Download Public-Key Cryptography by Garrett P., Lieman D. (eds.) PDF

By Garrett P., Lieman D. (eds.)

Show description

Read or Download Public-Key Cryptography PDF

Best cryptography books

Fault Diagnosis and Tolerance in Cryptography: Third International Workshop, FDTC 2006, Yokohama, Japan, October 10, 2006. Proceedings

In recent times utilized cryptography has constructed significantly to fulfill the - creasing safeguard requisites of assorted details expertise disciplines, akin to telecommunications, networking, database structures, cellular purposes and others. Cryptosystems are inherently computationally complicated and on the way to fulfill the excessive throughput specifications of many functions, they can be applied via both VLSI units (cryptographic accelerators) or hugely optimized software program workouts (cryptographic libraries) and are used through compatible (network) protocols.

Extra resources for Public-Key Cryptography

Example text

This can tremendously increase the time for a router to pass traffic and can significantly decrease router throughput. Configuring ACLs and other aspects of setting up routers for this type of use are beyond the scope of this book. EXAM TIP ACLs can be a significant effort to establish and maintain. Creating them is a straightforward task, but their judicious use will yield security benefits with a limited amount of maintenance. This can be very important in security zones such as a DMZ and at edge devices, blocking undesired outside contact while allowing known inside traffic.

Some high-security firewalls also employ application layer proxies. Packets are not allowed to traverse the firewall, but data instead flows up to an application that in turn decides what to do with it. For example, a Simple Mail Transfer Protocol (SMTP) proxy may accept inbound mail from the Internet and forward it to the internal corporate mail server. While proxies provide a high level of security by making it very difficult for an attacker to manipulate the actual packets arriving at the destination, and while they provide the opportunity for an application to interpret the data prior to forwarding it to the destination, they generally are not capable of the same throughput as stateful packet inspection firewalls.

White continues to be active in security research. His current research initiatives include efforts in community incident response, intrusion detection, and secure information sharing. Chuck Cothren, CISSP, is a Principal Solutions Specialist at Symantec Corporation applying a wide array of network security experience, including performing controlled penetration testing, incident response, and security management to assist a wide variety of clients in the protection of their critical data. He has also analyzed security methodologies for Voice over Internet Protocol (VoIP) systems and supervisory control and data acquisition (SCADA) systems.

Download PDF sample

Rated 4.65 of 5 – based on 7 votes