Security without obscurity : a guide to cryptographic architectures /
Stapleton, Jeff
Security without obscurity : a guide to cryptographic architectures / by Jeff Stapleton - First edition - Boca Raton, FL : CRC Press, [2015];©2015 - 1 online resource (205 pages)
chapter 1 Introduction -- chapter 2 Cryptography Basics -- chapter 3 Cryptographic Keys -- chapter 4 Authentication Protocols -- chapter 5 Encryption Protocols -- chapter 6 Architectures -- chapter 7 Risk Management -- chapter 8 Security Assessments -- chapter 9 Illustrations
Information security has a major gap when cryptography is implemented. Cryptographic algorithms are well defined, key management schemes are well known, but the actual deployment is typically overlooked, ignored, or unknown. Cryptography is everywhere. Application and network architectures are typically well-documented but the cryptographic architecture is missing. This book provides a guide to discovering, documenting, and validating cryptographic architectures. Each chapter builds on the next to present information in a sequential process. This approach not only presents the material in a structured manner, it also serves as an ongoing reference guide for future use
9780429884894
Computer network architectures
Telecommunication
Data encryption (Computer science)
COMPUTERS--Security--General
COMPUTERS--Security--Cryptography
COMPUTERS--Security--Networking
005.800
Security without obscurity : a guide to cryptographic architectures / by Jeff Stapleton - First edition - Boca Raton, FL : CRC Press, [2015];©2015 - 1 online resource (205 pages)
chapter 1 Introduction -- chapter 2 Cryptography Basics -- chapter 3 Cryptographic Keys -- chapter 4 Authentication Protocols -- chapter 5 Encryption Protocols -- chapter 6 Architectures -- chapter 7 Risk Management -- chapter 8 Security Assessments -- chapter 9 Illustrations
Information security has a major gap when cryptography is implemented. Cryptographic algorithms are well defined, key management schemes are well known, but the actual deployment is typically overlooked, ignored, or unknown. Cryptography is everywhere. Application and network architectures are typically well-documented but the cryptographic architecture is missing. This book provides a guide to discovering, documenting, and validating cryptographic architectures. Each chapter builds on the next to present information in a sequential process. This approach not only presents the material in a structured manner, it also serves as an ongoing reference guide for future use
9780429884894
Computer network architectures
Telecommunication
Data encryption (Computer science)
COMPUTERS--Security--General
COMPUTERS--Security--Cryptography
COMPUTERS--Security--Networking
005.800