SSL/TLS Under Lock and Key
A Guide to Understanding SSL/TLS Cryptography
Paul Baka, Jeremy Schatten, Hollie Acres
- English
- ePUB (disponibile sull'app)
- Disponibile su iOS e Android
SSL/TLS Under Lock and Key
A Guide to Understanding SSL/TLS Cryptography
Paul Baka, Jeremy Schatten, Hollie Acres
Informazioni sul libro
If you are looking for a comprehensive, soup-to-nuts resource on SSL/TLS, look no further. This book, geared towards bridging the gap between the absolute beginner and the veteran IT Professional, combines the theoretical and the practical in equal measure.
The first half of our book focuses on foundational theory, covering topics such as:
- Symmetric vs Asymmetric cryptography
- One-Way functions
- Digital Signatures
- Key Generation
- History and Context
The second half encourages fledgling administrators to jump in with both feet, outlining the quirks of common tasks such as:
- Generating a signing request for a certificate (CSR)
- Generating a self-signed certificate (and when it is safe to do or not do so)
- Converting certificates between different formats including java keystores
- Configuring servers to meet best practices, not in a vacuum, but for thesecurity and compatibility needs of your business vertical.
Are you a systems administrator just starting out? A developer looking to not just implement, but to understand?Or perhaps SSL/TLS has been a topic you've avoided over the years because it is very dense and implementation can be fraught with fidgety pitfalls. You can read this book cover to cover, crosswalk to the copiously linked RFCs, or use it as a desk reference.
This is SSL/TLS for everyone.
Domande frequenti
Informazioni
Chapter 1
SSL, TLS and Cryptography
Cryptography
The Caesar Cipher
A | = | X | H | = | E | O | = | L | V | = | S |
B | = | Y | I | = | F | P | = | M | W | = | T |
C | = | Z | J | = | G | Q | = | N | X | = | U |
D | = | A | K | = | H | R | = | O | Y | = | V |
E | = | B | L | = | I | S | = | P | Z | = | W |
F | = | C | M | = | J | T | = | Q | |||
G | = | D | N | = | K | U | = | R |
I | L | O | V | E | C | R | Y | P | T | O | G | R | A | P | H | Y | ||
F | I | L | S | B | Z | O | V | M | Q | L | D | O | X | M | E | V |
While cryptographic systems vary in complexity, scale and design, cryptographers have agreed upon a set of standard terms. Some of these terms are:
“Plaintext” is the original message, unaltered. “Ciphertext” refers to the encoded message. “Encryption” is the act of converting plaintext into ciphertext, and “Decryption” is the act of converting a ciphertext back into plaintext by putting the cipher through its paces in reverse.
Symmetric Cryptography
Symmetric Cryptography is also commonly known as a “shared secret”.
Pros | It is extremely fast. Key management is very simple — there is only one key to manage. |
Cons | As everyone shares the same key, it’s impossible to figure out who’s who in a conversation. At times, knowing who’s who is really important, and being able to do it is referred to in cryptography as “non-repudiation”. |
The number of possible keys is referred to as the “keyspace”. Ideally the keyspace should be large enough to deter anyone from attempting a Brute Force Attack, which is when every possible key is easily tested until the correct one is discovered.
Asymmetric Cryptography
Pros | It inherently identifies parties uniquely. It can be put to use immediately — you can share a public key with anyone. |
Cons | It’s slow. It requires more work administratively to manage keys. Without third party verification, there is no guarantee that the public key belongs to the person who you expect. You could be encrypting messages that can only be decrypted by an attacker! |
SSL/TLS: The Best of Both Worlds
SSL stands for “Secure Sockets Layer”
TLS stands for “Transport Layer Security”