Image from Google Jackets
Normal view MARC view

Cryptography and e-commerce : a Wiley tech brief / Jon C. Graff.

By: Series: Wiley tech brief series | Wiley tech brief seriesPublication details: New York : John Wiley, 2001.Description: xviii, 222 p. : ill. ; 24 cmContent type:
  • text
Media type:
  • unmediated
Carrier type:
  • volume
ISBN:
  • 0471405744 :
Subject(s): LOC classification:
  • QA76.9.A25 G68 2001
Contents:
Symmetrical Key Cryptography -- How Symmetrical Key Cryptography Is Used in the Real World -- How to Attack a Contemporary Cryptographic Algorithm -- An ATM Transaction: An Example of How Symmetrical Key Cryptography Is Used in the "Real" World -- Integrity Protection -- Cryptographic Checksums -- Strong One-Way Functions -- A Description of Currently Used Strong One-Way Functions -- The Key Management Problem -- The Manual Key Transportation Protocol -- Creating Key Parts -- Kerberos, a Symmetrical Key Solution of the n[superscript 2] Problem -- System Initialization -- Alice Starts the Kerberos Protocol -- The KDC Processes Alice's Request -- Alice Processes Her Ticket and Sends a Message to Bob -- Bob Receives and Processes Alice's Message -- Bob Composes a Reply to Alice -- Alice Receives and Decrypts Bob's Reply -- Alice and Bob Can Communicate in a Secure Session -- Kerberos at One Glance -- Public Key Cryptography -- A Physical Analogy: A Protocol for Exchanging a Secret in Public Using Secret Keys -- A Second Physical Analogy: A Protocol for Exchanging a Secret in Public Using a Lock that Has Two Keys -- How Bob Knows Who Sent Him a Message--the Bank Way--with Passwords -- Digital Signatures -- Digital Certificates -- A Summary of What the Public Key Protocol Permits -- How a Digital Certificate Is Really Made -- A Public Key Protocol without Confidentiality -- How to Determine If Alice's Certificate Is Currently Valid -- A Current Example of the Use of Digital Certificates -- Certificate Hierarchies -- Certificate Extension and Attribute Certificates -- The Future of Cryptography and the United States Governmental Politics of Cryptography -- A Tutorial on the Mathematics of Public Key Cryptography -- Underlying Mathematics for Cryptography -- The Caesar Cipher and the Magic Decoding Ring -- A Review of Exponents -- The Diffie-Hellman (-Merkle) Algorithm -- Security Difficulties with the "Plain" DHM Algorithm -- The RSA Algorithm -- How to Use the RSA Algorithm to Encrypt a Message -- How to Use the RSA Algorithm to Create a Digital Signature -- The ElGamal Algorithm -- How to Use the ElGamal Algorithm to Encrypt Messages -- How to Use the ElGamal Algorithm to Create a Digital Signature -- Case Studies of Modern Cryptographic Architectures -- Case Study: Protecting an Intranet with a Kerberos and PKC Hybrid -- Possible Solutions -- The Scoping Document -- The Selection of Kerberos as the Solution -- The Realization That Machines Aren't Human -- The Decision to Use Hardware to Solve Part of The Problem -- How to Transport the Automatically Generated Principal Keys to the KDC -- How to Install the PC Card into Its Server -- The Contents of the CA PC Card -- The Contents of the KDC PC Card -- The Contents of the Principal PC Cards -- The PC Card Installation Protocol -- Case Study: Protecting the California ISO Internet Communications Using PKC -- The Scoping Document -- The Cryptographic Architectural Framework Document -- The Four-Level Certificate Structure -- The Migration Plan -- The Public Key Infrastructure Document -- An Overview of the Proposed Cal ISO PKI -- The Overview of the Cal ISO Cryptographic Keys -- The Certificate and Key Life Cycles -- A Description of Attribute Certificates -- Associated PKI Requirements.
Holdings
Item type Current library Home library Shelving location Call number Materials specified Status Barcode
Books Books American University in Dubai American University in Dubai Main Collection QA 76.9 .A25 G68 2001 (Browse shelf(Opens below)) Copy Type:01 - Books Available 625954

"Wiley Computer Publishing."

Includes bibliographical references (p. 187-190) and index.

Symmetrical Key Cryptography -- How Symmetrical Key Cryptography Is Used in the Real World -- How to Attack a Contemporary Cryptographic Algorithm -- An ATM Transaction: An Example of How Symmetrical Key Cryptography Is Used in the "Real" World -- Integrity Protection -- Cryptographic Checksums -- Strong One-Way Functions -- A Description of Currently Used Strong One-Way Functions -- The Key Management Problem -- The Manual Key Transportation Protocol -- Creating Key Parts -- Kerberos, a Symmetrical Key Solution of the n[superscript 2] Problem -- System Initialization -- Alice Starts the Kerberos Protocol -- The KDC Processes Alice's Request -- Alice Processes Her Ticket and Sends a Message to Bob -- Bob Receives and Processes Alice's Message -- Bob Composes a Reply to Alice -- Alice Receives and Decrypts Bob's Reply -- Alice and Bob Can Communicate in a Secure Session -- Kerberos at One Glance -- Public Key Cryptography -- A Physical Analogy: A Protocol for Exchanging a Secret in Public Using Secret Keys -- A Second Physical Analogy: A Protocol for Exchanging a Secret in Public Using a Lock that Has Two Keys -- How Bob Knows Who Sent Him a Message--the Bank Way--with Passwords -- Digital Signatures -- Digital Certificates -- A Summary of What the Public Key Protocol Permits -- How a Digital Certificate Is Really Made -- A Public Key Protocol without Confidentiality -- How to Determine If Alice's Certificate Is Currently Valid -- A Current Example of the Use of Digital Certificates -- Certificate Hierarchies -- Certificate Extension and Attribute Certificates -- The Future of Cryptography and the United States Governmental Politics of Cryptography -- A Tutorial on the Mathematics of Public Key Cryptography -- Underlying Mathematics for Cryptography -- The Caesar Cipher and the Magic Decoding Ring -- A Review of Exponents -- The Diffie-Hellman (-Merkle) Algorithm -- Security Difficulties with the "Plain" DHM Algorithm -- The RSA Algorithm -- How to Use the RSA Algorithm to Encrypt a Message -- How to Use the RSA Algorithm to Create a Digital Signature -- The ElGamal Algorithm -- How to Use the ElGamal Algorithm to Encrypt Messages -- How to Use the ElGamal Algorithm to Create a Digital Signature -- Case Studies of Modern Cryptographic Architectures -- Case Study: Protecting an Intranet with a Kerberos and PKC Hybrid -- Possible Solutions -- The Scoping Document -- The Selection of Kerberos as the Solution -- The Realization That Machines Aren't Human -- The Decision to Use Hardware to Solve Part of The Problem -- How to Transport the Automatically Generated Principal Keys to the KDC -- How to Install the PC Card into Its Server -- The Contents of the CA PC Card -- The Contents of the KDC PC Card -- The Contents of the Principal PC Cards -- The PC Card Installation Protocol -- Case Study: Protecting the California ISO Internet Communications Using PKC -- The Scoping Document -- The Cryptographic Architectural Framework Document -- The Four-Level Certificate Structure -- The Migration Plan -- The Public Key Infrastructure Document -- An Overview of the Proposed Cal ISO PKI -- The Overview of the Cal ISO Cryptographic Keys -- The Certificate and Key Life Cycles -- A Description of Attribute Certificates -- Associated PKI Requirements.

There are no comments on this title.

to post a comment.
  • Monday - Friday
  • 8:00 AM - 5:00 PM
  • Saturday - Sunday
  • Closed
  • Phone: +971 431 83183
  • Email: Library@aud.edu
  • Address: Sheikh Zayed Road -- P.O. Box 28282, Dubai, AE
  • Map & Directions