Menu Expand
Practical Cryptology and Web Security

Practical Cryptology and Web Security

P.K. Yuen

(2005)

Additional Information

Book Details

Abstract

Security is now the number one concern for businesses world wide. The gold standard for attaining security is cryptography; it provides the most reliable tools for storing or transmitting digital information.

 

This is the first textbook showing students how to implement cryptography and incorporate it into real-world systems on the Web.


Table of Contents

Section Title Page Action Price
Cover Cover
Practical Cryptology and Web Security i
Contents vii
Preface xi
Acknowledgements xiii
Basic security skills on the World Wide Web 1
An introduction to network security 1
The Web browser–server dialog 8
Web page skills for message manipulation and security 17
Bitwise operators and Base64 encoding/decoding 40
The XOR and PkZip/WinZip encryption schemes 54
Cryptology, Web site protection and attacks 75
An overview of cryptology 75
Basic user authentication and Web site protection 82
Digest user authentication 103
Brute-force attacks 115
Implementation and application of brute-force schemes 121
One-way encryptions, hashfunctions and message digests 146
One-way functions and encryptions 146
The single DES scheme and my first one-way encryption: Crypt() 156
Hash functions and the message digest: MD5 177
Applications of message digests and the md5Crypt password scheme 193
The secure hash algorithm 209
Some strong symmetric-key ciphers 224
An introduction to strong symmetric-key ciphers 224
Coding optimization of the DES scheme 233
Optimized DES, triple DES and some encryption tools 256
A DES-like cipher: CAST-128 282
Encryption/decryption tools with CAST-128 292
Practical software-basedstream ciphers 306
An introduction to stream ciphers 306
An unbreakable cipher: the one-time-pad 314
Techniques for generating random key-streams 334
Two fast and compact stream ciphers: RC4 and ISAAC 351
A heavyweight stream cipher: SEAL2 374
Block ciphers with variable key lengths 390
A flexible and adaptive block cipher: Blowfish 390
Implementation of the Blowfish scheme 398
A fully parameterized block cipher: RC6 421
A step-by-step advanced encryption standard 442
An optimized implementation of AES 454
Encryption and server skills for Web page protection 478
Encryption skills for Web page protection 478
Server technologies and security 506
Using server storage for security 527
Handling password accounts with MySQL 547
Practical public-key security and digital signatures 568
Security with public-key technology 568
The Diffie–Hellman key exchange scheme 572
The ElGamal public-key algorithm and digital signatures 584
The RSA scheme, digital signature and hybrid encryption 606
Elliptic curves and public-key encryption/decryption 633
Security applications with GnuPG, WinPT and server techniques 655
An introduction to Gnu Privacy Guard 655
Using GnuPG for security applications 660
A graphical GnuPG interface for Windows: WinPT 676
Secure emailing with server technologies 710
Sending secure attachments with server technologies 732
SSL security, applications and XML contracts 748
Digital certificates and contracts 748
Basic security applications with OpenSSL 756
Generating and signing certificates with OpenSSL 776
Integrating OpenSSL and Apache to build a secure HTTPS site 796
XML security and XML digital contracts 818
Glossary 849
Index 866