Additional Information
Book Details
Abstract
Security is now the number one concern for businesses world wide. The gold standard for attaining security is cryptography; it provides the most reliable tools for storing or transmitting digital information.
This is the first textbook showing students how to implement cryptography and incorporate it into real-world systems on the Web.
Table of Contents
Section Title | Page | Action | Price |
---|---|---|---|
Cover | Cover | ||
Practical Cryptology and Web Security | i | ||
Contents | vii | ||
Preface | xi | ||
Acknowledgements | xiii | ||
Basic security skills on the World Wide Web | 1 | ||
An introduction to network security | 1 | ||
The Web browser–server dialog | 8 | ||
Web page skills for message manipulation and security | 17 | ||
Bitwise operators and Base64 encoding/decoding | 40 | ||
The XOR and PkZip/WinZip encryption schemes | 54 | ||
Cryptology, Web site protection and attacks | 75 | ||
An overview of cryptology | 75 | ||
Basic user authentication and Web site protection | 82 | ||
Digest user authentication | 103 | ||
Brute-force attacks | 115 | ||
Implementation and application of brute-force schemes | 121 | ||
One-way encryptions, hashfunctions and message digests | 146 | ||
One-way functions and encryptions | 146 | ||
The single DES scheme and my first one-way encryption: Crypt() | 156 | ||
Hash functions and the message digest: MD5 | 177 | ||
Applications of message digests and the md5Crypt password scheme | 193 | ||
The secure hash algorithm | 209 | ||
Some strong symmetric-key ciphers | 224 | ||
An introduction to strong symmetric-key ciphers | 224 | ||
Coding optimization of the DES scheme | 233 | ||
Optimized DES, triple DES and some encryption tools | 256 | ||
A DES-like cipher: CAST-128 | 282 | ||
Encryption/decryption tools with CAST-128 | 292 | ||
Practical software-basedstream ciphers | 306 | ||
An introduction to stream ciphers | 306 | ||
An unbreakable cipher: the one-time-pad | 314 | ||
Techniques for generating random key-streams | 334 | ||
Two fast and compact stream ciphers: RC4 and ISAAC | 351 | ||
A heavyweight stream cipher: SEAL2 | 374 | ||
Block ciphers with variable key lengths | 390 | ||
A flexible and adaptive block cipher: Blowfish | 390 | ||
Implementation of the Blowfish scheme | 398 | ||
A fully parameterized block cipher: RC6 | 421 | ||
A step-by-step advanced encryption standard | 442 | ||
An optimized implementation of AES | 454 | ||
Encryption and server skills for Web page protection | 478 | ||
Encryption skills for Web page protection | 478 | ||
Server technologies and security | 506 | ||
Using server storage for security | 527 | ||
Handling password accounts with MySQL | 547 | ||
Practical public-key security and digital signatures | 568 | ||
Security with public-key technology | 568 | ||
The Diffie–Hellman key exchange scheme | 572 | ||
The ElGamal public-key algorithm and digital signatures | 584 | ||
The RSA scheme, digital signature and hybrid encryption | 606 | ||
Elliptic curves and public-key encryption/decryption | 633 | ||
Security applications with GnuPG, WinPT and server techniques | 655 | ||
An introduction to Gnu Privacy Guard | 655 | ||
Using GnuPG for security applications | 660 | ||
A graphical GnuPG interface for Windows: WinPT | 676 | ||
Secure emailing with server technologies | 710 | ||
Sending secure attachments with server technologies | 732 | ||
SSL security, applications and XML contracts | 748 | ||
Digital certificates and contracts | 748 | ||
Basic security applications with OpenSSL | 756 | ||
Generating and signing certificates with OpenSSL | 776 | ||
Integrating OpenSSL and Apache to build a secure HTTPS site | 796 | ||
XML security and XML digital contracts | 818 | ||
Glossary | 849 | ||
Index | 866 |