Cryptography For Dummies
Home > Computing and Information Technology > Computer security > Data encryption > Cryptography For Dummies
Cryptography For Dummies

Cryptography For Dummies

|
     0     
5
4
3
2
1




Out of Stock


Notify me when this book is in stock
About the Book

Cryptography is the most effective way to achieve data security and is essential to e-commerce activities such as online shopping, stock trading, and banking This invaluable introduction to the basics of encryption covers everything from the terminology used in the field to specific technologies to the pros and cons of different implementations Discusses specific technologies that incorporate cryptography in their design, such as authentication methods, wireless encryption, e-commerce, and smart cards Based entirely on real-world issues and situations, the material provides instructions for already available technologies that readers can put to work immediately Expert author Chey Cobb is retired from the NRO, where she held a Top Secret security clearance, instructed employees of the CIA and NSA on computer security and helped develop the computer security policies used by all U.S. intelligence agencies

Table of Contents:
Introduction  1 About This Book 2 How to Use This Book 2 What You Don’t Need to Read  3 Foolish Assumptions 3 How This Book Is Organized 3 Part I: Crypto Basics & What You Really Need to Know 4 Part II: Public Key Infrastructure  4 Part III: Putting Encryption Technologies to Work for You 4 Part IV: The Part of Tens  4 Part V: Appendixes 5 Icons Used in This Book  5 Where to Go from Here  5 Part I: Crypto Basics & What You Really Need to Know 7 Chapter 1: A Primer on Crypto Basics  9 It’s Not about James Bond  9 Go with the rhythm  10 Rockin’ the rhythm 11 Getting to Know the Basic Terms 12 What Makes a Cipher? 13 Concealment ciphers 13 Substitution ciphers 14 Transposition ciphers  15 Hash without the corned beef  16 XOR what? 17 Breaking Ciphers  20 Not-so-secret keys  20 Known plaintext  21 Pattern recognition  21 What a brute! 21 Cryptosystems 22 Everyday Uses of Encryption 23 Network logons and passwords 23 Secure Web transactions 25 ATMs  26 Music and DVDs  27 Communication devices  28 Why Encryption Isn’t More Commonplace 28 Difficulty in understanding the technology  29 You can’t do it alone  29 Sharing those ugly secrets  30 Cost may be a factor  30 Special administration requirements 31 Chapter 2: Major League Algorithms  33 Beware of “Snake Oil”  34 Symmetric Keys Are All the Same  37 The key table 37 Key generation and random numbers 38 Protecting the Key  39 Symmetric Algorithms Come in Different Flavors 40 Making a hash of it 40 Defining blocks and streams 42 Which is better: Block or stream?  44 Identifying Symmetric Algorithms 45 Des 45 Triple DES  45 Idea  46 Aes 46 Asymmetric Keys 47 Rsa 48 Diffie-Hellman (& Merkle)  49 Pgp 50 Elliptical Curve Cryptography  50 Working Together 52 Chapter 3: Deciding What You Really Need  53 Justifying the Costs to Management  53 Long-term versus short-term  54 Tangible versus intangible results 55 Positive ROI 55 Government due diligence  60 Insurers like it!  61 Presenting your case  61 Do You Need Secure Communications?  62 Secure e-mail  62 Instant Messaging (IM)  64 Secure e-commerce  64 Online banking  66 Virtual Private Networks (VPNs)  66 Wireless (In)security  68 Do You Need to Authenticate Users? 69 Who are your users?  70 Authentication tokens 71 Smart cards 72 Java tokens  73 Biometrics 74 Do You Need to Ensure Confidentiality and Integrity?  75 Protecting Personal Data  75 What’s It Gonna Cost?  77 Chapter 4: Locks and Keys  79 The Magic Passphrase 80 The weakest link 81 Mental algorithms  82 Safety first! 84 Passphrase attacks  86 Don’t forget to flush!  87 The Key Concept  88 Key generation  89 Protecting your keys  90 What to do with your old keys 91 Some cryptiquette  91 Part II: Public Key Infrastructure 93 Chapter 5: The PKI Primer  95 What Is PKI?  96 Certificate Authorities (CAs)  97 Digital Certificates  98 Desktops, laptops, and servers  100 Key servers 102 Registration Authorities (RAs) 103 Uses for PKI Systems 103 Common PKI Problems  105 Chapter 6: PKI Bits and Pieces  107 Certificate Authorities 108 Pretenders to the throne 110 Registration Authorities  110 Certificate Policies (CPs)  111 Digital Certificates and Keys 112 D’basing Your Certificates 113 Certificate Revocation 114 Picking the PKCS  115 PKCS #1: RSA Encryption Standard 115 PKCS #3: Diffie-Hellman Key Agreement Standard 115 PKCS #5: Password-Based Cryptography Standard  115 PKCS #6: Extended-Certificate Syntax Standard 116 PKCS #7: Cryptographic Message Syntax Standard 116 PKCS #8: Private-Key Information Syntax Standard 116 PKCS #9: Selected Attribute Types  117 PKCS #10: Certification Request Syntax Standard 117 PKCS #11: Cryptographic Token Interface Standard 117 PKCS #12: Personal Information Exchange Syntax Standard  118 PKCS #13: Elliptic Curve Cryptography Standard  118 PKCS #14: Pseudo-Random Number Generation Standard 118 PKCS #15: Cryptographic Token Information Format Standard 118 Chapter 7: All Keyed Up!  119 So, What Exactly IS a Key?  120 Making a Key 120 The Long and Short of It  121 Randomness in Keys Is Good 122 Storing Your Keys Safely 123 Keys for Different Purposes  124 Keys and Algorithms  124 One Key; Two Keys  125 Public/private keys  126 The magic encryption machine  127 The magic decryption machine  128 Symmetric keys (again) 129 Trusting Those Keys  129 Key Servers 130 Keeping keys up to date  131 Policies for keys  132 Key escrow and key recovery 132 Part III: Putting Encryption Technologies to Work for You 135 Chapter 8: Securing E-Mail from Prying Eyes  137 E-Mail Encryption Basics  138 S/mime 138 Pgp 139 Digital Certificates or PGP Public/Private Key Pairs?  140 What’s the diff? 140 When should you use which? 141 Sign or encrypt or both?  141 Remember that passphrase! 142 Using S/MIME  142 Setting up S/MIME in Outlook Express  143 Backing up your Digital Certificates  151 Fun and Games with PGP  153 Setting up PGP  154 Deciding on the options  156 Playing with your keyring  160 Sending and receiving PGP messages  162 PGP in the enterprise 164 Other Encryption Stuff to Try  164 Chapter 9: File and Storage Strategies  167 Why Encrypt Your Data? 168 Encrypted Storage Roulette  170 Symmetric versus asymmetric? 171 Encrypting in the air or on the ground?  173 Dealing with Integrity Issues 174 Message digest/hash  174 MACs  175 HMACs 175 Tripwire 176 Policies and Procedures  177 Examples of Encryption Storage  178 Media encryption 179 Encrypting File System  180 Secure e-mail 181 Program-specific encryption  181 Encrypted backup  181 Chapter 10: Authentication Systems  183 Common Authentication Systems  185 Kerberos  185 Ssh  186 Radius 187 Tacacs+  188 Authentication Protocols  188 How Authentication Systems Use Digital Certificates 190 Tokens, Smart Cards, and Biometrics 191 Digital Certificates on a PC  191 Time-based tokens 192 Smartcard and USB Smartkeys 193 Biometrics 194 Chapter 11: Secure E-Commerce  197 SSL Is the Standard  198 A typical SSL connection 199 Rooting around your certificates 201 Time for TLS  203 Setting Up an SSL Solution  204 What equipment do I need?  205 The e-commerce manager’s checklist 206 XML Is the New Kid on the Block 209 Going for Outsourced E-Commerce 210 Chapter 12: Virtual Private Network (VPN) Encryption  213 How Do VPNs Work Their Magic?  214 Setting Up a VPN  214 What devices do I need?  215 What else should I consider?  216 Do VPNs affect performance? 216 Don’t forget wireless! 217 Various VPN Encryption Schemes 217 PPP and PPTP 217 L2tp 218 IPsec 218 Which Is Best?  220 Testing, Testing, Testing  221 Chapter 13: Wireless Encryption Basics  223 Why WEP Makes Us Weep 224 No key management 225 Poor RC4 implementation 225 Authentication problems 226 Not everything is encrypted 226 WEP Attack Methods 227 Finding wireless networks 228 War chalking  228 Wireless Protection Measures  230 Look for rogue access points  230 Change the default SSIDs 230 Turn on WEP 231 Position your access points well  232 Buy special antennas 232 Use a stronger encryption scheme  232 Use a VPN for wireless networks  232 Employ an authentication system  233 Part IV: The Part of Tens  235 Chapter 14: The Ten Best Encryption Web Sites  237 Mat Blaze’s Cryptography Resource on the Web 237 The Center for Democracy and Technology 237 SSL Review  238 How IPsec Works  238 Code and Cipher 238 CERIAS — Center for Education and Research in Information Assurance and Security 238 The Invisible Cryptologists — African Americans, WWII to 1956  239 Bruce Schneier 239 North American Cryptography Archives  239 RSA’s Crypto FAQ 239 Chapter 15: The Ten Most Commonly Misunderstood Encryption Terms  241 Military-Grade Encryption  241 Trusted Third Party 241 X 509 Certificates 242 Rubber Hose Attack 242 Shared Secret  242 Key Escrow  242 Initialization Vector  243 Alice, Bob, Carol, and Dave 243 Secret Algorithm  243 Steganography  244 Chapter 16: Cryptography Do’s and Don’ts  245 Do Be Sure the Plaintext Is Destroyed after a Document Is Encrypted  245 Do Protect Your Key Recovery Database and Other Key Servers to the Greatest Extent Possible  246 Don’t Store Your Private Keys on the Hard Drive of Your Laptop or Other Personal Computing Device 246 Do Make Sure Your Servers’ Operating Systems Are “Hardened” before You Install Cryptological Systems on Them 246 Do Train Your Users against Social Engineering  247 Do Create the Largest Key Size Possible 247 Do Test Your Cryptosystem after You Have It Up and Running 248 Do Check the CERT Advisories and Vendor Advisories about Flaws and Weaknesses in Cryptosystems 248 Don’t Install a Cryptosystem Yourself If You’re Not Sure What You Are Doing 248 Don’t Use Unknown, Untested Algorithms 249 Chapter 17: Ten Principles of “Cryptiquette”  251 If Someone Sends You an Encrypted Message, Reply in Kind  251 Don’t Create Too Many Keys  251 Don’t Immediately Trust Someone Just Because He/She Has a Public Key 252 Always Back Up Your Keys and Passphrases 252 Be Wary of What You Put in the Subject Line of Encrypted Messages  252 If You Lose Your Key or Passphrase, Revoke Your Keys as Soon as Possible  253 Don’t Publish Someone’s Public Key to a Public Key Server without His/Her Permission  253 Don’t Sign Someone’s Public Key Unless You Have Reason To  253 If You Are Corresponding with Someone for the First Time, Send an Introductory Note Along with Your Public Key  254 Be Circumspect in What You Encrypt 254 Chapter 18: Ten Very Useful Encryption Products  255 PGP: Pretty Good Privacy 255 Gaim  255 madeSafe Vault 256 Password Safe 256 Kerberos  256 OpenSSL and Apache SSL  256 SafeHouse  257 WebCrypt  257 Privacy Master  257 Advanced Encryption Package 257 Part V: Appendixes  259 Appendix A: Cryptographic Attacks  261 Known Plaintext Attack 262 Chosen Ciphertext Attacks 262 Chosen Plaintext Attacks  263 The Birthday Attack 263 Man-in-the-Middle Attack  263 Timing Attacks  264 Rubber Hose Attack 264 Electrical Fluctuation Attacks  265 Major Boo-Boos  265 Appendix B: Glossary  267 Appendix C: Encryption Export Controls  279 Index  283


Best Sellers


Product Details
  • ISBN-13: 9780764568312
  • Publisher: John Wiley & Sons Inc
  • Binding: Digital (delivered electronically)
  • No of Pages: 336
  • ISBN-10: 0764568310
  • Publisher Date: 16 Jan 2004
  • Language: English


Similar Products

Add Photo
Add Photo

Customer Reviews

REVIEWS      0     
Click Here To Be The First to Review this Product
Cryptography For Dummies
John Wiley & Sons Inc -
Cryptography For Dummies
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Cryptography For Dummies

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    New Arrivals

    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!