Guide to Internet Cryptography Security Protocols and Real-World Attack Implications

Research over the last two decades has considerably expanded knowledge of Internet cryptography, revealing the important interplay between standardization, implementation, and research. This practical textbook/guide is intended for academic courses in IT security and as a reference guide for Interne...

Full description

Bibliographic Details
Main Author: Schwenk, Jörg
Format: eBook
Language:English
Published: Cham Springer International Publishing 2022, 2022
Edition:1st ed. 2022
Series:Information Security and Cryptography
Subjects:
Online Access:
Collection: Springer eBooks 2005- - Collection details see MPG.ReNa
LEADER 03613nmm a2200325 u 4500
001 EB002134658
003 EBX01000000000000001272715
005 00000000000000.0
007 cr|||||||||||||||||||||
008 221201 ||| eng
020 |a 9783031194399 
100 1 |a Schwenk, Jörg 
245 0 0 |a Guide to Internet Cryptography  |h Elektronische Ressource  |b Security Protocols and Real-World Attack Implications  |c by Jörg Schwenk 
250 |a 1st ed. 2022 
260 |a Cham  |b Springer International Publishing  |c 2022, 2022 
300 |a XIX, 530 p. 272 illus., 80 illus. in color  |b online resource 
505 0 |a Introduction -- The Internet -- Cryptography: Confidentiality -- Cryptography: Integrity and Authenticity -- Cryptographic Protocols -- Point-to-Point Security -- Wireless LAN (WLAN) -- Cellular Networks -- IP Security (IPsec) -- Security of HTTP -- Transport Layer Security -- A Short History of TLS -- Attacks on SSL and TLS -- Secure Shell (SSH) -- Kerberos -- DNS Security -- File Encryption: PGP -- Email Security: S/MIME -- Attacks on S/MIME and OpenPGP -- Email: Protocols and SPAM -- Web Security and Single Sign-On Protocols -- Cryptographic Data Formats -- Index 
653 |a Security Services 
653 |a Cryptography 
653 |a Data protection 
653 |a Data encryption (Computer science) 
653 |a Cryptology 
653 |a Data and Information Security 
041 0 7 |a eng  |2 ISO 639-2 
989 |b Springer  |a Springer eBooks 2005- 
490 0 |a Information Security and Cryptography 
028 5 0 |a 10.1007/978-3-031-19439-9 
856 4 0 |u https://doi.org/10.1007/978-3-031-19439-9?nosfx=y  |x Verlag  |3 Volltext 
082 0 |a 005.824 
520 |a Research over the last two decades has considerably expanded knowledge of Internet cryptography, revealing the important interplay between standardization, implementation, and research. This practical textbook/guide is intended for academic courses in IT security and as a reference guide for Internet security. It describes important Internet standards in a language close to real-world cryptographic research and covers the essential cryptographic standards used on the Internet, from WLAN encryption to TLS and e-mail security. From academic and non-academic research, the book collects information about attacks on implementations of these standards (because these attacks are the main source of new insights into real-world cryptography). By summarizing all this in one place, this useful volume can highlight cross-influences in standards, as well as similarities in cryptographic constructions. Topics and features: · Covers the essential standards in Internet cryptography · Integrates work exercises and problems in each chapter · Focuses especially on IPsec, secure e-mail and TLS · Summarizes real-world cryptography in three introductory chapters · Includes necessary background from computer networks · Keeps mathematical formalism to a minimum, and treats cryptographic primitives mainly as blackboxes · Provides additional background on web security in two concluding chapters Offering a uniquely real-world approach to Internet cryptography, this textbook/reference will be highly suitable to students in advanced courses on cryptography/cryptology, as well as eminently useful to professionals looking to expand their background and expertise. Professor Dr. Jörg Schwenk holds the Chair for Network and Data Security at the Ruhr University in Bochum, Germany. He (co-)authored about 150 papers on the book’s topics, including for conferences like ACM CCS, Usenix Security, IEEE S&P, and NDSS.