Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more ➡
Download
Standard view
Full view
of .
Add note
Save to My Library
Sync to mobile
Look up keyword or section
Like this
6Activity
×

Table Of Contents

Digital Signatures
Digital Signatures (ctd)
Message/Data Encryption
Message/data Encryption (ctd)
Security Protocol Layers
Encryption and Authentication Algorithms and Technology
Historical Ciphers
Substitution Ciphers
One-time Pad (1917)
One-time Pad (ctd)
Cipher Machines (~1920)
Cipher Machines (ctd)
Stream Ciphers
Stream Ciphers (ctd)
RC4
RC4 (ctd)
Block Ciphers
Block Ciphers (ctd)
Attacking FeistelCiphers
Strength of DES
DES Key Problems
Breaking DES
Breaking DES (ctd)
Brute-force Encryption Breaking
Other Block Ciphers (ctd)
Using Block Ciphers
Using Block Ciphers (ctd)
Relative Performance
Public Key Encryption
Example: RSA
Example: RSA (ctd)
Public-key Algorithms
Public-key Algorithms (ctd)
Elliptic Curve Algorithms
Elliptic Curve Algorithms (ctd)
Advantages/Disadvantages of ECC’s
Key Sizes and Algorithms
Key Sizes and Algorithms (ctd)
Hash Algorithms
MAC Algorithms
Algorithms
Key Management and Certificates
Key Management
Key Management Problems
Key Lifetimes and Key Compromise
Key Distribution
Key Distribution (ctd)
Certification Authorities
Obtaining a Certificate (ctd)
Role of a CA
Certificate History
Certificate History (ctd)
X.500 Naming
X.500 Naming (ctd)
Problems with X.500 Names
Problems with X.500 Names (ctd)
DNs in Practice
DNs in Practice (ctd)
Solving the DN Problem
Solving the DN Problem (ctd)
Non-DN Names
Problems with Naming/Identity Certificates
Qualified Certificates
Qualified Certificates (ctd)
The X.500 Directory
The X.500 Directory (ctd)
Searching the Directory
Directory Implementation
Directory Access
LDAP
LDAP (ctd)
Key Databases/Directories
CA Hierarchy in Theory
CA Hierarchy in Practice
Cross-Certification
Bridge CAs
X.509 Certificate Usage Model
Certificate Revocation
CRL Problems
Certificate Revocation (ctd)
Bypassing CRLs
Online Status Checking
Cost of Revocation Checking
Cost of Revocation Checking (ctd)
Rev./Status Checking in the Real World
Rev./Status Checking in the Real World(ctd)
Revocation as Distributed Trans.Processing
Revocation as Distributed TP (ctd)
Certificate Chains
Certificate Chains (ctd)
Closing the Circle
Closing the Circle (ctd)
Key Backup/Archival
Key Backup/Archival (ctd)
Key Destruction
What is Trust?
Certificate Structure
Certificate Structure (ctd)
Certificate Extensions
Certificate Extensions (ctd)
Certificate Usage Extensions
Certificate Constraint Extensions
Certificate Constraint Extensions (ctd)
Certificate Profiles
Setting up a CA
Bootstrapping a CA
Bootstrapping a CA (ctd)
Business Expectations of a CA
Business Expectations of a CA (ctd)
CA Business Model
Finding a Workable Business Model
Finding a Workable Business Model (ctd)
CA Policies
CA’s and Scaling
RA’s
Timestamping
Problems with X.509
Problems with Implementations
Problems with Implementations (ctd)
Problems with an X.509-style PKI
Problems with an X.509-style PKI (ctd)
How Effective are Certificates Really?
How Effective are Certificates Really? (ctd)
PGP Certificates
Alternative Trust Hierarchies
SPKI
SPKI (ctd)
SPKI Certificate Uses
Trust Evaluation
Trust Evaluation (ctd)
PKI Design Guidelines
Digital Signature Legislation
Digital Signature Legislation (ctd)
Real-world vsElectronic Signatures
Real-world vsElectronic Signatures (ctd)
General Requirements for Digital Signatures
General Requirements for Digital Sigs(ctd)
Utah Digital Signature Act
California Digital Signature Law
Massachusetts Electronic Records and Signatures Bill
US E-Sign Act
US E-Sign Act (ctd)
German Digital Signature Law
German Digital Signature Law (ctd)
Italian Digital Signature Law
Italian Digital Signature Law (ctd)
Swedish Electronic ID card (SEIS)
SEIS (ctd)
Singapore Electronic Transactions Act
ETSI Digital Signature Draft
UNCITRAL Model Law on Electronic Commerce
Processing
IPSEC Key Management
Photuris
Photuris(ctd)
SKIP
Oakley
ISAKMP
ISAKMP/Oakley
ISAKMP/Oakley(ctd)
SSL
History
SSL Handshake
SSL Characteristics
Strong SSL Encryption
Strong SSL Browsers
Strong SSL Browsers (ctd)
Strong SSL Servers
Strong SSL Proxies
SGC
SGC (ctd)
TLS
S-HTTP
SSH
SSH Protocol
SSH Authentication
DNSSEC
SNMP Security
Email Security
Email Security Requirements
Security Mechanisms (ctd)
PEM
PEM Protection Types
PEM Protection Types (ctd)
PEM CA Hierarchy
PEM CA Hierarchy (ctd)
Why PEM Failed
Why PEM Failed (ctd)
PGP
PGP (ctd)
Legal Problems
Government Problems
PGP Message Formats
PGP Message Formats (ctd)
PGP Key Formats
PGP Trust
PGP Trust (ctd)
PGPKeyrings
PGP Key Problems
Advantages of PGP over PEM
MIME-based Security
MIME-based Security (ctd)
MOSS
MOSS (ctd)
PGP/MIME
PGP/MIME (ctd)
MOSS and PGP/MIME
S/MIME
CMS
CMS (ctd)
Signed Data Format
Signature Format
Signature Format (ctd)
Enveloped Data Format
CMS S/MIME
S/MIME Problems
MSP
MSP Services
MSP Certificates
MSP Protection Types
MSP Protection Types (ctd)
MSP Message Format
MSP in Practice
Authentication
User Authentication
User Authentication (ctd)
Simple Client/Server Authentication
Unix Password Encryption
LMHASH
LMHASH (ctd)
NT Domain Authentication
NT Domain Authentication (ctd)
Attacking Domain Authentication over the Net
Attacking Domain Authentication over the Net (ctd)
NetwareAuthentication
NetwareAuthentication (ctd)
Kerberos
Kerberos(ctd)
Mutual Authentication
KerberosRealms
KerberosRealms (ctd)
KerberosV5
Ticket Lifetimes
Delegation
Realms
Realms (ctd)
Other Changes in V5
Kerberos-like Systems
Kerberos-like Systems (ctd)
Authentication Tokens
Authentication Tokens (ctd)
S/Key
S/Key (ctd)
OPIE
PPP PAP/CHAP
Other PAP Variants
RADIUS
RADIUS (ctd)
TACACS/XTACACS/TACACS+
Electronic Payments
Cheques
Cheques (ctd)
Credit Cards
Credit Cards (ctd)
Transactions on the Internet
General Model of Internet Transactions
RetailvsBusiness-to-business Commerce
Payment Systems
Netcash
Cybercash
Book Entry System Variations
Digicash
Digicash(ctd)
Making e-cash work
Electronic Cheque Design Requirements
SET
SET (ctd)
SET Features
SET Features (ctd)
SET Certification
SET Certification (ctd)
SET in Practice: Advantages
SET in Practice: Problems
SET in Practice: Problems (ctd)
Practical Issues
Why Security is Harder than it Looks
Why Security is Harder than it Looks (ctd)
Buffer Overflows
Buffer Overflows (ctd)
Fixing Overflow Problems
Storage Protection
Protecting Memory
Protecting Memory (ctd)
StorageSanitisation
Recovering Data
Advanced Data Recovery
Advanced Data Recovery (ctd)
Recovering Memory Data
Random Number Generation
BadRNG’s
BadRNG’s(ctd)
Types of Generator
Example: Unix /dev/random
Example: ANSI X9.17
Randomness Sources
Effectiveness of the Randomness Source
TEMPEST
TEMPEST Principles
TEMPEST Sources
TEMPEST Sources (ctd)
TEMPEST Protection
Snake Oil Cryptography
Snake Oil Warning Signs
Snake Oil in the Media
Snake Oil in the Media (ctd)
Snake Oil Case Study
Snake Oil Case Study (ctd)
Selling Security
Selling Security to Management
Miscellaneous Topics
Smart Cards
Memory Cards
Microprocessor Cards
Microprocessor Cards (ctd)
Smart Card Technology
File Structures
File Types
File Attributes
Card Commands
Card Commands (ctd)
Credit IEP Transaction
Credit Merchant Transaction
TeleQuick
Working with Cards
Working with Cards (ctd)
PKCS #11
PKCS #11 (ctd)
PKCS #11 Token Objects
PKCS #11 Token Objects (ctd)
JavaCard
JavaCard(ctd)
OCF
OCF (ctd)
PC/SC
PC/SC (ctd)
PKCS #11 vs OCF vs PC/SC
Smart Card Limitations
Dallas iButton
Contactless Cards
ContactlessCards (ctd)
ContactlessCard Communications
ContactlessCard Communications (ctd)
Initialisation and Anticollision Handling
Vicinity Cards
Attacks on Smart Cards
Attacks on Smart Cards (ctd)
Physical Attacks
Physical Attacks (ctd)
Attacking the Random Number Generator
Timing/Power Analysis
Voice Encryption
TCSEC/Orange Book
Applying the Orange Book
Applying the Orange Book (ctd)
Typical Voice Encryption System
Typical Voice Encryption System (ctd)
Problems
GSM
GSM (ctd)
GSM Security
Traffic Analysis
SimpleAnonymiserProxy
Mixes
Attacks on Mixes
Onion Routing
Mixmaster
Crowds
LPWA
LPWA (ctd)
Steganography
Hiding Information in Noise
Generating Synthetic Data
Generating Synthetic Data (ctd)
Digital Telephony
Clipper
Clipper (ctd)
Clipper Weaknesses
Reaction to Clipper
Fortezza
Fortezza(ctd)
Skipjack
Post-ClipperCryptoRestrictions
Post-ClipperCryptoRestrictions (ctd)
Boiling the Frog
US to Relax Export Controls
US to Relax Export Controls (ctd)
Export Controls
US Export Controls
US Export Controls (ctd)
Effects of Export Controls
Effects of Export Controls (ctd)
Economic Effects of Controls
Legal Challenges to US Controls
French and RussianCryptoControls
French and RussianCryptoControls (ctd)
Non-US controls
Wassenaarand Software Export
Wassenaarand Software Export (ctd)
DoctoringWassenaar
Enforcing the Controls
Enforcing the Controls (ctd)
MenwithHill
MenwithHill (ctd)
Echelon
Blind Signal Demodulation
Blind Signal Demodulation (ctd)
Data Analysis
Undersea Cable Tapping
DTI Proposals (ctd)
GAK Problems
GAK Problems (ctd)
NSA Study on Key Recovery
GAK in Practice
GAK in Practice (ctd)
0 of .
Results for:
No results containing your search query
P. 1
Encryption and Security Tutorial

Encryption and Security Tutorial

Ratings: (0)|Views: 9,082|Likes:
Published by tauneutrino

More info:

Published by: tauneutrino on Oct 19, 2010
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See More
See less

11/15/2012

pdf

text

original

You're Reading a Free Preview
Pages 8 to 132 are not shown in this preview.
You're Reading a Free Preview
Pages 140 to 208 are not shown in this preview.
You're Reading a Free Preview
Pages 216 to 318 are not shown in this preview.
You're Reading a Free Preview
Pages 326 to 348 are not shown in this preview.
You're Reading a Free Preview
Pages 356 to 358 are not shown in this preview.

Activity (6)

You've already reviewed this. Edit your review.
1 hundred reads
1 thousand reads
jjvdneut liked this
gullybaba liked this
bhbatson liked this
dave_765 liked this

You're Reading a Free Preview

Download
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->