Artech House Information Security and Privacy Series - Oppliger R. - SSL and TLS Theory and Practice, Second Edition [2016, PDF, ENG] 

Цитировать
SSL and TLS Theory and Practice, Second Edition
Год издания: 2016
Автор: Oppliger R.
Издательство: Artech House
ISBN: 978-1-60807-998-8
Серия: Artech House Information Security and Privacy Series
Язык: Английский
Формат: PDF
Качество: Издательский макет или текст (eBook)
Интерактивное оглавление: Да
Количество страниц: 278
Описание: This completely expanded second edition of SSL and TLS: Theory and Practice provides modernized material and a comprehensive overview of the SSL/TLS and DTLS protocols, including topics such as firewall traversal and public key certificates. SSL (secure socket layer) and TLS (Transport Layer Security) are widely deployed security protocols that are used in all kinds of web-based e-commerce and e-business applications and are part of most contemporary security systems available today. This practical book provides a complete introduction to these protocols, offering readers a solid understanding of their design. Updates to this edition include coverage of recent attacks mounted against SSL/TLS, new broad TLS extensions, and discussions on the importance of public key certificates and Internet PKI.

Примеры страниц

Оглавление

Contents
Preface xi
Acknowledgments xix
Chapter 1 Introduction 1
1.1 Information and Network Security 1
1.1.1 Security Services 3
1.1.2 Security Mechanisms 7
1.2 Transport Layer Security 11
1.3 Final Remarks 18
References 19
Chapter 2 SSL Protocol 21
2.1 Introduction 21
2.2 Protocols 31
2.2.1 SSL Record Protocol 31
2.2.2 SSL Handshake Protocol 46
2.2.3 SSL Change Cipher Spec Protocol 70
2.2.4 SSL Alert Protocol 71
2.2.5 SSL Application Data Protocol 73
2.3 Protocol Execution Transcript 74
2.4 Security Analyses and Attacks 79
2.5 Final Remarks 87
References 88
Chapter 3 TLS Protocol 91
3.1 Introduction 91
3.1.1 TLS PRF 94
3.1.2 Generation of Keying Material 96
3.2 TLS 1.0 99
3.2.1 Cipher Suites 99
3.2.2 Certificate Management 102
3.2.3 Alert Messages 104
3.2.4 Other Differences 105
3.3 TLS 1.1 106
3.3.1 Cryptographic Subtleties 107
3.3.2 Cipher Suites 113
3.3.3 Certificate Management 115
3.3.4 Alert Messages 115
3.3.5 Other Differences 116
3.4 TLS 1.2 116
3.4.1 TLS Extensions 116
3.4.2 Cipher Suites 135
3.4.3 Certificate Management 138
3.4.4 Alert Messages 138
3.4.5 Other Differences 139
3.5 TLS 1.3 139
3.5.1 Cipher Suites 142
3.5.2 Certificate Management 143
3.5.3 Alert Messages 143
3.5.4 Other Differences 144
3.6 HSTS 144
3.7 Protocol Execution Transcript 147
3.8 Security Analyses and Attacks 151
3.8.1 Renegotiation Attack 152
3.8.2 Compression-Related Attacks 158
3.8.3 More Recent Padding Oracle Attacks 162
3.8.4 Key Exchange Downgrade Attacks 168
3.8.5 FREAK 168
3.8.6 Logjam 169
3.9 Final Remarks 170
References 171
Chapter 4 DTLS Protocol 177
4.1 Introduction 177
4.2 Basic Properties and Distinguishing Features 180
4.2.1 Record Protocol 181
4.2.2 Handshake Protocol 183
4.3 Security Analysis 187
4.4 Final Remarks 189
References 189
Chapter 5 Firewall Traversal 191
5.1 Introduction 191
5.2 SSL/TLS Tunneling 194
5.3 SSL/TLS Proxying 197
5.4 Final Remarks 199
References 200
Chapter 6 Public Key Certificates and Internet PKI 201
6.1 Introduction 201
6.2 X.509 Certificates 206
6.2.1 Certificate Format 207
6.2.2 Hierarchical Trust Model 209
6.3 Server Certificates 212
6.4 Client Certificates 216
6.5 Problems and Pitfalls 217
6.6 New Approaches 222
6.7 Final Remarks 228
References 229
Chapter 7 Concluding Remarks 233
References 235
Appendix A Registered TLS Cipher Suites 237
Appendix B Padding Oracle Attacks 245
B.1 Bleichenbacher Attack 247
B.2 Vaudenay Attack 251
References 260
Appendix C Abbreviations and Acronyms 263
About the Author 271
Index 273
Вы не можете начинать темы
Вы не можете отвечать на сообщения
Вы не можете редактировать свои сообщения
Вы не можете удалять свои сообщения
Вы не можете голосовать в опросах
Вы не можете прикреплять файлы к сообщениям
Вы можете скачивать файлы
Sitemap