Coronavirus, Tracking Coronavirus, Cryptography, Value of Military Bases, Retirement Tool, Check your Retirement

Table of Contents

Table of Contents

CHAPTER 1: CLASSIC CRYPTOGRAPHY 
  • Introduction
  • Classic Cipher Techniques
  • Early Cipher Machines
  • The Vernam Cipher
  • The Rotor Crypto Machines
  • Cryptanalysis in World War II
  • Summary
  • Learning Objectives Review

CHAPTER 2: INFORMATION ASSURANCE
  • Introduction
  • Computer Network Architecture
  • The OSI Model
  • The TCP/IP Model
  • Security Policies, Services, and Mechanisms
  • Placeholder Names Used in Cryptography
  • The Transformation of the Crypto Industry
  • US Export Regulations for Encryption Equipment
  • Summary
  • Learning Objectives Review

CHAPTER 3: NUMBER THEORY AND FINITE FIELDS
  • Introduction
  • Principle of Counting
  • The Euclidean Algorithm
  • Congruence Arithmetic
  • Summary of Properties
  • Calculation of the Reciprocal (Multiplicative Inverse)
  • Multiplication and Exponentiation in Modulo p
  • Finite Fields
  • Boolean Binary Expressions
  • Summary
  • Learning Objectives Review

CHAPTER 4: CONFIDENTIALITY – SYMMETRIC ENCRYPTION
  • Introduction
  • Crypto Systems
  • Stream Cipher Symmetric Encryption
  • Basic Theory of Enciphering
  • Perfect Secrecy
  • Shift Registers
  • Block Encryption Algorithms
  • Data Encryption Standard (DES)
  • Advanced Encryption Standard (AES)
  • Block Cipher Modes of Operation
  • Summary
  • Learning Objectives Review

CHAPTER 5: CONFIDENTIALITY – ASYMMETRIC ENCRYPTION
  • Introduction
  • Exponentiation and Public-Key Ciphers
  • Key Management
  • Security Services and Public-Key Encryption
  • Combining Asymmetric and Symmetric Ciphers
  • Variation of ElGamal System
  • Summary
  • Learning Objectives Review

CHAPTER 6: INTEGRITY AND AUTHENTICATION
  • Introduction
  • Message Authentication Code (MAC)
  • Hash Functions
  • Secure Hash Standard
  • MD5 Message Digest Algorithm
  • Keyed-Hash Message Authentication Code (HMAC)
  • Authentication (Digital Signatures)
  • Digital Signature Standard (FIPS 186-2)
  • Summary
  • Learning Objectives Review

CHAPTER 7: ACCESS AUTHENTICATION
  • Introduction
  • Authentication Concepts
  • IEEE 802.1X Authentication
  • Extensible Authentication Protocol (EAP)
  • EAP Password Mechanisms
  • Other Password Mechanisms
  • Password Security Considerations
  • EAP Authentication Servers
  • Remote Authentication Dial-in User Service (RADIUS)
  • Needham and Schroeder
  • Kerberos
  • ITU-T X.509 – Authentication Framework
  • Hash, and Encryption Recommendations
  • Summary
  • Learning Objectives Review

CHAPTER 8: ELLIPTIC CURVE CRYPTOGRAPHY
  • Introduction
  • Finite Fields
  • Elliptic Curves and Points
  • Selecting an Elliptic Curve and G, the Generator Point
  • Elliptic Curve Domain Parameters
  • Cryptography Using Elliptic Curves
  • EC Cipher Suites
  • Summary
  • Learning Objectives Review

CHAPTER 9: CERTIFICATES AND PUBLIC KEY INFRASTRUCTURE
  • Introduction
  • X.509 Basic Certificate Fields
  • RSA Certification
  • Cylink (Seek) Certification
  • Cylink Certification Based on ElGamal
  • Variation of ElGamal Certification
  • Public Key Infrastructure (PKI)
  • PKI Management Model
  • Certificate Life-Cycle
  • PKI Management Operations
  • CRL Basic Fields
  • CA Trust Models
  • Encryption Algorithms Supported in PKI
  • Private Key Proof of Possession (POP)
  • Two Models for PKI Deployment
  • Summary
  • Learning Objectives Review

CHAPTER 10: ELECTRONIC MAIL SECURITY
  • Introduction
  • Pretty Good Privacy (PGP)
  • PGP Email Compatibility
  • Key Rings
  • PGP Digital Certificates
  • Establishment of Trust
  • Secure MIME (S/MIME)
  • S/MIME Message Formats
  • Creating a Signed-only Message
  • Creating an Enveloped-Only Message
  • Signed and Enveloped MIME Entities
  • Summary
  • Learning Objectives Review

CHAPTER 11: VPNS AND IPSEC
  • Introduction
  • VPN Services
  • IPsec
  • Security Associations
  • Security Protocols
  • Algorithms for Encryption and Authentication in IPsec
  • Internet Key Exchange (IKE v2)
  • IPsec and IKE v2 Identifiers
  • Summary
  • Learning Objectives Review

CHAPTER 12: TLS, SSL, AND SET
  • Introduction
  • Transport Layer Security (TLS)
  • TLS Architecture
  • TLS Record Protocol
  • Handshake Protocol
  • Alert Message Protocol
  • Change Cipher Spec Protocol
  • Application Protocol
  • SSL VPN
  • Secure Electronic Transaction Protocol (SET)
  • Summary
  • Learning Objectives Review

CHAPTER 13: WEB SERVICES SECURITY
  • Web Services
  • Extensible Markup Language, XML
  • Simple Object Access Protocol (SOAP)
  • Universal Discovery, Description, and Integration, UDDI
  • Web Services Description Language, WSDL
  • Web Services Security
  • XML Security
  • XML Encryption
  • XML Signature
  • XML Key Management Specification
  • Security Assertion Markup Language (SAML)
  • Web Services Security Language (WS-Security)
  • Summary
  • Learning Objectives Review

CHAPTER 14: WIRELESS SECURITY
  • Introduction
  • WIMAX
  • WIMAX (IEEE 802.16e) Security
  • Wi-Fi
  • IEE802.11 Wireless LAN
  • 802.11i – WLAN Security Enhancement
  • Wi-Fi Protected Access (WPA or WPA1) and WPA2
  • Bluetooth
  • Summary
  • Learning Objectives Review

GLOSSARY OF SECURITY TERMS

INDEX
Share by: