Cover image for Internet security : cryptographic principles, algorithms, and protocols
Title:
Internet security : cryptographic principles, algorithms, and protocols
Personal Author:
Publication Information:
Chichester, West Sussex, England : J. Wiley, 2003
ISBN:
9780470852859

Available:*

Library
Item Barcode
Call Number
Material Type
Item Category 1
Status
Searching...
30000010019504 TK5105.875.I57 R44 2003 Open Access Book Book
Searching...

On Order

Summary

Summary

Knowledge of number theory and abstract algebra are pre-requisites for any engineer designing a secure internet-based system.
However, most of the books currently available on the subject are aimed at practitioners who just want to know how the various tools available on the market work and what level of security they impart. These books traditionally deal with the science and mathematics only in so far as they are necessary to understand how the tools work.
Internet Security differs by its assertion that cryptography is the single most important technology for securing the Internet. To quote one reviewer "if every one of your communication partners were using a secure system based on encryption, viruses, worms and hackers would have a very hard time". This scenario does not reflect the reality of the Internet world as it currently stands. However, with security issues becoming more and more important internationally, engineers of the future will be required to design tougher, safer systems.
Internet Security:
* Offers an in-depth introduction to the relevant cryptographic principles, algorithms protocols - the nuts and bolts of creating a secure network
* Links cryptographic principles to the technologies in use on the Internet, eg. PGP, S/MIME, IPsec, SSL TLS, Firewalls and SET (protecting credit card transactions)
* Provides state-of-the-art analysis of the latest IETF standards plus summaries and explanations of RFC documents
* Authored by a recognised expert in security
Internet Security is the definitive text for graduate students on security and cryptography courses, and researchers in security and cryptography areas. It will prove to be invaluable to professionals engaged in the long-term development of secure systems.


Table of Contents

Author biographyp. xi
Prefacep. xiii
1 Internetworking and Layered Modelsp. 1
1.1 Networking Technologyp. 2
1.1.1 Local Area Networks (LANs)p. 2
1.1.2 Wide Area Networks (WANs)p. 3
1.2 Connecting Devicesp. 5
1.2.1 Switchesp. 5
1.2.2 Repeatersp. 6
1.2.3 Bridgesp. 6
1.2.4 Routersp. 7
1.2.5 Gatewaysp. 8
1.3 The OSI Modelp. 8
1.4 TCP/IP Modelp. 12
1.4.1 Network Access Layerp. 13
1.4.2 Internet Layerp. 13
1.4.3 Transport Layerp. 13
1.4.4 Application Layerp. 13
2 TCP/IP Suite and Internet Stack Protocolsp. 15
2.1 Network Layer Protocolsp. 15
2.1.1 Internet Protocol (IP)p. 15
2.1.2 Address Resolution Protocol (ARP)p. 28
2.1.3 Reverse Address Resolution Protocol (RARP)p. 31
2.1.4 Classless Interdomain Routing (CIDR)p. 32
2.1.5 IP Version 6 (IPv6, or IPng)p. 33
2.1.6 Internet Control Message Protocol (ICMP)p. 41
2.1.7 Internet Group Management Protocol (IGMP)p. 41
2.2 Transport Layer Protocolsp. 42
2.2.1 Transmission Control Protocol (TCP)p. 42
2.2.2 User Datagram Protocol (UDP)p. 45
2.3 World Wide Webp. 47
2.3.1 Hypertext Transfer Protocol (HTTP)p. 48
2.3.2 Hypertext Markup Language (HTML)p. 48
2.3.3 Common Gateway Interface (CGI)p. 49
2.3.4 Javap. 49
2.4 File Transferp. 50
2.4.1 File Transfer Protocol (FTP)p. 50
2.4.2 Trivial File Transfer Protocol (TFTP)p. 50
2.4.3 Network File System (NFS)p. 50
2.5 Electronic Mailp. 51
2.5.1 Simple Mail Transfer Protocol (SMTP)p. 51
2.5.2 Post Office Protocol Version 3 (POP3)p. 52
2.5.3 Internet Message Access Protocol (IMAP)p. 52
2.5.4 Multipurpose Internet Mail Extension (MIME)p. 52
2.6 Network Management Servicep. 53
2.6.1 Simple Network Management Protocol (SNMP)p. 53
2.7 Converting IP Addressesp. 54
2.7.1 Domain Name System (DNS)p. 54
2.8 Routing Protocolsp. 54
2.8.1 Routing Information Protocol (RIP)p. 54
2.8.2 Open Shortest Path First (OSPF)p. 55
2.8.3 Border Gateway Protocol (BGP)p. 55
2.9 Remote System Programsp. 56
2.9.1 TELNETp. 56
2.9.2 Remote Login (Rlogin)p. 56
3 Symmetric Block Ciphersp. 57
3.1 Data Encryption Standard (DES)p. 57
3.1.1 Description of the Algorithmp. 58
3.1.2 Key Schedulep. 60
3.1.3 DES Encryptionp. 62
3.1.4 DES Decryptionp. 67
3.1.5 Triple DESp. 71
3.1.6 DES-CBC Cipher Algorithm with IVp. 73
3.2 International Data Encryption Algorithm (IDEA)p. 75
3.2.1 Subkey Generation and Assignmentp. 76
3.2.2 IDEA Encryptionp. 77
3.2.3 IDEA Decryptionp. 82
3.3 RC5 Algorithmp. 84
3.3.1 Description of RC5p. 85
3.3.2 Key Expansionp. 86
3.3.3 Encryptionp. 91
3.3.4 Decryptionp. 92
3.4 RC6 Algorithmp. 95
3.4.1 Description of RC6p. 95
3.4.2 Key Schedulep. 96
3.4.3 Encryptionp. 97
3.4.4 Decryptionp. 100
3.5 AES (Rijndael) Algorithmp. 107
3.5.1 Notational Conventionsp. 107
3.5.2 Mathematical Operationsp. 108
3.5.3 AES Algorithm Specificationp. 111
4 Hash Function, Message Digest and Message Authentication Codep. 123
4.1 DMDC Algorithmp. 123
4.1.1 Key Schedulep. 124
4.1.2 Computation of Message Digestsp. 128
4.2 Advanced DMDC Algorithmp. 133
4.2.1 Key Schedulep. 133
4.2.2 Computation of Message Digestsp. 136
4.3 MD5 Message-digest Algorithmp. 138
4.3.1 Append Padding Bitsp. 138
4.3.2 Append Lengthp. 138
4.3.3 Initialise MD Bufferp. 138
4.3.4 Define Four Auxiliary Functions (F, G, H, I)p. 139
4.3.5 FF, GG, HH and II Transformations for Rounds 1, 2, 3 and 4p. 139
4.3.6 Computation of Four Rounds (64 Steps)p. 140
4.4 Secure Hash Algorithm (SHA-1)p. 149
4.4.1 Message Paddingp. 149
4.4.2 Initialise 160-Bit Bufferp. 150
4.4.3 Functions Usedp. 150
4.4.4 Constants Usedp. 150
4.4.5 Computing the Message Digestp. 151
4.5 Hashed Message Authentication Codes (HMAC)p. 155
5 Asymmetric Public-key Cryptosystemsp. 161
5.1 Diffie--Hellman Exponential Key Exchangep. 161
5.2 RSA Public-key Cryptosystemp. 165
5.2.1 RSA Encryption Algorithmp. 165
5.2.2 RSA Signature Schemep. 170
5.3 ElGamals Public-key Cryptosystemp. 172
5.3.1 ElGamal Encryptionp. 173
5.3.2 ElGamal Signaturesp. 175
5.3.3 ElGamal Authentication Schemep. 177
5.4 Schnorr's Public-key Cryptosystemp. 179
5.4.1 Schnorr's Authentication Algorithmp. 179
5.4.2 Schnorr's Signature Algorithmp. 181
5.5 Digital Signature Algorithmp. 184
5.6 The Elliptic Curve Cryptosystem (ECC)p. 187
5.6.1 Elliptic Curvesp. 187
5.6.2 Elliptic Curve Cryptosystem Applied to the ElGamal Algorithmp. 195
5.6.3 Elliptic Curve Digital Signature Algorithmp. 196
5.6.4 ECDSA Signature Computationp. 198
6 Public-key Infrastructurep. 201
6.1 Internet Publications for Standardsp. 202
6.2 Digital Signing Techniquesp. 203
6.3 Functional Roles of PKI Entitiesp. 210
6.3.1 Policy Approval Authorityp. 210
6.3.2 Policy Certification Authorityp. 212
6.3.3 Certification Authorityp. 213
6.3.4 Organisational Registration Authorityp. 214
6.4 Key Elements for PKI Operationsp. 215
6.4.1 Hierarchical Tree Structuresp. 216
6.4.2 Policy-making Authorityp. 217
6.4.3 Cross-certificationp. 218
6.4.4 X.500 Distinguished Namingp. 221
6.4.5 Secure Key Generation and Distributionp. 222
6.5 X.509 Certificate Formatsp. 222
6.5.1 X.509 v1 Certificate Formatp. 223
6.5.2 X.509 v2 Certificate Formatp. 225
6.5.3 X.509 v3 Certificate Formatp. 226
6.6 Certificate Revocation Listp. 233
6.6.1 CRL Fieldsp. 234
6.6.2 CRL Extensionsp. 235
6.6.3 CRL Entry Extensionsp. 237
6.7 Certification Path Validationp. 238
6.7.1 Basic Path Validationp. 239
6.7.2 Extending Path Validationp. 240
7 Network Layer Securityp. 243
7.1 IPsec Protocolp. 243
7.1.1 IPsec Protocol Documentsp. 244
7.1.2 Security Associations (SAs)p. 246
7.1.3 Hashed Message Authentication Code (HMAC)p. 248
7.2 IP Authentication Headerp. 250
7.2.1 AH Formatp. 251
7.2.2 AH Locationp. 253
7.3 IP ESPp. 253
7.3.1 ESP Packet Formatp. 254
7.3.2 ESP Header Locationp. 256
7.3.3 Encryption and Authentication Algorithmsp. 258
7.4 Key Management Protocol for IPsecp. 260
7.4.1 OAKLEY Key Determination Protocolp. 260
7.4.2 ISAKMPp. 261
8 Transport Layer Security: SSLv3 and TLSv1p. 277
8.1 SSL Protocolp. 277
8.1.1 Session and Connection Statesp. 278
8.1.2 SSL Record Protocolp. 279
8.1.3 SSL Change Cipher Spec Protocolp. 282
8.1.4 SSL Alert Protocolp. 283
8.1.5 SSL Handshake Protocolp. 284
8.2 Cryptographic Computationsp. 290
8.2.1 Computing the Master Secretp. 290
8.2.2 Converting the Master Secret into Cryptographic Parametersp. 291
8.3 TLS Protocolp. 293
8.3.1 HMAC Algorithmp. 293
8.3.2 Pseudo-random Functionp. 296
8.3.3 Error Alertsp. 300
8.3.4 Certificate Verify Messagep. 302
8.3.5 Finished Messagep. 302
8.3.6 Cryptographic Computations (For TLS)p. 302
9 Electronic Mail Security: PGP, S/MIMEp. 305
9.1 PGPp. 305
9.1.1 Confidentiality via Encryptionp. 306
9.1.2 Authentication via Digital Signaturep. 307
9.1.3 Compressionp. 308
9.1.4 Radix-64 Conversionp. 309
9.1.5 Packet Headersp. 313
9.1.6 PGP Packet Structurep. 315
9.1.7 Key Material Packetp. 319
9.1.8 Algorithms for PGP 5.xp. 323
9.2 S/MIMEp. 324
9.2.1 MIMEp. 325
9.2.2 S/MIMEp. 331
9.2.3 Enhanced Security Services for S/MIMEp. 335
10 Internet Firewalls for Trusted Systemsp. 339
10.1 Role of Firewallsp. 339
10.2 Firewall-Related Terminologyp. 340
10.2.1 Bastion Hostp. 341
10.2.2 Proxy Serverp. 341
10.2.3 SOCKSp. 342
10.2.4 Choke Pointp. 343
10.2.5 De-militarised Zone (DMZ)p. 343
10.2.6 Logging and Alarmsp. 343
10.2.7 VPNp. 344
10.3 Types of Firewallsp. 344
10.3.1 Packet Filtersp. 344
10.3.2 Circuit-level Gatewaysp. 349
10.3.3 Application-level Gatewaysp. 349
10.4 Firewall Designsp. 350
10.4.1 Screened Host Firewall (Single-homed Bastion Host)p. 351
10.4.2 Screened Host Firewall (Dual-homed Bastion Host)p. 351
10.4.3 Screened Subnet Firewallp. 352
11 SET for E-commerce Transactionsp. 355
11.1 Business Requirements for SETp. 355
11.2 SET System Participantsp. 357
11.3 Cryptographic Operation Principlesp. 358
11.4 Dual Signature and Signature Verificationp. 359
11.5 Authentication and Message Integrityp. 363
11.6 Payment Processingp. 366
11.6.1 Cardholder Registrationp. 366
11.6.2 Merchant Registrationp. 371
11.6.3 Purchase Requestp. 373
11.6.4 Payment Authorisationp. 374
11.6.5 Payment Capturep. 376
Acronymsp. 379
Bibliographyp. 383
Indexp. 391