Schwenk J. Guide to Internet Cryptography. Security Protocols...Attack Imp. 2022
Download Torrent
Opens in your torrent client (e.g. qBittorrent)
Health
Poor2/2
Info Hash8AD4B3F1EF85305C248B0425B88C12A4F256BC40
Peers Updated10 hours ago (2026-03-24 15:37:39)
Description
Textbook in PDF format
Research over the last two decades has considerably expanded knowledge of Internet cryptography, revealing the important interplay between standardization, implementation, and research. This practical textbook/guide is intended for academic courses in IT security and as a reference guide for Internet security. It describes important Internet standards in a language close to real-world cryptographic research and covers the essential cryptographic standards used on the Internet, from WLAN encryption to TLS and e-mail security. From academic and non-academic research, the book collects information about attacks on implementations of these standards (because these attacks are the main source of new insights into real-world cryptography). By summarizing all this in one place, this useful volume can highlight cross-influences in standards, as well as similarities in cryptographic constructions.
Topics and features:
Covers the essential standards in Internet cryptography.
Integrates work exercises and problems in each chapter.
Focuses especially on IPsec, secure e-mail and TLS.
Summarizes real-world cryptography in three introductory chapters.
Includes necessary background from computer networks.
Keeps mathematical formalism to a minimum, and treats cryptographic primitives mainly as blackboxes.
Provides additional background on web security in two concluding chapters.
Offering a uniquely real-world approach to Internet cryptography, this textbook/reference will be highly suitable to students in advanced courses on cryptography/cryptology, as well as eminently useful to professionals looking to expand their background and expertise.
The Internet.
Cryptography: Confidentiality.
Cryptography: Integrity and Authenticity.
Cryptographic Protocols.
Point-to-Point Security.
Wireless LAN (WLAN).
Cellular Networks.
IP Security (IPsec).
Security of HTTP.
Transport Layer Security.
A Short History of TLS.
Attacks on SSL and TLS.
Secure Shell (SSH).
Kerberos.
DNS Security.
File Encryption: PGP.
Email Security: S/MIME.
Attacks on S/MIME and OpenPGP.
Email: Protocols and SPAM.
Web Security and Single Sign-On Protocols.
Cryptographic Data Formats