CHAPTER 1: CLASSIC CRYPTOGRAPHY - Introduction
- Classic Cipher Techniques
- Early Cipher Machines
- The Vernam Cipher
- The Rotor Crypto Machines
- Cryptanalysis in World War II
- Summary
- Learning Objectives Review
CHAPTER 2: INFORMATION ASSURANCE
- Introduction
- Computer Network Architecture
- The OSI Model
- The TCP/IP Model
- Security Policies, Services, and Mechanisms
- Placeholder Names Used in Cryptography
- The Transformation of the Crypto Industry
- US Export Regulations for Encryption Equipment
- Summary
- Learning Objectives Review
CHAPTER 3: NUMBER THEORY AND FINITE FIELDS
- Introduction
- Principle of Counting
- The Euclidean Algorithm
- Congruence Arithmetic
- Summary of Properties
- Calculation of the Reciprocal (Multiplicative Inverse)
- Multiplication and Exponentiation in Modulo p
- Finite Fields
- Boolean Binary Expressions
- Summary
- Learning Objectives Review
CHAPTER 4: CONFIDENTIALITY – SYMMETRIC ENCRYPTION
- Introduction
- Crypto Systems
- Stream Cipher Symmetric Encryption
- Basic Theory of Enciphering
- Perfect Secrecy
- Shift Registers
- Block Encryption Algorithms
- Data Encryption Standard (DES)
- Advanced Encryption Standard (AES)
- Block Cipher Modes of Operation
- Summary
- Learning Objectives Review
CHAPTER 5: CONFIDENTIALITY – ASYMMETRIC ENCRYPTION
- Introduction
- Exponentiation and Public-Key Ciphers
- Key Management
- Security Services and Public-Key Encryption
- Combining Asymmetric and Symmetric Ciphers
- Variation of ElGamal System
- Summary
- Learning Objectives Review
CHAPTER 6: INTEGRITY AND AUTHENTICATION
- Introduction
- Message Authentication Code (MAC)
- Hash Functions
- Secure Hash Standard
- MD5 Message Digest Algorithm
- Keyed-Hash Message Authentication Code (HMAC)
- Authentication (Digital Signatures)
- Digital Signature Standard (FIPS 186-2)
- Summary
- Learning Objectives Review
CHAPTER 7: ACCESS AUTHENTICATION
- Introduction
- Authentication Concepts
- IEEE 802.1X Authentication
- Extensible Authentication Protocol (EAP)
- EAP Password Mechanisms
- Other Password Mechanisms
- Password Security Considerations
- EAP Authentication Servers
- Remote Authentication Dial-in User Service (RADIUS)
- Needham and Schroeder
- Kerberos
- ITU-T X.509 – Authentication Framework
- Hash, and Encryption Recommendations
- Summary
- Learning Objectives Review
CHAPTER 8: ELLIPTIC CURVE CRYPTOGRAPHY
- Introduction
- Finite Fields
- Elliptic Curves and Points
- Selecting an Elliptic Curve and G, the Generator Point
- Elliptic Curve Domain Parameters
- Cryptography Using Elliptic Curves
- EC Cipher Suites
- Summary
- Learning Objectives Review
CHAPTER 9: CERTIFICATES AND PUBLIC KEY INFRASTRUCTURE
- Introduction
- X.509 Basic Certificate Fields
- RSA Certification
- Cylink (Seek) Certification
- Cylink Certification Based on ElGamal
- Variation of ElGamal Certification
- Public Key Infrastructure (PKI)
- PKI Management Model
- Certificate Life-Cycle
- PKI Management Operations
- CRL Basic Fields
- CA Trust Models
- Encryption Algorithms Supported in PKI
- Private Key Proof of Possession (POP)
- Two Models for PKI Deployment
- Summary
- Learning Objectives Review
CHAPTER 10: ELECTRONIC MAIL SECURITY
- Introduction
- Pretty Good Privacy (PGP)
- PGP Email Compatibility
- Key Rings
- PGP Digital Certificates
- Establishment of Trust
- Secure MIME (S/MIME)
- S/MIME Message Formats
- Creating a Signed-only Message
- Creating an Enveloped-Only Message
- Signed and Enveloped MIME Entities
- Summary
- Learning Objectives Review
CHAPTER 11: VPNS AND IPSEC
- Introduction
- VPN Services
- IPsec
- Security Associations
- Security Protocols
- Algorithms for Encryption and Authentication in IPsec
- Internet Key Exchange (IKE v2)
- IPsec and IKE v2 Identifiers
- Summary
- Learning Objectives Review
CHAPTER 12: TLS, SSL, AND SET
- Introduction
- Transport Layer Security (TLS)
- TLS Architecture
- TLS Record Protocol
- Handshake Protocol
- Alert Message Protocol
- Change Cipher Spec Protocol
- Application Protocol
- SSL VPN
- Secure Electronic Transaction Protocol (SET)
- Summary
- Learning Objectives Review
CHAPTER 13: WEB SERVICES SECURITY
- Web Services
- Extensible Markup Language, XML
- Simple Object Access Protocol (SOAP)
- Universal Discovery, Description, and Integration, UDDI
- Web Services Description Language, WSDL
- Web Services Security
- XML Security
- XML Encryption
- XML Signature
- XML Key Management Specification
- Security Assertion Markup Language (SAML)
- Web Services Security Language (WS-Security)
- Summary
- Learning Objectives Review
CHAPTER 14: WIRELESS SECURITY
- Introduction
- WIMAX
- WIMAX (IEEE 802.16e) Security
- Wi-Fi
- IEE802.11 Wireless LAN
- 802.11i – WLAN Security Enhancement
- Wi-Fi Protected Access (WPA or WPA1) and WPA2
- Bluetooth
- Summary
- Learning Objectives Review
GLOSSARY OF SECURITY TERMS
INDEX