+353-1-416-8900REST OF WORLD
+44-20-3973-8888REST OF WORLD
1-917-300-0470EAST COAST U.S
1-800-526-8630U.S. (TOLL FREE)


Implementing SSL / TLS Using Cryptography and PKI

  • ID: 1810976
  • Book
  • January 2011
  • 704 Pages
  • John Wiley and Sons Ltd
1 of 3
Let′s get down to a practical implementation of SSL and TLS

SSL/TLS is a standardized, widely implemented, peer–reviewed protocol for applying cryptographic primitives to arbitrary networked communications. It provides privacy, integrity, and a measure of authenticity to otherwise inherently untrustworthy network connections.

While most books detail the protocol, this one is intended to provide you with a nearly complete SSL/TLS library, developed incrementally using C code. Whether or not you have a working knowledgeof cryptography, you′ll find this practical guide helps you understand the internals of these libraries so that, when it comes time to use one, you will have a firm understanding of what takes place at each stage.

  • Understand secure sockets and the HTTP protocol

  • Learn to protect against eavesdroppers with symmetric cryptography

  • Secure key exchanges over an insecure medium with public key cryptography and boost security with elliptic curve cryptography

  • Examine the use of digital signatures and X.509 certificates

  • Develop a usable, secure communications protocol with client–side TLS

  • Add server–side TLS 1.0 support

  • Use SSL in advanced situations, including safely reusing key material with sessionresumption and verifying identity with client authentication

Go to [external URL] to find code and other features related to this book

Note: Product cover images may vary from those shown
2 of 3
Introduction xxvii

Chapter 1 Understanding Internet Security 1

Chapter 2 Protecting Against Eavesdroppers with Symmetric Cryptography 29

Chapter 3 Secure Key Exchange over an Insecure Medium with Public Key Cryptography 91

Chapter 4 Authenticating Communications Using Digital Signatures 157

Chapter 5 Creating a Network of Trust Using X.509 Certifi cates 221

Chapter 6 A Usable, Secure Communications Protocol: Client–Side TLS 297

Chapter 7 Adding Server–Side TLS 1.0 Support 381

Chapter 8 Advanced SSL Topics 415

Chapter 9 Adding TLS 1.2 Support to Your TLS Library 479

Chapter 10 Other Applications of SSL 543

Appendix A Binary Representation of Integers: A Primer 567

Appendix B Installing TCPDump and OpenSSL 573

Appendix C Understanding the Pitfalls of SSLv2 579

Index 629

Note: Product cover images may vary from those shown
3 of 3
Joshua Davies
Note: Product cover images may vary from those shown