Book description
Hands-on, practical guide to implementing SSL and TLS protocols for Internet security
If you are a network professional who knows C programming, this practical book is for you. Focused on how to implement Secure Socket Layer (SSL) and Transport Layer Security (TLS), this book guides you through all necessary steps, whether or not you have a working knowledge of cryptography. The book covers SSLv2, TLS 1.0, and TLS 1.2, including implementations of the relevant cryptographic protocols, secure hashing, certificate parsing, certificate generation, and more.
Coverage includes:
Understanding Internet Security
Protecting against Eavesdroppers with Symmetric Cryptography
Secure Key Exchange over an Insecure Medium with Public Key Cryptography
Authenticating Communications Using Digital Signatures
Creating a Network of Trust Using X.509 Certificates
A Usable, Secure Communications Protocol: Client-Side TLS
Adding Server-Side TLS 1.0 Support
Advanced SSL Topics
Adding TLS 1.2 Support to Your TLS Library
Other Applications of SSL
A Binary Representation of Integers: A Primer
Installing TCPDump and OpenSSL
Understanding the Pitfalls of SSLv2
Set up and launch a working implementation of SSL with this practical guide.
Table of contents
- Cover Page
- Title Page
- Copyright
- Dedication
- About the Author
- About the Technical Editor
- Credits
- Acknowledgments
- Contents at a Glance
- Contents
- Introduction
- CHAPTER 1: Understanding Internet Security
- CHAPTER 2: Protecting Against Eavesdroppers with Symmetric Cryptography
-
CHAPTER 3: Secure Key Exchange over an Insecure Medium with Public Key Cryptography
- Understanding the Theory Behind the RSA Algorithm
- Performing Arbitrary Precision Binary Math to Implement Public-Key Cryptography
- Encryption and Decryption with RSA
- Achieving Perfect Forward Secrecy with Diffie-Hellman Key Exchange
- Getting More Security per Key Bit: Elliptic Curve Cryptography
- Making ECC Work with Whole Integers: Elliptic-Curve Cryptography over Fp
- CHAPTER 4: Authenticating Communications Using Digital Signatures
- CHAPTER 5: Creating a Network of Trust Using X.509 Certificates
- CHAPTER 6: A Usable, Secure Communications Protocol: Client-Side TLS
- CHAPTER 7: Adding Server-Side TLS 1.0 Support
-
CHAPTER 8: Advanced SSL Topics
- Passing Additional Information with Client Hello Extensions
- Safely Reusing Key Material with Session Resumption
- Avoiding Fixed Parameters with Ephemeral Key Exchange
- Verifying Identity with Client Authentication
- Dealing with Legacy Implementations: Exportable Ciphers
- Discarding Key Material Through Session Renegotiation
- CHAPTER 9: Adding TLS 1.2 Support to Your TLS Library
- CHAPTER 10: Other Applications of SSL
- APPENDIX A: Binary Representation of Integers: A Primer
- APPENDIX B: Installing TCPDump and OpenSSL
- APPENDIX C: Understanding the Pitfalls of SSLv2
- Index
Product information
- Title: Implementing SSL/TLS Using Cryptography and PKI
- Author(s):
- Release date: January 2011
- Publisher(s): Wiley
- ISBN: 9780470920411
You might also like
book
You, Only Better
If you want to be happy, fulfilled and energised its probably best not to obsess over …
book
The Linux Programming Interface
The Linux Programming Interface is the definitive guide to the Linux and UNIX programming interface—the interface …
book
The Linux Command Line, 2nd Edition
The Linux Command Line takes you from your very first terminal keystrokes to writing full programs …
book
Hands-On Machine Learning with Scikit-Learn, Keras, and TensorFlow, 2nd Edition
Through a series of recent breakthroughs, deep learning has boosted the entire field of machine learning. …