SSL & TLS Essentials: Securing the Web
"Great writing . . . a clear introduction to the most widely deployed security technology in the Internet."-Paul Lambert, former co-chair of IETF IPSEC working group
The Secure Sockets Layer (SSL) and Transport Layer Security(TLS) protocols form the foundation for e-commerce security on the World Wide Web, verifying the authenticity of Web sites, encrypting the transfer of sensitive data, and ensuring the integrity of information exchanged. Now-for the first time the details of these critical security protocols are available in a complete, clear, and concise reference. SSL and TLS Essentials provides complete documentation of the SSL and TLS protocols, including advanced and proprietary extensions never before published. The book thoroughly covers the protocols in operation, including the contents of their messages, message formats, and the cryptographic calculations used to construct them. The text also includes an introduction to cryptography and an explanation of X.509 public key certificates. Stephen Thomas, author of IPng and the TCP/IP Protocols, presents this complex material in a clear and reader-friendly manner. The book includes more than 80 figures and illustrations to supplement its text, and it describes SSL in the context of real-world, practical applications. Readers will immediately understand not only the academic principles behind he security protocols, but how those principles apply to their own network security challenges.
The book includes:
* Full details of Netscape's SSL and the IETF's TLS protocols, with differences between the two clearl highlighted and explained
* A concise tutorial in cryptography
* Complete coverage of Netscape's International Step-Up and Microsoft's Server Gated Cryptography implementations
* A description of X.509 public key certificates
* Details on implementing backwards compatibility among previous versions of SSL and TLS
* A thorough security checklist with explanations of all known attacks on SSL implementations, along with appropriate countermeasures.
The CD-ROM contains convenient electronic versions of the book for:
* Windows(r) CE handheld computers
* Adobe(r) Acrobat Reader for PCs
Visit our Web site at www.wiley.com/compbooks/
What people are saying - Write a review
We haven't found any reviews in the usual places.
Basic Cryptography 17
SSL Operation 37
6 other sections not shown
Abstract Syntax Notation Act Pnd Alice attacker bits browser bytes Calculate certificate authority Certificate message CertificateRequest CertificateVerify ChangeCipherSpec message cipher suites Client sends ClientHello message ClientKeyExchange message communication decrypt defines Diffie-Hellman Diffie-Hellman key exchange encoding encryption algorithms example field Figure Finished message format h-Mac hash algorithm hash function ietf International Step-Up Internet ipsec Issuer key cryptography key exchange key information key material key size length master secret MD5 hash message authentication code negotiation Netscape object identifier value options parameters premaster secret private key pseudorandom public key certificate random number Record Layer secret key Secure Sockets Layer security services sending party indicates SEQUENCE Server Gated Cryptography Server sends ServerHello message ServerHelloDone ServerKeyExchange message session sha hash signed Sockets Layer protocol Software ssl implementations ssl messages ssl protocol ssl specification ssl version 3.0 standard Table tion Transport Layer Security valid verify VeriSign x.509 certificates