation
Crypto Algorithm and Keying
Encryptor Vulnerabilities
Product Security Requirements
Deployment Example: Point-to-Point Encryption
Point-to-Point Practical Limitations
Physical Protection and Control
Deployment Security Requirements
Deployment Example: IP-routed Configuration
Site Protection
Networkwide Security
Deployment Security Requirements
Key Recovery and Escrowed Encryption
Managing Secret Keys