
TLS Cryptography In-Depth
By :

TLS Cryptography In-Depth
By:
Overview of this book
TLS is the most widely used cryptographic protocol today, enabling e-commerce, online banking, and secure online communication. Written by Dr. Paul Duplys, Security, Privacy & Safety Research Lead at Bosch, and Dr. Roland Schmitz, Internet Security Professor at Stuttgart Media University, this book will help you gain a deep understanding of how and why TLS works, how past attacks on TLS were possible, and how vulnerabilities that enabled them were addressed in the latest TLS version 1.3. By exploring the inner workings of TLS, you’ll be able to configure it and use it more securely.
Starting with the basic concepts, you’ll be led step by step through the world of modern cryptography, guided by the TLS protocol. As you advance, you’ll be learning about the necessary mathematical concepts from scratch. Topics such as public-key cryptography based on elliptic curves will be explained with a view on real-world applications in TLS. With easy-to-understand concepts, you’ll find out how secret keys are generated and exchanged in TLS, and how they are used to creating a secure channel between a client and a server.
By the end of this book, you’ll have the knowledge to configure TLS servers securely. Moreover, you’ll have gained a deep knowledge of the cryptographic primitives that make up TLS.
Table of Contents (30 chapters)
Preface
Part I Getting Started
Chapter 1: The Role of Cryptography in the Connected World
Chapter 2: Secure Channel and the CIA Triad
Chapter 3: A Secret to Share
Chapter 4: Encryption and Decryption
Chapter 5: Entity Authentication
Chapter 6: Transport Layer Security at a Glance
Part II Shaking Hands
Chapter 7: Public-Key Cryptography
Chapter 8: Elliptic Curves
Chapter 9: Digital Signatures
Chapter 10: Digital Certificates and Certification Authorities
Chapter 11: Hash Functions and Message Authentication Codes
Chapter 12: Secrets and Keys in TLS 1.3
Chapter 13: TLS Handshake Protocol Revisited
Part III Off the Record
Chapter 14: Block Ciphers and Their Modes of Operation
Chapter 15: Authenticated Encryption
Chapter 16: The Galois Counter Mode
Chapter 17: TLS Record Protocol Revisited
Chapter 18: TLS Cipher Suites
Part IV Bleeding Hearts and Biting Poodles
Chapter 19: Attacks on Cryptography
Chapter 20: Attacks on the TLS Handshake Protocol
Chapter 21: Attacks on the TLS Record Protocol
Chapter 22: Attacks on TLS Implementations
Bibliography
Index
Other Books You Might Enjoy
How would like to rate this book
Customer Reviews