Cargando…

SSL and TLS : Theory and Practice.

SSL (secure socket layer) and TLS (Transport Layer Security) are widely deployed security protocols that are used in all kinds of web-based e-commerce and e-business applications and are part of most contemporary security systems available today. This practical book provides a comprehensive introduc...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Oppliger, Rolf
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Norwood : Artech House, 2009.
Temas:
Acceso en línea:Texto completo
Tabla de Contenidos:
  • SSL and TLS: Theory and Practice; Contents; Foreword; Preface; Acknowledgments; Chapter 1 Introduction; 1.1 OSI SECURITY ARCHITECTURE; 1.1.1 Security Services; 1.1.2 Security Mechanisms; 1.2 SECURITY DEFINITION; 1.3 FINAL REMARKS; References; Chapter 2 Cryptography Primer; 2.1 INTRODUCTION; 2.1.1 Preliminary Remarks; 2.1.2 Cryptographic Systems; 2.1.3 Classes of Cryptographic Systems; 2.1.4 Secure Cryptosystems; 2.1.5 Historical Background Information; 2.1.6 Legal Situation; 2.2 CRYPTOSYSTEMS OVERVIEW; 2.2.1 Unkeyed Cryptosystems; 2.2.2 Secret Key Cryptosystems; 2.2.3 Public Key Cryptosystems.
  • 2.3 FINAL REMARKSReferences; Chapter 3 Transport Layer Security; 3.1 INTRODUCTION; 3.2 PROTOCOL EVOLUTION; 3.3 FINAL REMARKS; References; Chapter 4 SSL Protocol; 4.1 INTRODUCTION; 4.2 PROTOCOLS; 4.2.1 SSL Record Protocol; 4.2.2 SSL Handshake Protocol; 4.2.3 SSL Change Cipher Spec Protocol; 4.2.4 SSL Alert Protocol; 4.2.5 SSL Application Data Protocol; 4.3 TRAFFIC ANALYSIS OF AN SSL SESSION; 4.4 SECURITY ANALYSIS; 4.5 FINAL REMARKS; References; Chapter 5 TLS Protocol; 5.1 INTRODUCTION; 5.1.1 TLS PRF; 5.1.2 Generation of KeyingMaterial; 5.2 TLS 1.0; 5.2.1 Cipher Suites.
  • 5.2.2 CertificateManagement5.2.3 Alert Messages; 5.2.4 Other Differences; 5.3 TLS 1.1; 5.3.1 Preliminary Remarks; 5.3.2 Cipher Suites; 5.3.3 CertificateManagement; 5.3.4 Alert Messages; 5.3.5 Other Differences; 5.4 TLS 1.2; 5.4.1 TLS Extensions; 5.4.2 Cipher Suites; 5.4.3 CertificateManagement; 5.4.4 Alert Messages; 5.4.5 Other Differences; 5.5 TRAFFIC ANALYSIS OF A TLS SESSION; 5.6 SECURITY ANALYSIS; 5.7 FINAL REMARKS; References; Chapter 6 DTLS Protocol; 6.1 INTRODUCTION; 6.2 DTLS 1.0; 6.2.1 Record Protocol; 6.2.2 Handshake Protocol; 6.3 DTLS 1.2; 6.4 SECURITY ANALYSIS; 6.5 FINAL REMARKS.
  • 9.2.3 Trust Management9.3 FUTURE DEVELOPMENTS; References; Appendix Standardized TLS Cipher Suites; Abbreviations and Acronyms; About the Author; Index.