- ISBN: 9780201616477 | 0201616475
- Cover: Paperback
- Copyright: 12/21/2000
Cryptography is at the heart of computer security: without it, secure e-commerce and Internet communications would be impossible. Decision-makers and sophisticated computer users need to understand cryptography -- but most explanations are highly mathematical and technical. Cryptography Decrypted explains cryptography in "plain English" -- and is authoritative and thorough enough to address the needs of professionals. It explains the processes step-by-step, with extensive visuals. The authors present the elements of cryptography systems; public key infrastructure (PKI); and the IPSec standard for virtual private network security; then review real-world systems and their applications. They show how real-world systems are attacked, and how to protect them; introduce essential cryptographic terms; and present the fascinating history of cryptography through sidebars highlighting its important events, people, and breakthroughs. For every decision-maker and computer user who needs to understand cryptography, this book is also ideal for security pros who need to educate management about cryptography.
H.X. Mel consults and develops computer systems for organizations such as Lucent, Xerox, MIT, the U.S. Government, Motorola, Goldman Sachs, and PricewaterhouseCoopers. Doris Baker is a freelance technical writer and editor.
0201616475AB04062001
Foreword | xv | ||||
Preface | xvii | ||||
Introduction | xix | ||||
Part I Secret Key Cryptography | 1 | (74) | |||
|
3 | (4) | |||
|
3 | (2) | |||
|
5 | (1) | |||
|
6 | (1) | |||
|
6 | (1) | |||
|
7 | (14) | |||
|
10 | (1) | |||
|
11 | (1) | |||
|
12 | (1) | |||
|
13 | (2) | |||
|
14 | (1) | |||
|
15 | (4) | |||
|
19 | (2) | |||
|
21 | (8) | |||
|
22 | (1) | |||
|
23 | (2) | |||
|
25 | (1) | |||
|
26 | (2) | |||
|
28 | (1) | |||
|
29 | (8) | |||
|
29 | (4) | |||
|
30 | (3) | |||
|
33 | (1) | |||
|
34 | (1) | |||
|
35 | (2) | |||
|
37 | (8) | |||
|
37 | (3) | |||
|
40 | (1) | |||
|
41 | (1) | |||
|
42 | (1) | |||
|
42 | (1) | |||
|
43 | (1) | |||
|
44 | (1) | |||
|
45 | (8) | |||
|
46 | (2) | |||
|
48 | (1) | |||
|
49 | (2) | |||
|
51 | (2) | |||
|
53 | (12) | |||
|
54 | (1) | |||
|
55 | (2) | |||
|
57 | (1) | |||
|
57 | (2) | |||
|
59 | (4) | |||
|
60 | (2) | |||
|
62 | (1) | |||
|
62 | (1) | |||
|
63 | (1) | |||
|
64 | (1) | |||
|
65 | (10) | |||
|
66 | (2) | |||
|
68 | (2) | |||
|
70 | (1) | |||
|
71 | (1) | |||
|
71 | (1) | |||
|
72 | (1) | |||
|
72 | (3) | |||
Part II Public Key Cryptography | 75 | (88) | |||
|
77 | (12) | |||
|
77 | (1) | |||
|
77 | (7) | |||
|
78 | (1) | |||
|
79 | (1) | |||
|
80 | (1) | |||
|
81 | (1) | |||
|
82 | (2) | |||
|
84 | (2) | |||
|
84 | (2) | |||
|
86 | (1) | |||
|
86 | (2) | |||
|
88 | (1) | |||
|
89 | (8) | |||
|
89 | (3) | |||
|
92 | (1) | |||
|
92 | (2) | |||
|
94 | (1) | |||
|
95 | (2) | |||
|
97 | (18) | |||
|
98 | (2) | |||
|
100 | (1) | |||
|
101 | (2) | |||
|
103 | (3) | |||
|
106 | (3) | |||
|
109 | (1) | |||
|
110 | (2) | |||
|
110 | (1) | |||
|
111 | (1) | |||
|
112 | (1) | |||
|
112 | (1) | |||
|
112 | (1) | |||
|
113 | (2) | |||
|
115 | (12) | |||
|
116 | (1) | |||
|
117 | (2) | |||
|
117 | (1) | |||
|
117 | (2) | |||
|
119 | (1) | |||
|
120 | (2) | |||
|
120 | (1) | |||
|
121 | (1) | |||
|
122 | (1) | |||
|
122 | (1) | |||
|
123 | (1) | |||
|
123 | (1) | |||
|
124 | (1) | |||
|
124 | (1) | |||
|
124 | (1) | |||
|
125 | (2) | |||
|
127 | (14) | |||
|
129 | (2) | |||
|
131 | (2) | |||
|
133 | (3) | |||
|
135 | (1) | |||
|
136 | (1) | |||
|
137 | (1) | |||
|
138 | (3) | |||
|
141 | (16) | |||
|
141 | (2) | |||
|
143 | (7) | |||
|
143 | (1) | |||
|
143 | (1) | |||
|
144 | (1) | |||
|
145 | (2) | |||
|
147 | (3) | |||
|
150 | (1) | |||
|
151 | (3) | |||
|
151 | (1) | |||
|
152 | (2) | |||
|
154 | (1) | |||
|
155 | (1) | |||
|
155 | (1) | |||
|
156 | (1) | |||
|
157 | (6) | |||
|
157 | (1) | |||
|
158 | (1) | |||
|
158 | (1) | |||
|
159 | (2) | |||
|
159 | (1) | |||
|
159 | (2) | |||
|
161 | (2) | |||
Part III Distribution of Public Keys | 163 | (40) | |||
|
165 | (12) | |||
|
167 | (1) | |||
|
167 | (2) | |||
|
168 | (1) | |||
|
168 | (1) | |||
|
168 | (1) | |||
|
168 | (1) | |||
|
169 | (3) | |||
|
169 | (1) | |||
|
169 | (1) | |||
|
170 | (1) | |||
|
171 | (1) | |||
|
171 | (1) | |||
|
171 | (1) | |||
|
172 | (1) | |||
|
172 | (1) | |||
|
172 | (1) | |||
|
173 | (1) | |||
|
174 | (1) | |||
|
174 | (3) | |||
|
177 | (16) | |||
|
178 | (1) | |||
|
179 | (3) | |||
|
179 | (2) | |||
|
181 | (1) | |||
|
182 | (1) | |||
|
182 | (7) | |||
|
183 | (4) | |||
|
187 | (1) | |||
|
188 | (1) | |||
|
189 | (1) | |||
|
189 | (1) | |||
|
190 | (1) | |||
|
190 | (3) | |||
|
193 | (10) | |||
|
193 | (1) | |||
|
194 | (2) | |||
|
196 | (4) | |||
|
196 | (1) | |||
|
197 | (1) | |||
|
198 | (2) | |||
|
200 | (1) | |||
|
200 | (1) | |||
|
201 | (1) | |||
|
201 | (2) | |||
Part IV Real-World Systems | 203 | (60) | |||
|
204 | (1) | |||
|
204 | (1) | |||
|
205 | (2) | |||
|
207 | (8) | |||
|
207 | (2) | |||
|
209 | (2) | |||
|
211 | (2) | |||
|
211 | (1) | |||
|
212 | (1) | |||
|
213 | (1) | |||
|
213 | (2) | |||
|
215 | (14) | |||
|
216 | (1) | |||
|
216 | (2) | |||
|
218 | (6) | |||
|
219 | (2) | |||
|
221 | (1) | |||
|
222 | (1) | |||
|
223 | (1) | |||
|
224 | (1) | |||
|
224 | (1) | |||
|
225 | (1) | |||
|
225 | (1) | |||
|
225 | (1) | |||
|
225 | (1) | |||
|
226 | (1) | |||
|
227 | (1) | |||
|
227 | (2) | |||
|
229 | (18) | |||
|
229 | (1) | |||
|
230 | (2) | |||
|
231 | (1) | |||
|
231 | (1) | |||
|
232 | (5) | |||
|
232 | (1) | |||
|
232 | (1) | |||
|
233 | (2) | |||
|
235 | (1) | |||
|
235 | (2) | |||
|
237 | (8) | |||
|
238 | (3) | |||
|
241 | (2) | |||
|
243 | (1) | |||
|
244 | (1) | |||
|
245 | (1) | |||
|
246 | (1) | |||
|
247 | (12) | |||
|
247 | (1) | |||
|
247 | (2) | |||
|
249 | (1) | |||
|
249 | (2) | |||
|
250 | (1) | |||
|
250 | (1) | |||
|
251 | (2) | |||
|
251 | (2) | |||
|
253 | (1) | |||
|
253 | (1) | |||
|
253 | (4) | |||
|
257 | (2) | |||
|
259 | (4) | |||
|
259 | (3) | |||
|
260 | (1) | |||
|
261 | (1) | |||
|
261 | (1) | |||
|
261 | (1) | |||
|
262 | (1) | |||
Epilogue | 263 | (4) | |||
Appendix A Public Key Mathematics (and Some Words on Random Numbers) | 267 | (54) | |||
Appendix B (A Few) IPsec Details | 321 | (16) | |||
Bibliography | 337 | (8) | |||
Index | 345 |
The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.