Cryptography for Dummies (For Dummies (Computer/tech))

個数:

Cryptography for Dummies (For Dummies (Computer/tech))

  • 提携先の海外書籍取次会社に在庫がございます。通常3週間で発送いたします。
    重要ご説明事項
    1. 納期遅延や、ご入手不能となる場合が若干ございます。
    2. 複数冊ご注文の場合、分割発送となる場合がございます。
    3. 美品のご指定は承りかねます。
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Paperback:紙装版/ペーパーバック版/ページ数 304 p.
  • 言語 ENG
  • 商品コード 9780764541889
  • DDC分類 005.8

Full Description

Cryptography is the most effective way to achieve data security and is essential to e-commerce activities such as online shopping, stock trading, and banking
This invaluable introduction to the basics of encryption covers everything from the terminology used in the field to specific technologies to the pros and cons of different implementations
Discusses specific technologies that incorporate cryptography in their design, such as authentication methods, wireless encryption, e-commerce, and smart cards
Based entirely on real-world issues and situations, the material provides instructions for already available technologies that readers can put to work immediately
Expert author Chey Cobb is retired from the NRO, where she held a Top Secret security clearance, instructed employees of the CIA and NSA on computer security and helped develop the computer security policies used by all U.S. intelligence agencies

Contents

Introduction  1

About This Book 2

How to Use This Book 2

What You Don't Need to Read  3

Foolish Assumptions 3

How This Book Is Organized 3

Part I: Crypto Basics & What You Really Need to Know 4

Part II: Public Key Infrastructure  4

Part III: Putting Encryption Technologies to Work for You 4

Part IV: The Part of Tens  4

Part V: Appendixes 5

Icons Used in This Book  5

Where to Go from Here  5

Part I: Crypto Basics & What You Really Need to Know 7

Chapter 1: A Primer on Crypto Basics  9

It's Not about James Bond  9

Go with the rhythm  10

Rockin' the rhythm 11

Getting to Know the Basic Terms 12

What Makes a Cipher? 13

Concealment ciphers 13

Substitution ciphers 14

Transposition ciphers  15

Hash without the corned beef  16

XOR what? 17

Breaking Ciphers  20

Not-so-secret keys  20

Known plaintext  21

Pattern recognition  21

What a brute! 21

Cryptosystems 22

Everyday Uses of Encryption 23

Network logons and passwords 23

Secure Web transactions 25

ATMs  26

Music and DVDs  27

Communication devices  28

Why Encryption Isn't More Commonplace 28

Difficulty in understanding the technology  29

You can't do it alone  29

Sharing those ugly secrets  30

Cost may be a factor  30

Special administration requirements 31

Chapter 2: Major League Algorithms  33

Beware of "Snake Oil"  34

Symmetric Keys Are All the Same  37

The key table 37

Key generation and random numbers 38

Protecting the Key  39

Symmetric Algorithms Come in Different Flavors 40

Making a hash of it 40

Defining blocks and streams 42

Which is better: Block or stream?  44

Identifying Symmetric Algorithms 45

Des 45

Triple DES  45

Idea  46

Aes 46

Asymmetric Keys 47

Rsa 48

Diffie-Hellman (& Merkle)  49

Pgp 50

Elliptical Curve Cryptography  50

Working Together 52

Chapter 3: Deciding What You Really Need  53

Justifying the Costs to Management  53

Long-term versus short-term  54

Tangible versus intangible results 55

Positive ROI 55

Government due diligence  60

Insurers like it!  61

Presenting your case  61

Do You Need Secure Communications?  62

Secure e-mail  62

Instant Messaging (IM)  64

Secure e-commerce  64

Online banking  66

Virtual Private Networks (VPNs)  66

Wireless (In)security  68

Do You Need to Authenticate Users? 69

Who are your users?  70

Authentication tokens 71

Smart cards 72

Java tokens  73

Biometrics 74

Do You Need to Ensure Confidentiality and Integrity?  75

Protecting Personal Data  75

What's It Gonna Cost?  77

Chapter 4: Locks and Keys  79

The Magic Passphrase 80

The weakest link 81

Mental algorithms  82

Safety first! 84

Passphrase attacks  86

Don't forget to flush!  87

The Key Concept  88

Key generation  89

Protecting your keys  90

What to do with your old keys 91

Some cryptiquette  91

Part II: Public Key Infrastructure 93

Chapter 5: The PKI Primer  95

What Is PKI?  96

Certificate Authorities (CAs)  97

Digital Certificates  98

Desktops, laptops, and servers  100

Key servers 102

Registration Authorities (RAs) 103

Uses for PKI Systems 103

Common PKI Problems  105

Chapter 6: PKI Bits and Pieces  107

Certificate Authorities 108

Pretenders to the throne 110

Registration Authorities  110

Certificate Policies (CPs)  111

Digital Certificates and Keys 112

D'basing Your Certificates 113

Certificate Revocation 114

Picking the PKCS  115

PKCS #1: RSA Encryption Standard 115

PKCS #3: Diffie-Hellman Key Agreement Standard 115

PKCS #5: Password-Based Cryptography Standard  115

PKCS #6: Extended-Certificate Syntax Standard 116

PKCS #7: Cryptographic Message Syntax Standard 116

PKCS #8: Private-Key Information Syntax Standard 116

PKCS #9: Selected Attribute Types  117

PKCS #10: Certification Request Syntax Standard 117

PKCS #11: Cryptographic Token Interface Standard 117

PKCS #12: Personal Information Exchange Syntax Standard  118

PKCS #13: Elliptic Curve Cryptography Standard  118

PKCS #14: Pseudo-Random Number Generation Standard 118

PKCS #15: Cryptographic Token Information Format Standard 118

Chapter 7: All Keyed Up!  119

So, What Exactly IS a Key?  120

Making a Key 120

The Long and Short of It  121

Randomness in Keys Is Good 122

Storing Your Keys Safely 123

Keys for Different Purposes  124

Keys and Algorithms  124

One Key; Two Keys  125

Public/private keys  126

The magic encryption machine  127

The magic decryption machine  128

Symmetric keys (again) 129

Trusting Those Keys  129

Key Servers 130

Keeping keys up to date  131

Policies for keys  132

Key escrow and key recovery 132

Part III: Putting Encryption Technologies to Work for You 135

Chapter 8: Securing E-Mail from Prying Eyes  137

E-Mail Encryption Basics  138

S/mime 138

Pgp 139

Digital Certificates or PGP Public/Private Key Pairs?  140

What's the diff? 140

When should you use which? 141

Sign or encrypt or both?  141

Remember that passphrase! 142

Using S/MIME  142

Setting up S/MIME in Outlook Express  143

Backing up your Digital Certificates  151

Fun and Games with PGP  153

Setting up PGP  154

Deciding on the options  156

Playing with your keyring  160

Sending and receiving PGP messages  162

PGP in the enterprise 164

Other Encryption Stuff to Try  164

Chapter 9: File and Storage Strategies  167

Why Encrypt Your Data? 168

Encrypted Storage Roulette  170

Symmetric versus asymmetric? 171

Encrypting in the air or on the ground?  173

Dealing with Integrity Issues 174

Message digest/hash  174

MACs  175

HMACs 175

Tripwire 176

Policies and Procedures  177

Examples of Encryption Storage  178

Media encryption 179

Encrypting File System  180

Secure e-mail 181

Program-specific encryption  181

Encrypted backup  181

Chapter 10: Authentication Systems  183

Common Authentication Systems  185

Kerberos  185

Ssh  186

Radius 187

Tacacs+  188

Authentication Protocols  188

How Authentication Systems Use Digital Certificates 190

Tokens, Smart Cards, and Biometrics 191

Digital Certificates on a PC  191

Time-based tokens 192

Smartcard and USB Smartkeys 193

Biometrics 194

Chapter 11: Secure E-Commerce  197

SSL Is the Standard  198

A typical SSL connection 199

Rooting around your certificates 201

Time for TLS  203

Setting Up an SSL Solution  204

What equipment do I need?  205

The e-commerce manager's checklist 206

XML Is the New Kid on the Block 209

Going for Outsourced E-Commerce 210

Chapter 12: Virtual Private Network (VPN) Encryption  213

How Do VPNs Work Their Magic?  214

Setting Up a VPN  214

What devices do I need?  215

What else should I consider?  216

Do VPNs affect performance? 216

Don't forget wireless! 217

Various VPN Encryption Schemes 217

PPP and PPTP 217

L2tp 218

IPsec 218

Which Is Best?  220

Testing, Testing, Testing  221

Chapter 13: Wireless Encryption Basics  223

Why WEP Makes Us Weep 224

No key management 225

Poor RC4 implementation 225

Authentication problems 226

Not everything is encrypted 226

WEP Attack Methods 227

Finding wireless networks 228

War chalking  228

Wireless Protection Measures  230

Look for rogue access points  230

Change the default SSIDs 230

Turn on WEP 231

Position your access points well  232

Buy special antennas 232

Use a stronger encryption scheme  232

Use a VPN for wireless networks  232

Employ an authentication system  233

Part IV: The Part of Tens  235

Chapter 14: The Ten Best Encryption Web Sites  237

Mat Blaze's Cryptography Resource on the Web 237

The Center for Democracy and Technology 237

SSL Review  238

How IPsec Works  238

Code and Cipher 238

CERIAS — Center for Education and Research in Information Assurance and Security 238

The Invisible Cryptologists — African Americans, WWII to 1956  239

Bruce Schneier 239

North American Cryptography Archives  239

RSA's Crypto FAQ 239

Chapter 15: The Ten Most Commonly Misunderstood Encryption Terms  241

Military-Grade Encryption  241

Trusted Third Party 241

X 509 Certificates 242

Rubber Hose Attack 242

Shared Secret  242

Key Escrow  242

Initialization Vector  243

Alice, Bob, Carol, and Dave 243

Secret Algorithm  243

Steganography  244

Chapter 16: Cryptography Do's and Don'ts  245

Do Be Sure the Plaintext Is Destroyed after a Document Is Encrypted  245

Do Protect Your Key Recovery Database and Other Key Servers to the Greatest Extent Possible  246

Don't Store Your Private Keys on the Hard Drive of Your Laptop or Other Personal Computing Device 246

Do Make Sure Your Servers' Operating Systems Are "Hardened" before You Install Cryptological Systems on Them 246

Do Train Your Users against Social Engineering  247

Do Create the Largest Key Size Possible 247

Do Test Your Cryptosystem after You Have It Up and Running 248

Do Check the CERT Advisories and Vendor Advisories about Flaws and Weaknesses in Cryptosystems 248

Don't Install a Cryptosystem Yourself If You're Not Sure What You Are Doing 248

Don't Use Unknown, Untested Algorithms 249

Chapter 17: Ten Principles of "Cryptiquette"  251

If Someone Sends You an Encrypted Message, Reply in Kind  251

Don't Create Too Many Keys  251

Don't Immediately Trust Someone Just Because He/She Has a Public Key 252

Always Back Up Your Keys and Passphrases 252

Be Wary of What You Put in the Subject Line of Encrypted Messages  252

If You Lose Your Key or Passphrase, Revoke Your Keys as Soon as Possible  253

Don't Publish Someone's Public Key to a Public Key Server without His/Her Permission  253

Don't Sign Someone's Public Key Unless You Have Reason To  253

If You Are Corresponding with Someone for the First Time, Send an Introductory Note Along with Your Public Key  254

Be Circumspect in What You Encrypt 254

Chapter 18: Ten Very Useful Encryption Products  255

PGP: Pretty Good Privacy 255

Gaim  255

madeSafe Vault 256

Password Safe 256

Kerberos  256

OpenSSL and Apache SSL  256

SafeHouse  257

WebCrypt  257

Privacy Master  257

Advanced Encryption Package 257

Part V: Appendixes  259

Appendix A: Cryptographic Attacks  261

Known Plaintext Attack 262

Chosen Ciphertext Attacks 262

Chosen Plaintext Attacks  263

The Birthday Attack 263

Man-in-the-Middle Attack  263

Timing Attacks  264

Rubber Hose Attack 264

Electrical Fluctuation Attacks  265

Major Boo-Boos  265

Appendix B: Glossary  267

Appendix C: Encryption Export Controls  279

Index  283