Chapter 1 Understanding Internet Security

What Are Secure Sockets?

"Insecure" Communications: Understanding the HTTP Protocol

Implementing an HTTP Client

Adding Support for HTTP Proxies

Reliable Transmission of Binary Data with Base64 Encoding

Implementing an HTTP Server

Roadmap for the Rest of This Book

Chapter 2 Protecting Against Eavesdroppers with Symmetric Cryptography

Understanding Block Cipher Cryptography Algorithms

Implementing the Data Encryption Standard (DES) Algorithm

DES Initial Permutation

DES Key Schedule

DES Expansion Function

DES Decryption

Padding and Chaining in Block Cipher Algorithms

Using the Triple-DES Encryption Algorithm to Increase Key Length

Faster Encryption with the Advanced Encryption Standard (AES) Algorithm

AES Key Schedule Computation

AES Encryption

Other Block Cipher Algorithms

Understanding Stream Cipher Algorithms

Understanding and Implementing the RC4 Algorithm

Converting a Block Cipher to a Stream Cipher: The OFB and COUNTER Block-Chaining Modes

Chapter 3 Secure Key Exchange over an Insecure Medium with Public Key Cryptography

Understanding the Theory Behind the RSA Algorithm

Performing Arbitrary Precision Binary Math to Implement Public-Key Cryptography

Implementing Large-Number Addition

Implementing Large-Number Subtraction

Implementing Large-Number Multiplication

Implementing Large-Number Division

Comparing Large Numbers

Optimizing for Modulo Arithmetic

Using Modulus Operations to Efficiently Compute Discrete Logarithms ...

Get Implementing SSL/TLS Using Cryptography and PKI now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.