Manuel Mogollon
Manuel Mogollon

Table of Contents

CHAPTER 1: CLASSIC CRYPTOGRAPHY
Introduction
Classic Cipher Techniques
Early Cipher Machines
The Vernam Cipher
The Rotor Crypto Machines
Cryptanalysis in World War II
Summary
Learning Objectives Review

CHAPTER 2: INFORMATION ASSURANCE
Introduction
Computer Network Architecture
The OSI Model
The TCP/IP Model
Security Policies, Services, and Mechanisms
Placeholder Names Used in Cryptography
The Transformation of the Crypto Industry
US Export Regulations for Encryption Equipment
Summary
Learning Objectives Review

CHAPTER 3: NUMBER THEORY AND FINITE FIELDS
Introduction
Principle of Counting
The Euclidean Algorithm
Congruence Arithmetic
Summary of Properties
Calculation of the Reciprocal (Multiplicative Inverse)
Multiplication and Exponentiation in Modulo p
Finite Fields
Boolean Binary Expressions
Summary
Learning Objectives Review

CHAPTER 4: CONFIDENTIALITY – SYMMETRIC ENCRYPTION
Introduction
Crypto Systems
Stream Cipher Symmetric Encryption
Basic Theory of Enciphering
Perfect Secrecy
Shift Registers
Block Encryption Algorithms
Data Encryption Standard (DES)
Advanced Encryption Standard (AES)
Block Cipher Modes of Operation
Summary
Learning Objectives Review

CHAPTER 5: CONFIDENTIALITY – ASYMMETRIC ENCRYPTION
Introduction
Exponentiation and Public-Key Ciphers
Key Management
Security Services and Public-Key Encryption
Combining Asymmetric and Symmetric Ciphers
Variation of ElGamal System
Summary
Learning Objectives Review

CHAPTER 6: INTEGRITY AND AUTHENTICATION
Introduction
Message Authentication Code (MAC)
Hash Functions
Secure Hash Standard
MD5 Message Digest Algorithm
Keyed-Hash Message Authentication Code (HMAC)
Authentication (Digital Signatures)
Digital Signature Standard (FIPS 186-2)
Summary
Learning Objectives Review

CHAPTER 7: ACCESS AUTHENTICATION
Introduction
Authentication Concepts
IEEE 802.1X Authentication
Extensible Authentication Protocol (EAP)
EAP Password Mechanisms
Other Password Mechanisms
Password Security Considerations
EAP Authentication Servers
Remote Authentication Dial-in User Service (RADIUS)
Needham and Schroeder
Kerberos
ITU-T X.509 – Authentication Framework
Hash, and Encryption Recommendations
Summary
Learning Objectives Review

CHAPTER 8: ELLIPTIC CURVE CRYPTOGRAPHY
Introduction
Finite Fields
Elliptic Curves and Points
Selecting an Elliptic Curve and G, the Generator Point
Elliptic Curve Domain Parameters
Cryptography Using Elliptic Curves
EC Cipher Suites
Summary
Learning Objectives Review

CHAPTER 9: CERTIFICATES AND PUBLIC KEY INFRASTRUCTURE
Introduction
X.509 Basic Certificate Fields
RSA Certification
Cylink (Seek) Certification
Cylink Certification Based on ElGamal
Variation of ElGamal Certification
Public Key Infrastructure (PKI)
PKI Management Model
Certificate Life-Cycle
PKI Management Operations
CRL Basic Fields
CA Trust Models
Encryption Algorithms Supported in PKI
Private Key Proof of Possession (POP)
Two Models for PKI Deployment
Summary
Learning Objectives Review

CHAPTER 10: ELECTRONIC MAIL SECURITY
Introduction
Pretty Good Privacy (PGP)
PGP Email Compatibility
Key Rings
PGP Digital Certificates
Establishment of Trust
Secure MIME (S/MIME)
S/MIME Message Formats
Creating a Signed-only Message
Creating an Enveloped-Only Message
Signed and Enveloped MIME Entities
Summary
Learning Objectives Review

CHAPTER 11: VPNS AND IPSEC
Introduction
VPN Services
IPsec
Security Associations
Security Protocols
Algorithms for Encryption and Authentication in IPsec
Internet Key Exchange (IKE v2)
IPsec and IKE v2 Identifiers
Summary
Learning Objectives Review

CHAPTER 12: TLS, SSL, AND SET
Introduction
Transport Layer Security (TLS)
TLS Architecture
TLS Record Protocol
Handshake Protocol
Alert Message Protocol
Change Cipher Spec Protocol
Application Protocol
SSL VPN
Secure Electronic Transaction Protocol (SET)
Summary
Learning Objectives Review

CHAPTER 13: WEB SERVICES SECURITY
Web Services
Extensible Markup Language, XML
Simple Object Access Protocol (SOAP)
Universal Discovery, Description, and Integration, UDDI
Web Services Description Language, WSDL
Web Services Security
XML Security
XML Encryption
XML Signature
XML Key Management Specification
Security Assertion Markup Language (SAML)
Web Services Security Language (WS-Security)
Summary
Learning Objectives Review

CHAPTER 14: WIRELESS SECURITY
Introduction
WIMAX
WIMAX (IEEE 802.16e) Security
Wi-Fi
IEE802.11 Wireless LAN
802.11i – WLAN Security Enhancement
Wi-Fi Protected Access (WPA or WPA1) and WPA2
Bluetooth
Summary
Learning Objectives Review

GLOSSARY OF SECURITY TERMS

Index

News

Home Page Online

I am updating the Retirement Tool to include several withdrawal strategies.

 

Print Print | Sitemap
© Manuel Mogollon

This website was created using 1&1 MyWebsite Pesonal.