Table of Contents
I Getting Started
The Role of Cryptography in the Connected World
1.1 Evolution of cryptography
1.2 The advent of TLS and the internet
1.3 Increasing connectivity
1.3.1 Connectivity versus security – larger attack surface
1.3.2 Connectivity versus marginal attack cost
1.3.3 Connectivity versus scaling attacks
1.4 Increasing complexity
1.4.1 Complexity versus security – features
1.4.2 Complexity versus security – emergent behavior
1.4.3 Complexity versus security – bugs
1.5 Example attacks
1.5.1 The Mirai botnet
1.5.2 Operation Aurora
1.5.3 The Jeep hack
1.5.4 Commonalities
1.6 Summary
Secure Channel and the CIA Triad
2.1 Technical requirements
2.2 Preliminaries
2.3 Confidentiality
2.4 Integrity
2.5 Authentication
2.5.1 Message ...
Get TLS Cryptography In-Depth now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.