TLS Cryptography In-Depth

TLS Cryptography In-Depth

Dr. Paul Duplys / Dr. Roland Schmitz

60,18 €
IVA incluido
Disponible
Editorial:
Packt Publishing
Año de edición:
2024
ISBN:
9781804611951
60,18 €
IVA incluido
Disponible

Selecciona una librería:

  • Donde los libros
  • Librería 7artes
  • Librería Elías (Asturias)
  • Librería Kolima (Madrid)
  • Librería Proteo (Málaga)

A practical introduction to modern cryptography using the Transport Layer Security protocol as the primary referenceKey Features:Learn about real-world cryptographic pitfalls and how to avoid themUnderstand past attacks on TLS, how these attacks worked, and how they were fixedDiscover the inner workings of modern cryptography and its application within TLSPurchase of the print or Kindle book includes a free PDF eBookBook Description:TLS is the most widely used cryptographic protocol today, enabling e-commerce, online banking, and secure online communication. Written by Dr. Paul Duplys, Security, Privacy & Safety Research Lead at Bosch, and Dr. Roland Schmitz, Internet Security Professor at Stuttgart Media University, this book will help you gain a deep understanding of how and why TLS works, how past attacks on TLS were possible, and how vulnerabilities that enabled them were addressed in the latest TLS version 1.3. By exploring the inner workings of TLS, you’ll be able to configure it and use it more securely.Starting with the basic concepts, you’ll be led step by step through the world of modern cryptography, guided by the TLS protocol. As you advance, you’ll be learning about the necessary mathematical concepts from scratch. Topics such as public-key cryptography based on elliptic curves will be explained with a view on real-world applications in TLS. With easy-to-understand concepts, you’ll find out how secret keys are generated and exchanged in TLS, and how they are used to creating a secure channel between a client and a server.By the end of this book, you’ll have the knowledge to configure TLS servers securely. Moreover, you’ll have gained a deep knowledge of the cryptographic primitives that make up TLS.What You Will Learn:Understand TLS principles and protocols for secure internet communicationFind out how cryptographic primitives are used within TLS V1.3Discover best practices for secure configuration and implementation of TLSEvaluate and select appropriate cipher suites for optimal securityGet an in-depth understanding of common cryptographic vulnerabilities and ways to mitigate themExplore forward secrecy and its importance in maintaining confidentialityUnderstand TLS extensions and their significance in enhancing TLS functionalityWho this book is for:This book is for IT professionals, cybersecurity professionals, security engineers, cryptographers, software developers, and administrators looking to gain a solid understanding of TLS specifics and their relationship with cryptography. This book can also be used by computer science and computer engineering students to learn about key cryptographic concepts in a clear, yet rigorous way with its applications in TLS. There are no specific prerequisites, but a basic familiarity with programming and mathematics will be helpful.

Artículos relacionados

  • Privacy, Intrusion Detection and Response
    Peyman Kabiri
    Though network security has almost always been about encryption and decryption, the field of network security is moving towards securing the network environment rather than just stored or transferred data. Privacy, Intrusion Detection and Response: Technologies for Protecting Networks explores the latest practices and research works in the area of privacy, intrusion detection, ...
    Disponible

    255,72 €

  • Foundations of Cryptography
    Goldreich Oded / Oded Goldreich
    ...
    Disponible

    95,01 €

  • Quantum Information Theory
    Mark M. Wilde / Mark MWilde
    ...
    Disponible

    112,59 €

  • Automated Software Diversity
    Lucas Davi / Per Larsen / Stefan Brunthaler
    Whereas user-facing applications are often written in modern languages, the firmware, operating system, support libraries, and virtual machines that underpin just about any modern computer system are still written in low-level languages that value flexibility and performance over convenience and safety. Programming errors in low-level code are often exploitable and can, in the ...
  • Frameworks for Blockchain Standards, Tools, Testbeds, and Platforms
    In an era of rapid technological advancements, blockchain technology has emerged as a groundbreaking solution for decentralized trust and immutable record-keeping. Frameworks for Blockchain Standards, Tools, Testbeds, and Platforms delves into the intricate world of blockchain, offering a comprehensive exploration of its various dimensions. At its core, blockchain disrupts the ...
    Disponible

    373,22 €

  • Private Information Retrieval
    Elisa Bertino / Russell Paulet / Xun Yi
    This book deals with Private Information Retrieval (PIR), a technique allowing a user to retrieve an element from a server in possession of a database without revealing to the server which element is retrieved. PIR has been widely applied to protect the privacy of the user in querying a service provider on the Internet. For example, by PIR, one can query a location-based servic...