Synopsis:
A practical guide to Cryptography and its use in the Internet and other communication networks.
This overview takes the reader through basic issues and on to more advanced concepts, to cover all levels of interest. Coverage includes all key mathematical concepts, standardisation, authentication, elliptic curve cryptography, and algorithm modes and protocols (including SSL, TLS, IPSec, SMIME, & PGP protocols).
* Details what the risks on the internet are and how cryptography can help
* Includes a chapter on interception which is unique amongst competing books in this field
* Explains Public Key Infrastructures (PKIs) - currently the most important issue when using cryptography in a large organisation
* Includes up-to-date referencing of people, organisations, books and Web sites and the latest information about recent acts and standards affecting encryption practice
* Tackles the practical issues such as the difference between SSL and IPSec, which companies are active on the market and where to get further information
From the Back Cover:
Cryptography and Public Key Infrastructure on the Internet provides a thorough overview of the subject. It explains how susceptible networks are to hacking and how cryptography can help. This comprehensive and practical guide covers:
* Public Key Infrastructures (PKIs); important when using cryptography in a large organisation,
* the difference between the SSL protocol and the IPSec standard,
* integration of cryptography into the different OSI-layers, and how to decide whether hardware or software solutions are the right means to achieve this.
The book also includes sections on::
* standardisation
* authentication
* elliptic curve cryptography
* chip cards
* algorithm modes and protocols - including SSL, TLS, IPSec, SMIME and PGP protocols
* cryptography's connection with biometry (using biological characteristics for authentication purposes).
Cryptography and Public Key Infrastructure on the Internet is an indispensable guide for all levels of reader. It contains valuable reference material about statutes and standards affecting encryption, which companies are active in the market, and a reference guide to people, organisations, books and websites to go to for further information.
"About this title" may belong to another edition of this title.