Practical cryptology and Web security
β Scribed by Yuen, P K
- Publisher
- Addison Wesley Longman; Pearson Addison Wesley
- Year
- 2005;2006
- Tongue
- English
- Leaves
- 897
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Table of Contents
Cover......Page 1
Practical Cryptology and Web Security......Page 2
Contents......Page 8
Preface......Page 12
Acknowledgements......Page 14
An introduction to network security......Page 16
The Web browserβserver dialog......Page 23
Web page skills for message manipulation and security......Page 32
Bitwise operators and Base64 encoding/decoding......Page 55
The XOR and PkZip/WinZip encryption schemes......Page 69
An overview of cryptology......Page 90
Basic user authentication and Web site protection......Page 97
Digest user authentication......Page 118
Brute-force attacks......Page 130
Implementation and application of brute-force schemes......Page 136
One-way functions and encryptions......Page 161
The single DES scheme and my first one-way encryption: Crypt()......Page 171
Hash functions and the message digest: MD5......Page 192
Applications of message digests and the md5Crypt password scheme......Page 208
The secure hash algorithm......Page 224
An introduction to strong symmetric-key ciphers......Page 239
Coding optimization of the DES scheme......Page 248
Optimized DES, triple DES and some encryption tools......Page 271
A DES-like cipher: CAST-128......Page 297
Encryption/decryption tools with CAST-128......Page 307
An introduction to stream ciphers......Page 321
An unbreakable cipher: the one-time-pad......Page 329
Techniques for generating random key-streams......Page 349
Two fast and compact stream ciphers: RC4 and ISAAC......Page 366
A heavyweight stream cipher: SEAL2......Page 389
A flexible and adaptive block cipher: Blowfish......Page 405
Implementation of the Blowfish scheme......Page 413
A fully parameterized block cipher: RC6......Page 436
A step-by-step advanced encryption standard......Page 457
An optimized implementation of AES......Page 469
Encryption skills for Web page protection......Page 493
Server technologies and security......Page 521
Using server storage for security......Page 542
Handling password accounts with MySQL......Page 562
Security with public-key technology......Page 583
The DiffieβHellman key exchange scheme......Page 587
The ElGamal public-key algorithm and digital signatures......Page 599
The RSA scheme, digital signature and hybrid encryption......Page 621
Elliptic curves and public-key encryption/decryption......Page 648
An introduction to Gnu Privacy Guard......Page 670
Using GnuPG for security applications......Page 675
A graphical GnuPG interface for Windows: WinPT......Page 691
Secure emailing with server technologies......Page 725
Sending secure attachments with server technologies......Page 747
Digital certificates and contracts......Page 763
Basic security applications with OpenSSL......Page 771
Generating and signing certificates with OpenSSL......Page 791
Integrating OpenSSL and Apache to build a secure HTTPS site......Page 811
XML security and XML digital contracts......Page 833
Glossary......Page 864
Index......Page 881
π SIMILAR VOLUMES
A hands-on, comprehensive guide, which gives students a practical insight into all aspects of web security and cryptography. Β
Security is now the number one concern for businesses world wide. The gold standard for attaining security is cryptography it provides the most reliable tools for storing or transmitting digital information.<br><br>This is the first textbook showing students how to implement cryptography and incorpo
Security is now the number one concern for businesses world wide. The gold standard for attaining security is cryptography; it provides the most reliable tools for storing or transmitting digital information. This is the first textbook showing students how to implement cryptography and incorporate i