Additional Information
Book Details
Abstract
Security is now the number one concern for businesses world wide. The gold standard for attaining security is cryptography; it provides the most reliable tools for storing or transmitting digital information.
This is the first textbook showing students how to implement cryptography and incorporate it into real-world systems on the Web.
Table of Contents
| Section Title | Page | Action | Price |
|---|---|---|---|
| Cover | Cover | ||
| Practical Cryptology and Web Security | i | ||
| Contents | vii | ||
| Preface | xi | ||
| Acknowledgements | xiii | ||
| Basic security skills on the World Wide Web | 1 | ||
| An introduction to network security | 1 | ||
| The Web browser–server dialog | 8 | ||
| Web page skills for message manipulation and security | 17 | ||
| Bitwise operators and Base64 encoding/decoding | 40 | ||
| The XOR and PkZip/WinZip encryption schemes | 54 | ||
| Cryptology, Web site protection and attacks | 75 | ||
| An overview of cryptology | 75 | ||
| Basic user authentication and Web site protection | 82 | ||
| Digest user authentication | 103 | ||
| Brute-force attacks | 115 | ||
| Implementation and application of brute-force schemes | 121 | ||
| One-way encryptions, hashfunctions and message digests | 146 | ||
| One-way functions and encryptions | 146 | ||
| The single DES scheme and my first one-way encryption: Crypt() | 156 | ||
| Hash functions and the message digest: MD5 | 177 | ||
| Applications of message digests and the md5Crypt password scheme | 193 | ||
| The secure hash algorithm | 209 | ||
| Some strong symmetric-key ciphers | 224 | ||
| An introduction to strong symmetric-key ciphers | 224 | ||
| Coding optimization of the DES scheme | 233 | ||
| Optimized DES, triple DES and some encryption tools | 256 | ||
| A DES-like cipher: CAST-128 | 282 | ||
| Encryption/decryption tools with CAST-128 | 292 | ||
| Practical software-basedstream ciphers | 306 | ||
| An introduction to stream ciphers | 306 | ||
| An unbreakable cipher: the one-time-pad | 314 | ||
| Techniques for generating random key-streams | 334 | ||
| Two fast and compact stream ciphers: RC4 and ISAAC | 351 | ||
| A heavyweight stream cipher: SEAL2 | 374 | ||
| Block ciphers with variable key lengths | 390 | ||
| A flexible and adaptive block cipher: Blowfish | 390 | ||
| Implementation of the Blowfish scheme | 398 | ||
| A fully parameterized block cipher: RC6 | 421 | ||
| A step-by-step advanced encryption standard | 442 | ||
| An optimized implementation of AES | 454 | ||
| Encryption and server skills for Web page protection | 478 | ||
| Encryption skills for Web page protection | 478 | ||
| Server technologies and security | 506 | ||
| Using server storage for security | 527 | ||
| Handling password accounts with MySQL | 547 | ||
| Practical public-key security and digital signatures | 568 | ||
| Security with public-key technology | 568 | ||
| The Diffie–Hellman key exchange scheme | 572 | ||
| The ElGamal public-key algorithm and digital signatures | 584 | ||
| The RSA scheme, digital signature and hybrid encryption | 606 | ||
| Elliptic curves and public-key encryption/decryption | 633 | ||
| Security applications with GnuPG, WinPT and server techniques | 655 | ||
| An introduction to Gnu Privacy Guard | 655 | ||
| Using GnuPG for security applications | 660 | ||
| A graphical GnuPG interface for Windows: WinPT | 676 | ||
| Secure emailing with server technologies | 710 | ||
| Sending secure attachments with server technologies | 732 | ||
| SSL security, applications and XML contracts | 748 | ||
| Digital certificates and contracts | 748 | ||
| Basic security applications with OpenSSL | 756 | ||
| Generating and signing certificates with OpenSSL | 776 | ||
| Integrating OpenSSL and Apache to build a secure HTTPS site | 796 | ||
| XML security and XML digital contracts | 818 | ||
| Glossary | 849 | ||
| Index | 866 |