SSL/TLS Under Lock and Key
A Guide to Understanding SSL/TLS Cryptography
Paul Baka, Jeremy Schatten, Hollie Acres
- English
- ePUB (mobile friendly)
- Available on iOS & Android
SSL/TLS Under Lock and Key
A Guide to Understanding SSL/TLS Cryptography
Paul Baka, Jeremy Schatten, Hollie Acres
About This Book
If you are looking for a comprehensive, soup-to-nuts resource on SSL/TLS, look no further. This book, geared towards bridging the gap between the absolute beginner and the veteran IT Professional, combines the theoretical and the practical in equal measure.
The first half of our book focuses on foundational theory, covering topics such as:
- Symmetric vs Asymmetric cryptography
- One-Way functions
- Digital Signatures
- Key Generation
- History and Context
The second half encourages fledgling administrators to jump in with both feet, outlining the quirks of common tasks such as:
- Generating a signing request for a certificate (CSR)
- Generating a self-signed certificate (and when it is safe to do or not do so)
- Converting certificates between different formats including java keystores
- Configuring servers to meet best practices, not in a vacuum, but for thesecurity and compatibility needs of your business vertical.
Are you a systems administrator just starting out? A developer looking to not just implement, but to understand?Or perhaps SSL/TLS has been a topic you've avoided over the years because it is very dense and implementation can be fraught with fidgety pitfalls. You can read this book cover to cover, crosswalk to the copiously linked RFCs, or use it as a desk reference.
This is SSL/TLS for everyone.
Frequently asked questions
Information
Chapter 1
SSL, TLS and Cryptography
Cryptography
The Caesar Cipher
A | = | X | H | = | E | O | = | L | V | = | S |
B | = | Y | I | = | F | P | = | M | W | = | T |
C | = | Z | J | = | G | Q | = | N | X | = | U |
D | = | A | K | = | H | R | = | O | Y | = | V |
E | = | B | L | = | I | S | = | P | Z | = | W |
F | = | C | M | = | J | T | = | Q | |||
G | = | D | N | = | K | U | = | R |
I | L | O | V | E | C | R | Y | P | T | O | G | R | A | P | H | Y | ||
F | I | L | S | B | Z | O | V | M | Q | L | D | O | X | M | E | V |
While cryptographic systems vary in complexity, scale and design, cryptographers have agreed upon a set of standard terms. Some of these terms are:
âPlaintextâ is the original message, unaltered. âCiphertextâ refers to the encoded message. âEncryptionâ is the act of converting plaintext into ciphertext, and âDecryptionâ is the act of converting a ciphertext back into plaintext by putting the cipher through its paces in reverse.
Symmetric Cryptography
Symmetric Cryptography is also commonly known as a âshared secretâ.
Pros | It is extremely fast. Key management is very simple â there is only one key to manage. |
Cons | As everyone shares the same key, itâs impossible to figure out whoâs who in a conversation. At times, knowing whoâs who is really important, and being able to do it is referred to in cryptography as ânon-repudiationâ. |
The number of possible keys is referred to as the âkeyspaceâ. Ideally the keyspace should be large enough to deter anyone from attempting a Brute Force Attack, which is when every possible key is easily tested until the correct one is discovered.
Asymmetric Cryptography
Pros | It inherently identifies parties uniquely. It can be put to use immediately â you can share a public key with anyone. |
Cons | Itâs slow. It requires more work administratively to manage keys. Without third party verification, there is no guarantee that the public key belongs to the person who you expect. You could be encrypting messages that can only be decrypted by an attacker! |
SSL/TLS: The Best of Both Worlds
SSL stands for âSecure Sockets Layerâ
TLS stands for âTransport Layer Securityâ