000 | 04810cam a22004454a 4500 | ||
---|---|---|---|
001 | 00049929 | ||
003 | AE-DuAU | ||
005 | 20241127164351.0 | ||
008 | 050915s2001 nyua b 001 0 eng | ||
010 | _a 00049929 | ||
020 |
_a0471405744 : _c29.99 |
||
040 |
_aDLC _cDLC _dDLC |
||
042 | _apcc | ||
050 | 0 | 0 |
_aQA76.9.A25 _bG68 2001 |
069 | _a09501184 | ||
090 | _aQA 76.9 .A25 G68 2001 | ||
090 | _aQA 76.9 .A25 G68 2001 | ||
100 | 1 |
_aGraff, Jon. _920936 |
|
245 | 1 | 0 |
_aCryptography and e-commerce : _ba Wiley tech brief / _cJon C. Graff. |
260 |
_aNew York : _bJohn Wiley, _c2001. |
||
300 |
_axviii, 222 p. : _bill. ; _c24 cm. |
||
336 |
_2rdacontent _atext _btxt |
||
337 |
_2rdamedia _aunmediated _bn |
||
338 |
_2rdacarrier _avolume _bnc |
||
440 | 0 |
_aWiley tech brief series _973632 |
|
500 | _a"Wiley Computer Publishing." | ||
504 | _aIncludes bibliographical references (p. 187-190) and index. | ||
505 | 0 | _aSymmetrical Key Cryptography -- How Symmetrical Key Cryptography Is Used in the Real World -- How to Attack a Contemporary Cryptographic Algorithm -- An ATM Transaction: An Example of How Symmetrical Key Cryptography Is Used in the "Real" World -- Integrity Protection -- Cryptographic Checksums -- Strong One-Way Functions -- A Description of Currently Used Strong One-Way Functions -- The Key Management Problem -- The Manual Key Transportation Protocol -- Creating Key Parts -- Kerberos, a Symmetrical Key Solution of the n[superscript 2] Problem -- System Initialization -- Alice Starts the Kerberos Protocol -- The KDC Processes Alice's Request -- Alice Processes Her Ticket and Sends a Message to Bob -- Bob Receives and Processes Alice's Message -- Bob Composes a Reply to Alice -- Alice Receives and Decrypts Bob's Reply -- Alice and Bob Can Communicate in a Secure Session -- Kerberos at One Glance -- Public Key Cryptography -- A Physical Analogy: A Protocol for Exchanging a Secret in Public Using Secret Keys -- A Second Physical Analogy: A Protocol for Exchanging a Secret in Public Using a Lock that Has Two Keys -- How Bob Knows Who Sent Him a Message--the Bank Way--with Passwords -- Digital Signatures -- Digital Certificates -- A Summary of What the Public Key Protocol Permits -- How a Digital Certificate Is Really Made -- A Public Key Protocol without Confidentiality -- How to Determine If Alice's Certificate Is Currently Valid -- A Current Example of the Use of Digital Certificates -- Certificate Hierarchies -- Certificate Extension and Attribute Certificates -- The Future of Cryptography and the United States Governmental Politics of Cryptography -- A Tutorial on the Mathematics of Public Key Cryptography -- Underlying Mathematics for Cryptography -- The Caesar Cipher and the Magic Decoding Ring -- A Review of Exponents -- The Diffie-Hellman (-Merkle) Algorithm -- Security Difficulties with the "Plain" DHM Algorithm -- The RSA Algorithm -- How to Use the RSA Algorithm to Encrypt a Message -- How to Use the RSA Algorithm to Create a Digital Signature -- The ElGamal Algorithm -- How to Use the ElGamal Algorithm to Encrypt Messages -- How to Use the ElGamal Algorithm to Create a Digital Signature -- Case Studies of Modern Cryptographic Architectures -- Case Study: Protecting an Intranet with a Kerberos and PKC Hybrid -- Possible Solutions -- The Scoping Document -- The Selection of Kerberos as the Solution -- The Realization That Machines Aren't Human -- The Decision to Use Hardware to Solve Part of The Problem -- How to Transport the Automatically Generated Principal Keys to the KDC -- How to Install the PC Card into Its Server -- The Contents of the CA PC Card -- The Contents of the KDC PC Card -- The Contents of the Principal PC Cards -- The PC Card Installation Protocol -- Case Study: Protecting the California ISO Internet Communications Using PKC -- The Scoping Document -- The Cryptographic Architectural Framework Document -- The Four-Level Certificate Structure -- The Migration Plan -- The Public Key Infrastructure Document -- An Overview of the Proposed Cal ISO PKI -- The Overview of the Cal ISO Cryptographic Keys -- The Certificate and Key Life Cycles -- A Description of Attribute Certificates -- Associated PKI Requirements. | |
650 | 0 |
_aComputer security. _973633 |
|
650 | 0 |
_aCryptography. _973634 |
|
650 | 0 |
_aElectronic commerce. _973635 |
|
830 | 0 |
_aWiley tech brief series. _973632 |
|
852 |
_9p29.99 _y04-03-2002 |
||
907 |
_a13322 _b08-12-10 _c08-06-10 |
||
942 |
_cBOOK _00 |
||
998 |
_aaudmc _b04-03-02 _cm _da _e- _feng _gnyu _h0 |
||
935 | _a122001%5FGEN | ||
945 |
_g0 _i625954 _j0 _laudmc _nCopy Type:01 - Books _o- _p110.21 _q- _r- _s- _t1 _u0 _v0 _w0 _x0 _yi10188319 _z08-06-10 |
||
999 |
_c13322 _d13322 |