Demystifying Cryptography with OpenSSL 3.0 : Discover the Best Techniques to Enhance Your Network Security with OpenSSL 3. 0 /
Use OpenSSL to add security features to your application, including cryptographically strong symmetric and asymmetric encryption, digital signatures, SSL/TLS connectivity, and PKI handling Key Features Secure your applications against common network security threats using OpenSSL Get to grips with t...
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Otros Autores: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Birmingham :
Packt Publishing, Limited,
2022.
|
Temas: | |
Acceso en línea: | Texto completo (Requiere registro previo con correo institucional) |
Tabla de Contenidos:
- Cover
- Title page
- Copyright and Credits
- Dedication
- Foreword
- Contributors
- Table of Contents
- Preface
- Part 1: Introduction
- Chapter 1: OpenSSL and Other SSL/TLS Libraries
- What is OpenSSL?
- The history of OpenSSL
- What's new in OpenSSL 3.0?
- Comparing OpenSSL with GnuTLS
- Comparing OpenSSL with NSS
- Comparing OpenSSL with Botan
- Comparing OpenSSL with lightweight TLS libraries
- Comparing OpenSSL with LibreSSL
- Comparing OpenSSL with BoringSSL
- Summary
- Part 2: Symmetric Cryptography
- Chapter 2: Symmetric Encryption and Decryption
- Technical requirements
- Understanding symmetric encryption
- An overview of the symmetric ciphers supported by OpenSSL
- Comparing block ciphers and stream ciphers
- Understanding symmetric cipher security
- How many bits of security is enough?
- Reviewing the AES cipher
- Reviewing DES and 3DES ciphers
- Reviewing the RC4 cipher
- Reviewing the ChaCha20 cipher
- Reviewing other symmetric ciphers supported by OpenSSL
- Block cipher modes of operation
- Reviewing the Electronic Code Book mode
- Reviewing CBC mode
- Reviewing CTR mode
- Reviewing GCM
- Reviewing AES-GCM-SIV
- Other block cipher operation modes
- Choosing the block cipher operation mode
- Padding for block ciphers
- How to generate a symmetric encryption key
- Downloading and installing OpenSSL
- How to encrypt and decrypt with AES on the command line
- Initializing and uninitializing OpenSSL library
- How to compile and link with OpenSSL
- How to encrypt with AES programmatically
- Implementing the encryption program
- Running the encrypt program
- How to decrypt with AES programmatically
- Implementing the decrypt program
- Running the decrypt program
- Summary
- Chapter 3: Message Digests
- Technical requirements
- What are message digests and cryptographic hash functions?
- Why are message digests needed?
- Data integrity verification
- Basis for HMAC
- Digital signatures
- Network protocols
- Password verification
- Content identifier
- Blockchain and cryptocurrencies
- Proof-of-work
- Assessing the security of cryptographic hash functions
- Overview of the cryptographic hash functions supported by OpenSSL
- Reviewing the SHA-2 family of hash functions
- Reviewing the SHA-3 family of hash functions
- Reviewing the SHA-1 and SHA-0 hash functions
- Reviewing the MD family of hash functions
- Reviewing the BLAKE2 family of hash functions
- Reviewing less popular hash functions supported by OpenSSL
- Which cryptographic hash function should you choose?
- How to calculate a message digest on the command line
- How to calculate the message digest programmatically
- Implementing the digest program
- Running the digest program
- Summary
- Chapter 4: MAC and HMAC
- Technical requirements
- What is a MAC?
- Understanding MAC function security
- HMAC
- a hash-based MAC