Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
Cryptography and public-key infrastructures in the Internet - MaRDI portal

Cryptography and public-key infrastructures in the Internet (Q2726236)

From MaRDI portal





scientific article; zbMATH DE number 1620632
Language Label Description Also known as
English
Cryptography and public-key infrastructures in the Internet
scientific article; zbMATH DE number 1620632

    Statements

    0 references
    16 July 2001
    0 references
    cryptography
    0 references
    internet
    0 references
    public-key infrastructure
    0 references
    Cryptography and public-key infrastructures in the Internet (English)
    0 references
    The central topic of the book is the integration of cryptography into the Internet. The book is written in German and covers some topics relevant for the German market (law of digital signature, standards, German enterprises). The book provides an introduction into basic cryptography: symmetric and asymmetric encryption, digital signature, hash functions, and random number generators. It is written mainly for beginners with little mathematical background. Some basic mathematical tools like the Euclidean algorithm and NP completeness are missing.NEWLINENEWLINE The book addresses advanced cryptographic techniques: standards for symmetric and asymmetric encryption (block and feedback modes, public key cryptographic standard), protocols in general terms and breaking of protocols, authentication methods (password, biometric techniques, and three specific methods: Kerberos, Radius, and Tacacs), implementational issues of cryptography in software and hardware (chipcard, smart token, hardware security module, crypto-box) and certification and evaluation (ITSEC).NEWLINENEWLINE The book also covers techniques to construct and maintain a public key infrastructure (PKI) important for internet and mobile communication. It includes certification authority, certificate management protocols, enrollment, digital certificates, directory service, and practical aspects to realize a PKI.NEWLINENEWLINE The book provides cryptographic protocols for intranet, Internet, and mobile communication. It addresses among other things GSM, point-to-point protocol (PPP), virtual private network (VPN), Internet protocol security (IPSec), Internet key exchange (IKE), secure socket layer (SSL), and secure multipurpose Internet mail enhancement (S/MIME).NEWLINENEWLINE Finally, the author describes political aspects of cryptography and provides a subjective ranking of the ten most important persons and enterprises in cryptography as well as of the ten most important books and web sites in the field of cryptography. The book is well written. It covers very many topics of up-to-date cryptography. Missing are, e.g., quantum cryptography, secret sharing schemes, and zero knowledge protocols. Methods, protocols, and standards are concisely described. However, several topics are only touched upon and not explained in detail. Literature for further in-depth study is given.
    0 references

    Identifiers

    0 references
    0 references
    0 references
    0 references
    0 references