JON C. GRAFF, PhD, is Vice President and Chief Cryptographic Architect at NetReliance. An internationally known speaker and author, he has architected cryptographic systems for companies such as Tracor Ultron, Wells Fargo Bank, KPMG, Deloitte & Touche, the California Independent System Operator (Cal ISO), and NetReliance.
A clear and easy guide on how to use cryptography to secure e-commerce transactions
To be on the cutting edge of e-commerce, you need to understand how to best utilize cryptography to offer secure services for your customers over the Internet. But if you reach for most of the available books on the subject, you'll find that they are far too technical for most business needs. If you need a quick and lucid managerial summary to help you develop effective e-commerce strategies, this is the book for you.
Geared to nontechnical managers who would like to explore the underlying concepts of modern cryptography, this book features an easily accessible, logical explanation of how cryptography works to solve real-world e-commerce problems, a tutorial on the underlying mathematics, and two case studies of PKI cryptographic architectures, showing how Kerberos and PKC can be wedded to protect a company's intranet and how a full-blown working PKI provides security to a company's Internet communications.
Divided into three major parts tailored to readers' needs-Introduction to Modern Cryptography, Tutorial on the Mathematics of Cryptography, and case studies-the book covers:
* How symmetrical key cryptography ensures confidentiality of messages
* How cryptography lets you detect whether a message has been modified in transit
* Why the distribution of cryptographic keys is important and difficult
* The nuts and bolts of Kerberos-a major component of Microsoft's Windows 2000 security solution
* How Public Key Cryptography ensures security between people who share no prior secret information
* Digital signatures on electronic contracts and the concept of non-repudiation
* How digital certificates ensure positive identification of individuals
Introduction
Cryptography, the art of "secret writing" or concealing information from unauthorized people, is a fascinating field. It is very old and has been used since the invention of writing to protect communications. Cryptography has played a significant role in numerous historic occasions. Wars have been started, won, and lost because of correctly and incorrectly used cryptography. Mary, Queen of Scots, lost her head because of secrets revealed in her supposedly secret letters. The United States entered World War 1 based on the British decryption of the famous German "Zimmerman" telegram. And of course, the Allies "read" the Japanese and German encrypted transmissions during World War II revealing to the Allies what the Axis powers were doing. On the other hand, strong cryptography kept much of the Allies' information hidden from the Axis powers, so the site of D-Day and the instructions for the attacks on the U-boats were never revealed.
Recently, in the last 20 or so years, cryptography has "come out the cold" and has moved out of the governmental environment and into the public domain. Cryptography is now playing a very significant role in our lives. It has protected our banking and credit card transactions for the past 20 years, and it is becoming the foundation for trust on the Internet.
Cryptography presents the opportunity to facilitate new ways of doing business, many of which have not yet been envisioned. With the use of cryptography, in the near future these things will be readily available and accepted:
* Electronic shopping on the Internet (haven't you purchased something on the Internet?)
* The ability to remotely file electronic legal papers and contracts
The wide acceptance of digital signatures that make documents:
* Unforgeable
* Unmodifiable
* Irrefutable
Digital signature will permit the wide dissemination and sales of electronic (digital):
* Books
* Photographs
* Artwork
* Recordings
Secure smart cards that could be used for multiple purposes, each card containing digital certificates for digital:
* Creditcards
* Driver's licenses
* Passports
* Medical records
* Access to resources
* Positive identification
In this book, I will guide the reader to understand the cryptographic mechanisms that will make these things possible by using lots of examples, metaphors, explanatory drawings, explanations of real implementations and atrocious puns.
Where I first define a keyword, the keyword appears in SMALL CAPS. This will assist the reader in using the index to locate definitions.
Additionally, I have liberally used notes and footnotes to give more technical information, further explanations and references, and sometimes just asides and irreverent remarks.
The book has these major sections:
An Explanation of Modem Cryptography (Chapters 1-9) A Tutorial Explaining the Underlying Mathematics of Cryptography (Chapter 10) Case Studies of Two Cryptographic Architectures (Chapters 11 and 12)
The sections cover:
An Explanation of Modem Cryptography (Chapters 1-9). In this section I have endeavored to write an accessible, easily understood, and entertaining introduction to Modern Cryptography for the nontechnical reader. It is written for people with an interest in learning about the concepts underlying modern cryptography without the mathematics. The explanations are almost all metaphors, and elementary arithmetic is only used in a very few places. In the very few places where mathematics is required, only knowledge of addition and subtraction are required. There are some mathematical notations used for clarity. These mathematical notations are clearly explained and made obvious by the text and the accompanying figures.
The presentation is visual, metaphorical, and logical. I incorporated a large number of figures to help the reader visualize what is occurring, and I made every attempt to spell out each logical step to avoid the "rest of the explanation is left to the reader" syndrome.
However simple the presentation, the section is not without substance. It presents the logical underpinnings of the field so that the reader will come away with a good grasp of how cryptography works and how it is applied. There is also a heavy undercurrent of computer and communication security.
This section is based on a course that I have taught over the last 12 years. I have tested the material and presentation in front of numerous live audiences and received universally positive responses to the clarity and content of my presentation.
A Tutorial Explaining the Underlying Mathematics of Cryptography (Chapter 10). In this section I have endeavored to write for the non- mathematician an easily understood explanation of the mathematical underpinnings of cryptography and particularly those for Public Key cryptography. Starting with the Caesar Cipher, I introduce modulo arithmetic and build from there. I have given the reader a review of all the necessary algebra with a number of worked examples showing all the steps.
The finale of this section is the explanations and fully worked 'toy' examples of the three major cryptographic algorithms, Diffie-Hellman (-Merkle) for key agreement, RSA for confidentiality and digital signatures and E1Gamal for confidentiality and digital signatures.
Case Studies of Two Cryptographic Architectures. These are two detailed descriptions of cryptographic architectures that I've developed and are actually working. They demonstrate the process for developing cryptographic architectures and explain the considerations that go into creating successful and secure architectures.
The first case study, (Chapter 11), Protecting an Intranet with a Kerberos and PKC Hybrid, shows how to meld the best aspects of Kerberos and PKC to efficiently and automatically provide cryptographic security in a closed environment.
The second case study, Protecting the California ISO Internet Communications with PKC, shows how successful Public Key Infrastructure (PKI) is architected.
„Über diesen Titel“ kann sich auf eine andere Ausgabe dieses Titels beziehen.
Anbieter: ThriftBooks-Dallas, Dallas, TX, USA
Paperback. Zustand: Very Good. No Jacket. May have limited writing in cover pages. Pages are unmarked. ~ ThriftBooks: Read More, Spend Less. Artikel-Nr. G0471405744I4N00
Anzahl: 1 verfügbar
Anbieter: ThriftBooks-Atlanta, AUSTELL, GA, USA
Paperback. Zustand: Very Good. No Jacket. May have limited writing in cover pages. Pages are unmarked. ~ ThriftBooks: Read More, Spend Less. Artikel-Nr. G0471405744I4N00
Anzahl: 1 verfügbar
Anbieter: AwesomeBooks, Wallingford, Vereinigtes Königreich
Paperback. Zustand: Very Good. Cryptography and E-commerce: Cryptography Basics for Non-technical Managers Working with E-business Products and Services (Technology Briefs Series) This book is in very good condition and will be shipped within 24 hours of ordering. The cover may have some limited signs of wear but the pages are clean, intact and the spine remains undamaged. This book has clearly been well maintained and looked after thus far. Money back guarantee if you are not satisfied. See all our books here, order more than 1 book and get discounted shipping. Artikel-Nr. 7719-9780471405740
Anzahl: 2 verfügbar
Anbieter: Anybook.com, Lincoln, Vereinigtes Königreich
Zustand: Fair. This is an ex-library book and may have the usual library/used-book markings inside.This book has soft covers. In fair condition, suitable as a study copy. Please note the Image in this listing is a stock photo and may not match the covers of the actual item,500grams, ISBN:9780471405740. Artikel-Nr. 9740867
Anzahl: 1 verfügbar
Anbieter: Bahamut Media, Reading, Vereinigtes Königreich
Zustand: Very Good. Shipped within 24 hours from our UK warehouse. Clean, undamaged book with no damage to pages and minimal wear to the cover. Spine still tight, in very good condition. Remember if you are not happy, you are covered by our 100% money back guarantee. Artikel-Nr. 6545-9780471405740
Anzahl: 2 verfügbar
Anbieter: Majestic Books, Hounslow, Vereinigtes Königreich
Zustand: New. pp. xviii + 222 Illus. Artikel-Nr. 7352588
Anzahl: 4 verfügbar
Anbieter: Romtrade Corp., STERLING HEIGHTS, MI, USA
Zustand: New. This is a Brand-new US Edition. This Item may be shipped from US or any other country as we have multiple locations worldwide. Artikel-Nr. ABNR-35004