000 04810cam a22004454a 4500
001 00049929
003 AE-DuAU
005 20241127164351.0
008 050915s2001 nyua b 001 0 eng
010 _a 00049929
020 _a0471405744 :
_c29.99
040 _aDLC
_cDLC
_dDLC
042 _apcc
050 0 0 _aQA76.9.A25
_bG68 2001
069 _a09501184
090 _aQA 76.9 .A25 G68 2001
090 _aQA 76.9 .A25 G68 2001
100 1 _aGraff, Jon.
_920936
245 1 0 _aCryptography and e-commerce :
_ba Wiley tech brief /
_cJon C. Graff.
260 _aNew York :
_bJohn Wiley,
_c2001.
300 _axviii, 222 p. :
_bill. ;
_c24 cm.
336 _2rdacontent
_atext
_btxt
337 _2rdamedia
_aunmediated
_bn
338 _2rdacarrier
_avolume
_bnc
440 0 _aWiley tech brief series
_973632
500 _a"Wiley Computer Publishing."
504 _aIncludes bibliographical references (p. 187-190) and index.
505 0 _aSymmetrical Key Cryptography -- How Symmetrical Key Cryptography Is Used in the Real World -- How to Attack a Contemporary Cryptographic Algorithm -- An ATM Transaction: An Example of How Symmetrical Key Cryptography Is Used in the "Real" World -- Integrity Protection -- Cryptographic Checksums -- Strong One-Way Functions -- A Description of Currently Used Strong One-Way Functions -- The Key Management Problem -- The Manual Key Transportation Protocol -- Creating Key Parts -- Kerberos, a Symmetrical Key Solution of the n[superscript 2] Problem -- System Initialization -- Alice Starts the Kerberos Protocol -- The KDC Processes Alice's Request -- Alice Processes Her Ticket and Sends a Message to Bob -- Bob Receives and Processes Alice's Message -- Bob Composes a Reply to Alice -- Alice Receives and Decrypts Bob's Reply -- Alice and Bob Can Communicate in a Secure Session -- Kerberos at One Glance -- Public Key Cryptography -- A Physical Analogy: A Protocol for Exchanging a Secret in Public Using Secret Keys -- A Second Physical Analogy: A Protocol for Exchanging a Secret in Public Using a Lock that Has Two Keys -- How Bob Knows Who Sent Him a Message--the Bank Way--with Passwords -- Digital Signatures -- Digital Certificates -- A Summary of What the Public Key Protocol Permits -- How a Digital Certificate Is Really Made -- A Public Key Protocol without Confidentiality -- How to Determine If Alice's Certificate Is Currently Valid -- A Current Example of the Use of Digital Certificates -- Certificate Hierarchies -- Certificate Extension and Attribute Certificates -- The Future of Cryptography and the United States Governmental Politics of Cryptography -- A Tutorial on the Mathematics of Public Key Cryptography -- Underlying Mathematics for Cryptography -- The Caesar Cipher and the Magic Decoding Ring -- A Review of Exponents -- The Diffie-Hellman (-Merkle) Algorithm -- Security Difficulties with the "Plain" DHM Algorithm -- The RSA Algorithm -- How to Use the RSA Algorithm to Encrypt a Message -- How to Use the RSA Algorithm to Create a Digital Signature -- The ElGamal Algorithm -- How to Use the ElGamal Algorithm to Encrypt Messages -- How to Use the ElGamal Algorithm to Create a Digital Signature -- Case Studies of Modern Cryptographic Architectures -- Case Study: Protecting an Intranet with a Kerberos and PKC Hybrid -- Possible Solutions -- The Scoping Document -- The Selection of Kerberos as the Solution -- The Realization That Machines Aren't Human -- The Decision to Use Hardware to Solve Part of The Problem -- How to Transport the Automatically Generated Principal Keys to the KDC -- How to Install the PC Card into Its Server -- The Contents of the CA PC Card -- The Contents of the KDC PC Card -- The Contents of the Principal PC Cards -- The PC Card Installation Protocol -- Case Study: Protecting the California ISO Internet Communications Using PKC -- The Scoping Document -- The Cryptographic Architectural Framework Document -- The Four-Level Certificate Structure -- The Migration Plan -- The Public Key Infrastructure Document -- An Overview of the Proposed Cal ISO PKI -- The Overview of the Cal ISO Cryptographic Keys -- The Certificate and Key Life Cycles -- A Description of Attribute Certificates -- Associated PKI Requirements.
650 0 _aComputer security.
_973633
650 0 _aCryptography.
_973634
650 0 _aElectronic commerce.
_973635
830 0 _aWiley tech brief series.
_973632
852 _9p29.99
_y04-03-2002
907 _a13322
_b08-12-10
_c08-06-10
942 _cBOOK
_00
998 _aaudmc
_b04-03-02
_cm
_da
_e-
_feng
_gnyu
_h0
935 _a122001%5FGEN
945 _g0
_i625954
_j0
_laudmc
_nCopy Type:01 - Books
_o-
_p110.21
_q-
_r-
_s-
_t1
_u0
_v0
_w0
_x0
_yi10188319
_z08-06-10
999 _c13322
_d13322