Internet Security Cryptographic Principles Algorithms and Protocols Date: 19 January 2011, 07:03
|
Knowledge of number theory and abstract algebra are pre-requisites for any engineer designing a secure internet-based system. However, most of the books currently available on the subject are aimed at practitioners who just want to know how the various tools available on the market work and what level of security they impart. These books traditionally deal with the science and mathematics only in so far as they are necessary to understand how the tools work. Internet Security differs by its assertion that cryptography is the single most important technology for securing the Internet. To quote one reviewer "if every one of your communication partners were using a secure system based on encryption, viruses, worms and hackers would have a very hard time". This scenario does not reflect the reality of the Internet world as it currently stands. However, with security issues becoming more and more important internationally, engineers of the future will be required to design tougher, safer systems. Internet Security: Offers an in-depth introduction to the relevant cryptographic principles, algorithms protocols - the nuts and bolts of creating a secure network Links cryptographic principles to the technologies in use on the Internet, eg. PGP, S/MIME, IPsec, SSL TLS, Firewalls and SET (protecting credit card transactions) Provides state-of-the-art analysis of the latest IETF standards plus summaries and explanations of RFC documents Authored by a recognised expert in security Internet Security is the definitive text for graduate students on security and cryptography courses, and researchers in security and cryptography areas. It will prove to be invaluable to professionals engaged in the long-term development of secure systems. "Cryptography is the key to securing the Internet. If every communication network were to use a secure system based on encryption, then viruses, worms and hackers would have a very hard time. Unfortunately, this scenario does not reflect the reality of the Internet world today. However, with security issues becoming more and more important internationally, engineers of the future will be required to design tougher, safer systems. This book takes a long-term view. It is not a 'how-to' implementation guide for today's practitioners. It is a training text for the engineers of the future. Features: Detailed discussion of block cipher design principles, including coverage of IDEA, RC5, RC6, Triple DES and Advanced Encryption Standard (AES). Information on hash functions and message digests, including the latest protocols for digital signature, authentication and key-sharing HMAC. Expanded coverage of public-key encryption/signature algorithms, including Diffie-Hellman secret key exchange, RSA, ElGamal, Schnorr, DSA and Elliptic Curve Cryptography (ECC). Profiles for Public Key Infrastructure (PKI) < P> Complete and detailed guides to the entire TCP/IP protocol suite IPsec for network-layer security PGP and S/MIME for e-mail security SSL/TLS for transport-layer security. Firewalls for trusted systems SET security protocols used in the smart card. As well as providing an in-depth introduction to relevant cryptographic principles, algorithms and protocols, Internet Security links them to the technologies in use on the Internet today. State-of-the-art analyses of IETF standards plus summaries and explanations of RFC documents, numerous examples and a list of frequently used acronyms make this book a comprehensive and valuable reference for students, researchers and professional engineers alike - anyone engaged in the long-term development of secure systems."
|
DISCLAIMER:
This site does not store Internet Security Cryptographic Principles Algorithms and Protocols on its server. We only index and link to Internet Security Cryptographic Principles Algorithms and Protocols provided by other sites. Please contact the content providers to delete Internet Security Cryptographic Principles Algorithms and Protocols if any and email us, we'll remove relevant links or contents immediately.
|
|
|