Zum Hauptinhalt springen
Dekorationsartikel gehören nicht zum Leistungsumfang.
Guide to Internet Cryptography
Security Protocols and Real-World Attack Implications
Buch von Jörg Schwenk
Sprache: Englisch

79,45 €*

inkl. MwSt.

Versandkostenfrei per Post / DHL

Lieferzeit 2-3 Wochen

Kategorien:
Beschreibung
Research over the last two decades has considerably expanded knowledge of Internet cryptography, revealing the important interplay between standardization, implementation, and research.
This practical textbook/guide is intended for academic courses in IT security and as a reference guide for Internet security. It describes important Internet standards in a language close to real-world cryptographic research and covers the essential cryptographic standards used on the Internet, from WLAN encryption to TLS and e-mail security. From academic and non-academic research, the book collects information about attacks on implementations of these standards (because these attacks are the main source of new insights into real-world cryptography). By summarizing all this in one place, this useful volume can highlight cross-influences in standards, as well as similarities in cryptographic constructions.
Topics and features:
· Covers the essential standards in Internet cryptography
· Integrates work exercises and problems in each chapter
· Focuses especially on IPsec, secure e-mail and TLS
· Summarizes real-world cryptography in three introductory chapters
· Includes necessary background from computer networks
· Keeps mathematical formalism to a minimum, and treats cryptographic primitives mainly as blackboxes
· Provides additional background on web security in two concluding chapters
Offering a uniquely real-world approach to Internet cryptography, this textbook/reference will be highly suitable to students in advanced courses on cryptography/cryptology, as well as eminently useful to professionals looking to expand their background and expertise.
Professor Dr. Jörg Schwenk holds the Chair for Network and Data Security at the Ruhr University in Bochum, Germany. He (co-)authored about 150 papers on the book¿s topics, including for conferences like ACM CCS, Usenix Security, IEEE S&P, and NDSS.
Research over the last two decades has considerably expanded knowledge of Internet cryptography, revealing the important interplay between standardization, implementation, and research.
This practical textbook/guide is intended for academic courses in IT security and as a reference guide for Internet security. It describes important Internet standards in a language close to real-world cryptographic research and covers the essential cryptographic standards used on the Internet, from WLAN encryption to TLS and e-mail security. From academic and non-academic research, the book collects information about attacks on implementations of these standards (because these attacks are the main source of new insights into real-world cryptography). By summarizing all this in one place, this useful volume can highlight cross-influences in standards, as well as similarities in cryptographic constructions.
Topics and features:
· Covers the essential standards in Internet cryptography
· Integrates work exercises and problems in each chapter
· Focuses especially on IPsec, secure e-mail and TLS
· Summarizes real-world cryptography in three introductory chapters
· Includes necessary background from computer networks
· Keeps mathematical formalism to a minimum, and treats cryptographic primitives mainly as blackboxes
· Provides additional background on web security in two concluding chapters
Offering a uniquely real-world approach to Internet cryptography, this textbook/reference will be highly suitable to students in advanced courses on cryptography/cryptology, as well as eminently useful to professionals looking to expand their background and expertise.
Professor Dr. Jörg Schwenk holds the Chair for Network and Data Security at the Ruhr University in Bochum, Germany. He (co-)authored about 150 papers on the book¿s topics, including for conferences like ACM CCS, Usenix Security, IEEE S&P, and NDSS.
Über den Autor

Professor Dr. Jörg Schwenk holds the Chair for Network and Data Security at the Ruhr University in Bochum, Germany. He (co-)authored about 150 papers on the book's topics, including for conferences like ACM CCS, Usenix Security, IEEE S&P, and NDSS.

Zusammenfassung

Presents a comprehensive overview on critical cryptographic mechanisms

Provides materials for lectures for courses in 'computer networks' and 'introduction to cryptography'

Includes questions and exercises and can complement additional material like slides, videos, and exams

Inhaltsverzeichnis
Introduction.- The Internet.- Cryptography: Confidentiality.- Cryptography: Integrity and Authenticity.- Cryptographic Protocols.- Point-to-Point Security.- Wireless LAN (WLAN).- Cellular Networks.- IP Security (IPsec).- Security of HTTP.- Transport Layer Security.- A Short History of TLS.- Attacks on SSL and TLS.- Secure Shell (SSH).- Kerberos.- DNS Security.- File Encryption: PGP.- Email Security: S/MIME.- Attacks on S/MIME and OpenPGP.- Email: Protocols and SPAM.- Web Security and Single Sign-On Protocols.- Cryptographic Data Formats.- Index.
Details
Erscheinungsjahr: 2022
Genre: Informatik, Mathematik, Medizin, Naturwissenschaften, Technik
Rubrik: Naturwissenschaften & Technik
Medium: Buch
Reihe: Information Security and Cryptography
Inhalt: xix
530 S.
192 s/w Illustr.
80 farbige Illustr.
530 p. 272 illus.
80 illus. in color.
ISBN-13: 9783031194382
ISBN-10: 3031194381
Sprache: Englisch
Ausstattung / Beilage: HC runder Rücken kaschiert
Einband: Gebunden
Autor: Schwenk, Jörg
Auflage: 1st ed. 2022
Hersteller: Springer International Publishing
Information Security and Cryptography
Verantwortliche Person für die EU: Books on Demand GmbH, In de Tarpen 42, D-22848 Norderstedt, info@bod.de
Maße: 241 x 160 x 34 mm
Von/Mit: Jörg Schwenk
Erscheinungsdatum: 26.11.2022
Gewicht: 1,087 kg
Artikel-ID: 124663394
Über den Autor

Professor Dr. Jörg Schwenk holds the Chair for Network and Data Security at the Ruhr University in Bochum, Germany. He (co-)authored about 150 papers on the book's topics, including for conferences like ACM CCS, Usenix Security, IEEE S&P, and NDSS.

Zusammenfassung

Presents a comprehensive overview on critical cryptographic mechanisms

Provides materials for lectures for courses in 'computer networks' and 'introduction to cryptography'

Includes questions and exercises and can complement additional material like slides, videos, and exams

Inhaltsverzeichnis
Introduction.- The Internet.- Cryptography: Confidentiality.- Cryptography: Integrity and Authenticity.- Cryptographic Protocols.- Point-to-Point Security.- Wireless LAN (WLAN).- Cellular Networks.- IP Security (IPsec).- Security of HTTP.- Transport Layer Security.- A Short History of TLS.- Attacks on SSL and TLS.- Secure Shell (SSH).- Kerberos.- DNS Security.- File Encryption: PGP.- Email Security: S/MIME.- Attacks on S/MIME and OpenPGP.- Email: Protocols and SPAM.- Web Security and Single Sign-On Protocols.- Cryptographic Data Formats.- Index.
Details
Erscheinungsjahr: 2022
Genre: Informatik, Mathematik, Medizin, Naturwissenschaften, Technik
Rubrik: Naturwissenschaften & Technik
Medium: Buch
Reihe: Information Security and Cryptography
Inhalt: xix
530 S.
192 s/w Illustr.
80 farbige Illustr.
530 p. 272 illus.
80 illus. in color.
ISBN-13: 9783031194382
ISBN-10: 3031194381
Sprache: Englisch
Ausstattung / Beilage: HC runder Rücken kaschiert
Einband: Gebunden
Autor: Schwenk, Jörg
Auflage: 1st ed. 2022
Hersteller: Springer International Publishing
Information Security and Cryptography
Verantwortliche Person für die EU: Books on Demand GmbH, In de Tarpen 42, D-22848 Norderstedt, info@bod.de
Maße: 241 x 160 x 34 mm
Von/Mit: Jörg Schwenk
Erscheinungsdatum: 26.11.2022
Gewicht: 1,087 kg
Artikel-ID: 124663394
Sicherheitshinweis