Cover image for Cryptography for dummies
Title:
Cryptography for dummies
Personal Author:
Series:
--For dummies
Publication Information:
Indianapolis, Ind. : Wiley Pubs, 2004
ISBN:
9780764541889

Available:*

Library
Item Barcode
Call Number
Material Type
Item Category 1
Status
Searching...
30000010070369 TK5102.94 C62 2004 Open Access Book Book
Searching...
Searching...
30000010076878 QA76.9 .M35 C37 2004 Open Access Book Book
Searching...

On Order

Summary

Summary

Cryptography is the most effective way to achieve data security and is essential to e-commerce activities such as online shopping, stock trading, and banking This invaluable introduction to the basics of encryption covers everything from the terminology used in the field to specific technologies to the pros and cons of different implementations Discusses specific technologies that incorporate cryptography in their design, such as authentication methods, wireless encryption, e-commerce, and smart cards Based entirely on real-world issues and situations, the material provides instructions for already available technologies that readers can put to work immediately Expert author Chey Cobb is retired from the NRO, where she held a Top Secret security clearance, instructed employees of the CIA and NSA on computer security and helped develop the computer security policies used by all U.S. intelligence agencies


Author Notes

Chey Cobb, CISSP, was Chief Security Officer for a National Reconnaissance Office (NRO) overseas location. She is a nationally recognized computer security expert


Table of Contents

Introductionp. 1
About This Bookp. 2
How to Use This Bookp. 2
What You Don't Need to Readp. 3
Foolish Assumptionsp. 3
How This Book Is Organizedp. 3
Icons Used in This Bookp. 5
Where to Go from Herep. 5
Part I Crypto Basics & What You Really Need to Knowp. 7
Chapter 1 A Primer on Crypto Basicsp. 9
It's Not about James Bondp. 9
Getting to Know the Basic Termsp. 12
What Makes a Cipher?p. 13
Breaking Ciphersp. 20
Cryptosystemsp. 22
Everyday Uses of Encryptionp. 23
Why Encryption Isn't More Commonplacep. 28
Chapter 2 Major League Algorithmsp. 33
Beware of "Snake Oil"p. 34
Symmetric Keys Are All the Samep. 37
Symmetric Algorithms Come in Different Flavorsp. 40
Identifying Symmetric Algorithmsp. 45
Asymmetric Keysp. 47
Working Togetherp. 52
Chapter 3 Deciding What You Really Needp. 53
Justifying the Costs to Managementp. 53
Do You Need Secure Communications?p. 62
Do You Need to Authenticate Users?p. 69
Do You Need to Ensure Confidentiality and Integrity?p. 75
Protecting Personal Datap. 75
What's It Gonna Cost?p. 77
Chapter 4 Locks and Keysp. 79
The Magic Passphrasep. 80
The Key Conceptp. 88
Part II Public Key Infrastructurep. 93
Chapter 5 The PKI Primerp. 95
What Is PKI?p. 96
Uses for PKI Systemsp. 103
Common PKI Problemsp. 105
Chapter 6 PKI Bits and Piecesp. 107
Certificate Authoritiesp. 108
Certificate Policies (CPs)p. 111
Digital Certificates and Keysp. 112
D'basing Your Certificatesp. 113
Certificate Revocationp. 114
Picking the PKCSp. 115
Chapter 7 All Keyed Up!p. 119
So, What Exactly IS a Key?p. 120
Making a Keyp. 120
The Long and Short of Itp. 121
Randomness in Keys Is Goodp. 122
Storing Your Keys Safelyp. 123
Keys for Different Purposesp. 124
Keys and Algorithmsp. 124
One Key; Two Keysp. 125
Trusting Those Keysp. 129
Key Serversp. 130
Part III Putting Encryption Technologies to Work for Youp. 135
Chapter 8 Securing E-Mail from Prying Eyesp. 137
E-Mail Encryption Basicsp. 138
Digital Certificates or PGP Public/Private Key Pairs?p. 140
Using S/MIMEp. 142
Fun and Games with PGPp. 153
Other Encryption Stuff to Tryp. 164
Chapter 9 File and Storage Strategiesp. 167
Why Encrypt Your Data?p. 168
Encrypted Storage Roulettep. 170
Dealing with Integrity Issuesp. 174
Policies and Proceduresp. 177
Examples of Encryption Storagep. 178
Chapter 10 Authentication Systemsp. 183
Common Authentication Systemsp. 185
Authentication Protocolsp. 188
How Authentication Systems Use Digital Certificatesp. 190
Tokens, Smart Cards, and Biometricsp. 191
Chapter 11 Secure E-Commercep. 197
SSL Is the Standardp. 198
Time for TLSp. 203
Setting Up an SSL Solutionp. 204
XML Is the New Kid on the Blockp. 209
Going for Outsourced E-Commercep. 210
Chapter 12 Virtual Private Network (VPN) Encryptionp. 213
How Do VPNs Work Their Magic?p. 214
Setting Up a VPNp. 214
Various VPN Encryption Schemesp. 217
Which Is Best?p. 220
Testing, Testing, Testingp. 221
Chapter 13 Wireless Encryption Basicsp. 223
Why WEP Makes Us Weepp. 224
WEP Attack Methodsp. 227
Wireless Protection Measuresp. 230
Part IV The Part of Tensp. 235
Chapter 14 The Ten Best Encryption Web Sitesp. 237
Mat Blaze's Cryptography Resource on the Webp. 237
The Center for Democracy and Technologyp. 237
SSL Reviewp. 238
How IPsec Worksp. 238
Code and Cipherp. 238
CERIAS--Center for Education and Research in Information Assurance and Securityp. 238
The Invisible Cryptologists--African Americans, WWII to 1956p. 239
Bruce Schneierp. 239
North American Cryptography Archivesp. 239
RSA's Crypto FAQp. 239
Chapter 15 The Ten Most Commonly Misunderstood Encryption Termsp. 241
Military-Grade Encryptionp. 241
Trusted Third Partyp. 241
X.509 Certificatesp. 242
Rubber Hose Attackp. 242
Shared Secretp. 242
Key Escrowp. 242
Initialization Vectorp. 243
Alice, Bob, Carol, and Davep. 243
Secret Algorithmp. 243
Steganographyp. 244
Chapter 16 Cryptography Do's and Don'tsp. 245
Do Be Sure the Plaintext Is Destroyed after a Document Is Encryptedp. 245
Do Protect Your Key Recovery Database and Other Key Servers to the Greatest Extent Possiblep. 246
Don't Store Your Private Keys on the Hard Drive of Your Laptop or Other Personal Computing Devicep. 246
Do Make Sure Your Servers' Operating Systems Are "Hardened" before You Install Cryptological Systems on Themp. 246
Do Train Your Users against Social Engineeringp. 247
Do Create the Largest Key Size Possiblep. 247
Do Test Your Cryptosystem after You Have It Up and Runningp. 248
Do Check the CERT Advisories and Vendor Advisories about Flaws and Weaknesses in Cryptosystemsp. 248
Don't Install a Cryptosystem Yourself If You're Not Sure What You Are Doingp. 248
Don't Use Unknown, Untested Algorithmsp. 249
Chapter 17 Ten Principles of "Cryptiquette"p. 251
If Someone Sends You an Encrypted Message, Reply in Kindp. 251
Don't Create Too Many Keysp. 251
Don't Immediately Trust Someone Just Because He/She Has a Public Keyp. 252
Always Back Up Your Keys and Passphrasesp. 252
Be Wary of What You Put in the Subject Line of Encrypted Messagesp. 252
If You Lose Your Key or Passphrase, Revoke Your Keys as Soon as Possiblep. 253
Don't Publish Someone's Public Key to a Public Key Server without His/Her Permissionp. 253
Don't Sign Someone's Public Key Unless You Have Reason Top. 253
If You Are Corresponding with Someone for the First Time, Send an Introductory Note Along with Your Public Keyp. 254
Be Circumspect in What You Encryptp. 254
Chapter 18 Ten Very Useful Encryption Productsp. 255
PGP: Pretty Good Privacyp. 255
GAIMp. 255
madeSafe Vaultp. 256
Password Safep. 256
Kerberosp. 256
OpenSSL and Apache SSLp. 256
SafeHousep. 257
WebCryptp. 257
Privacy Masterp. 257
Advanced Encryption Packagep. 257
Part V Appendixesp. 259
Appendix A Cryptographic Attacksp. 261
Known Plaintext Attackp. 262
Chosen Ciphertext Attacksp. 262
Chosen Plaintext Attacksp. 263
The Birthday Attackp. 263
Man-in-the-Middle Attackp. 263
Timing Attacksp. 264
Rubber Hose Attackp. 264
Electrical Fluctuation Attacksp. 265
Major Boo-Boosp. 265
Appendix B Glossaryp. 267
Appendix C Encryption Export Controlsp. 279
Indexp. 283