TLS Cryptography In-Depth
TLS Cryptography In-Depth
Explore the intricacies of modern cryptography and the inner workings of TLS
Duplys, Dr. Paul; Schmitz, Dr. Roland
Packt Publishing Limited
01/2024
712
Mole
Inglês
9781804611951
15 a 20 dias
Descrição não disponível.
Table of Contents
The Role of Cryptography in the Connected World
Secure Channel and the CIA Triad
A Secret to Share
Encryption and Decryption
Entity Authentication
Transport Layer Security at a Glance
Public-Key Cryptography
Elliptic Curves
Digital Signatures
Digital Certificates and Certification Authorities
Hash Functions and Message Authentication Codes
Secrets and Keys in TLS 1.3
TLS Handshake Protocol Revisited
Block Ciphers and Their Modes of Operation
Authenticated Encryption
The Galois Counter Mode
TLS Record Protocol Revisited
TLS Cipher Suites
Attacks on Cryptography
Attacks on the TLS Handshake Protocol
Attacks on the TLS Record Protocol
Attacks on TLS Implementations
The Role of Cryptography in the Connected World
Secure Channel and the CIA Triad
A Secret to Share
Encryption and Decryption
Entity Authentication
Transport Layer Security at a Glance
Public-Key Cryptography
Elliptic Curves
Digital Signatures
Digital Certificates and Certification Authorities
Hash Functions and Message Authentication Codes
Secrets and Keys in TLS 1.3
TLS Handshake Protocol Revisited
Block Ciphers and Their Modes of Operation
Authenticated Encryption
The Galois Counter Mode
TLS Record Protocol Revisited
TLS Cipher Suites
Attacks on Cryptography
Attacks on the TLS Handshake Protocol
Attacks on the TLS Record Protocol
Attacks on TLS Implementations
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.
Programming books; Cybersecurity book; Cybersecurity for beginners; Real-world cryptography; Applied cryptography; Cybersecurity essentials; Cryptography book; Mathematical cryptography; Modern cryptography
Table of Contents
The Role of Cryptography in the Connected World
Secure Channel and the CIA Triad
A Secret to Share
Encryption and Decryption
Entity Authentication
Transport Layer Security at a Glance
Public-Key Cryptography
Elliptic Curves
Digital Signatures
Digital Certificates and Certification Authorities
Hash Functions and Message Authentication Codes
Secrets and Keys in TLS 1.3
TLS Handshake Protocol Revisited
Block Ciphers and Their Modes of Operation
Authenticated Encryption
The Galois Counter Mode
TLS Record Protocol Revisited
TLS Cipher Suites
Attacks on Cryptography
Attacks on the TLS Handshake Protocol
Attacks on the TLS Record Protocol
Attacks on TLS Implementations
The Role of Cryptography in the Connected World
Secure Channel and the CIA Triad
A Secret to Share
Encryption and Decryption
Entity Authentication
Transport Layer Security at a Glance
Public-Key Cryptography
Elliptic Curves
Digital Signatures
Digital Certificates and Certification Authorities
Hash Functions and Message Authentication Codes
Secrets and Keys in TLS 1.3
TLS Handshake Protocol Revisited
Block Ciphers and Their Modes of Operation
Authenticated Encryption
The Galois Counter Mode
TLS Record Protocol Revisited
TLS Cipher Suites
Attacks on Cryptography
Attacks on the TLS Handshake Protocol
Attacks on the TLS Record Protocol
Attacks on TLS Implementations
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.