Item type | Current library | Home library | Shelving location | Call number | Materials specified | Status | Barcode | |
---|---|---|---|---|---|---|---|---|
![]() |
American University in Dubai | American University in Dubai | Main Collection | QA 76.9 .A25 G68 2001 (Browse shelf(Opens below)) | Copy Type:01 - Books | Available | 625954 |
"Wiley Computer Publishing."
Includes bibliographical references (p. 187-190) and index.
Symmetrical Key Cryptography -- How Symmetrical Key Cryptography Is Used in the Real World -- How to Attack a Contemporary Cryptographic Algorithm -- An ATM Transaction: An Example of How Symmetrical Key Cryptography Is Used in the "Real" World -- Integrity Protection -- Cryptographic Checksums -- Strong One-Way Functions -- A Description of Currently Used Strong One-Way Functions -- The Key Management Problem -- The Manual Key Transportation Protocol -- Creating Key Parts -- Kerberos, a Symmetrical Key Solution of the n[superscript 2] Problem -- System Initialization -- Alice Starts the Kerberos Protocol -- The KDC Processes Alice's Request -- Alice Processes Her Ticket and Sends a Message to Bob -- Bob Receives and Processes Alice's Message -- Bob Composes a Reply to Alice -- Alice Receives and Decrypts Bob's Reply -- Alice and Bob Can Communicate in a Secure Session -- Kerberos at One Glance -- Public Key Cryptography -- A Physical Analogy: A Protocol for Exchanging a Secret in Public Using Secret Keys -- A Second Physical Analogy: A Protocol for Exchanging a Secret in Public Using a Lock that Has Two Keys -- How Bob Knows Who Sent Him a Message--the Bank Way--with Passwords -- Digital Signatures -- Digital Certificates -- A Summary of What the Public Key Protocol Permits -- How a Digital Certificate Is Really Made -- A Public Key Protocol without Confidentiality -- How to Determine If Alice's Certificate Is Currently Valid -- A Current Example of the Use of Digital Certificates -- Certificate Hierarchies -- Certificate Extension and Attribute Certificates -- The Future of Cryptography and the United States Governmental Politics of Cryptography -- A Tutorial on the Mathematics of Public Key Cryptography -- Underlying Mathematics for Cryptography -- The Caesar Cipher and the Magic Decoding Ring -- A Review of Exponents -- The Diffie-Hellman (-Merkle) Algorithm -- Security Difficulties with the "Plain" DHM Algorithm -- The RSA Algorithm -- How to Use the RSA Algorithm to Encrypt a Message -- How to Use the RSA Algorithm to Create a Digital Signature -- The ElGamal Algorithm -- How to Use the ElGamal Algorithm to Encrypt Messages -- How to Use the ElGamal Algorithm to Create a Digital Signature -- Case Studies of Modern Cryptographic Architectures -- Case Study: Protecting an Intranet with a Kerberos and PKC Hybrid -- Possible Solutions -- The Scoping Document -- The Selection of Kerberos as the Solution -- The Realization That Machines Aren't Human -- The Decision to Use Hardware to Solve Part of The Problem -- How to Transport the Automatically Generated Principal Keys to the KDC -- How to Install the PC Card into Its Server -- The Contents of the CA PC Card -- The Contents of the KDC PC Card -- The Contents of the Principal PC Cards -- The PC Card Installation Protocol -- Case Study: Protecting the California ISO Internet Communications Using PKC -- The Scoping Document -- The Cryptographic Architectural Framework Document -- The Four-Level Certificate Structure -- The Migration Plan -- The Public Key Infrastructure Document -- An Overview of the Proposed Cal ISO PKI -- The Overview of the Cal ISO Cryptographic Keys -- The Certificate and Key Life Cycles -- A Description of Attribute Certificates -- Associated PKI Requirements.
There are no comments on this title.