000 04464nam a22005655i 4500
001 978-3-031-19439-9
003 DE-He213
005 20240423125316.0
007 cr nn 008mamaa
008 221125s2022 sz | s |||| 0|eng d
020 _a9783031194399
_9978-3-031-19439-9
024 7 _a10.1007/978-3-031-19439-9
_2doi
050 4 _aQA268
072 7 _aGPJ
_2bicssc
072 7 _aURY
_2bicssc
072 7 _aCOM083000
_2bisacsh
072 7 _aGPJ
_2thema
072 7 _aURY
_2thema
082 0 4 _a005.824
_223
100 1 _aSchwenk, Jörg.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
245 1 0 _aGuide to Internet Cryptography
_h[electronic resource] :
_bSecurity Protocols and Real-World Attack Implications /
_cby Jörg Schwenk.
250 _a1st ed. 2022.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2022.
300 _aXIX, 530 p. 272 illus., 80 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aInformation Security and Cryptography,
_x2197-845X
505 0 _aIntroduction -- The Internet -- Cryptography: Confidentiality -- Cryptography: Integrity and Authenticity -- Cryptographic Protocols -- Point-to-Point Security -- Wireless LAN (WLAN) -- Cellular Networks -- IP Security (IPsec) -- Security of HTTP -- Transport Layer Security -- A Short History of TLS -- Attacks on SSL and TLS -- Secure Shell (SSH) -- Kerberos -- DNS Security -- File Encryption: PGP -- Email Security: S/MIME -- Attacks on S/MIME and OpenPGP -- Email: Protocols and SPAM -- Web Security and Single Sign-On Protocols -- Cryptographic Data Formats -- Index.
520 _aResearch over the last two decades has considerably expanded knowledge of Internet cryptography, revealing the important interplay between standardization, implementation, and research. This practical textbook/guide is intended for academic courses in IT security and as a reference guide for Internet security. It describes important Internet standards in a language close to real-world cryptographic research and covers the essential cryptographic standards used on the Internet, from WLAN encryption to TLS and e-mail security. From academic and non-academic research, the book collects information about attacks on implementations of these standards (because these attacks are the main source of new insights into real-world cryptography). By summarizing all this in one place, this useful volume can highlight cross-influences in standards, as well as similarities in cryptographic constructions. Topics and features: · Covers the essential standards in Internet cryptography · Integrates work exercises and problems in each chapter · Focuses especially on IPsec, secure e-mail and TLS · Summarizes real-world cryptography in three introductory chapters · Includes necessary background from computer networks · Keeps mathematical formalism to a minimum, and treats cryptographic primitives mainly as blackboxes · Provides additional background on web security in two concluding chapters Offering a uniquely real-world approach to Internet cryptography, this textbook/reference will be highly suitable to students in advanced courses on cryptography/cryptology, as well as eminently useful to professionals looking to expand their background and expertise. Professor Dr. Jörg Schwenk holds the Chair for Network and Data Security at the Ruhr University in Bochum, Germany. He (co-)authored about 150 papers on the book’s topics, including for conferences like ACM CCS, Usenix Security, IEEE S&P, and NDSS.
650 0 _aCryptography.
650 0 _aData encryption (Computer science).
650 0 _aData protection.
650 1 4 _aCryptology.
650 2 4 _aData and Information Security.
650 2 4 _aSecurity Services.
710 2 _aSpringerLink (Online service)
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783031194382
776 0 8 _iPrinted edition:
_z9783031194405
776 0 8 _iPrinted edition:
_z9783031194412
830 0 _aInformation Security and Cryptography,
_x2197-845X
856 4 0 _uhttps://doi.org/10.1007/978-3-031-19439-9
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
942 _cSPRINGER
999 _c176540
_d176540