Cryptography and public-key infrastructures in the Internet (Q2726236)
From MaRDI portal
| This is the item page for this Wikibase entity, intended for internal use and editing purposes. Please use this page instead for the normal view: Cryptography and public-key infrastructures in the Internet |
scientific article; zbMATH DE number 1620632
| Language | Label | Description | Also known as |
|---|---|---|---|
| English | Cryptography and public-key infrastructures in the Internet |
scientific article; zbMATH DE number 1620632 |
Statements
16 July 2001
0 references
cryptography
0 references
internet
0 references
public-key infrastructure
0 references
Cryptography and public-key infrastructures in the Internet (English)
0 references
The central topic of the book is the integration of cryptography into the Internet. The book is written in German and covers some topics relevant for the German market (law of digital signature, standards, German enterprises). The book provides an introduction into basic cryptography: symmetric and asymmetric encryption, digital signature, hash functions, and random number generators. It is written mainly for beginners with little mathematical background. Some basic mathematical tools like the Euclidean algorithm and NP completeness are missing.NEWLINENEWLINE The book addresses advanced cryptographic techniques: standards for symmetric and asymmetric encryption (block and feedback modes, public key cryptographic standard), protocols in general terms and breaking of protocols, authentication methods (password, biometric techniques, and three specific methods: Kerberos, Radius, and Tacacs), implementational issues of cryptography in software and hardware (chipcard, smart token, hardware security module, crypto-box) and certification and evaluation (ITSEC).NEWLINENEWLINE The book also covers techniques to construct and maintain a public key infrastructure (PKI) important for internet and mobile communication. It includes certification authority, certificate management protocols, enrollment, digital certificates, directory service, and practical aspects to realize a PKI.NEWLINENEWLINE The book provides cryptographic protocols for intranet, Internet, and mobile communication. It addresses among other things GSM, point-to-point protocol (PPP), virtual private network (VPN), Internet protocol security (IPSec), Internet key exchange (IKE), secure socket layer (SSL), and secure multipurpose Internet mail enhancement (S/MIME).NEWLINENEWLINE Finally, the author describes political aspects of cryptography and provides a subjective ranking of the ten most important persons and enterprises in cryptography as well as of the ten most important books and web sites in the field of cryptography. The book is well written. It covers very many topics of up-to-date cryptography. Missing are, e.g., quantum cryptography, secret sharing schemes, and zero knowledge protocols. Methods, protocols, and standards are concisely described. However, several topics are only touched upon and not explained in detail. Literature for further in-depth study is given.
0 references