Secure data networking:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Boston [u.a.]
Artech House
1993
|
Ausgabe: | 1. print. |
Schriftenreihe: | The Artech House optoelectronics library
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | IX, 241 S. graph. Darst. |
ISBN: | 0890066922 |
Internformat
MARC
LEADER | 00000nam a2200000zc 4500 | ||
---|---|---|---|
001 | BV021914408 | ||
003 | DE-604 | ||
005 | 20040301000000.0 | ||
007 | t | ||
008 | 931025s1993 d||| |||| 00||| eng d | ||
020 | |a 0890066922 |9 0-89006-692-2 | ||
035 | |a (OCoLC)27727272 | ||
035 | |a (DE-599)BVBBV021914408 | ||
040 | |a DE-604 |b ger | ||
041 | 0 | |a eng | |
049 | |a DE-706 | ||
050 | 0 | |a TK5105.5 | |
082 | 0 | |a 005.8 |2 20 | |
100 | 1 | |a Purser, Michael |e Verfasser |4 aut | |
245 | 1 | 0 | |a Secure data networking |c Michael Purser |
250 | |a 1. print. | ||
264 | 1 | |a Boston [u.a.] |b Artech House |c 1993 | |
300 | |a IX, 241 S. |b graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 0 | |a The Artech House optoelectronics library | |
650 | 4 | |a Computer networks |x Management | |
650 | 4 | |a Computer networks |x Security measures | |
650 | 4 | |a Computer security | |
650 | 0 | 7 | |a OSI-Modell |0 (DE-588)4201284-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Sicherheit |0 (DE-588)4054790-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptologie |0 (DE-588)4033329-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Rechnernetz |0 (DE-588)4070085-9 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Sicherheit |0 (DE-588)4054790-5 |D s |
689 | 1 | |5 DE-604 | |
689 | 2 | 0 | |a Rechnernetz |0 (DE-588)4070085-9 |D s |
689 | 2 | |5 DE-604 | |
689 | 3 | 0 | |a OSI-Modell |0 (DE-588)4201284-3 |D s |
689 | 3 | |5 DE-604 | |
856 | 4 | 2 | |m HBZ Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=015129579&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-015129579 |
Datensatz im Suchindex
_version_ | 1804135865118621696 |
---|---|
adam_text | Contents
Preface ix
Chapter 1 Security Threats, Services, and Mechanisms 1
1.1 Introduction 1
1.1.1 The Security Policy 2
1.1.2 Risk Analysis and Management 4
1.1.3 Summary 6
1.2 Deliberate Threats to Information 6
1.3 Services 7
1.4 Security Mechanisms 9
1.4.1 Encryption 9
1.4.2 Integrity Checks 10
1.4.3 Uniqueness Mechanisms 12
1.5 Security Standards 13
1.6 Summary 16
References 16
Chapter 2 Security Procedures 17
2.1 Attacks To Be Thwarted 17
2.1.1 Statistical Analysis 17
2.1.2 Known Plaintext Attack 18
2.1.3 Chosen Cyphertext Attack 18
2.1.4 Searching the Key Space 18
2.1.5 Breaking the Algorithm 18
2.1.6 Stealing the Key 19
2.1.7 Introducing a False Key 19
2.1.8 Modifying Cyphertext 19
2.1.9 Modifying Plaintext 19
2.2 Encryption Procedures 20
V
VI
2.3 Authentication Procedures 24
2.3.1 Secure Access Management 27
2.3.2 Personal Identification Procedures 31
2.3.3. Chipcards for Access Control 35
2.3.4 The Secure Session 38
2.3.5 Anonymity 41
2.4 OSI Layers and Networks 43
References 46
Chapter 3 Security Management 47
3.1 Scope of Security Management 47
3.2 Key Management 48
3.2.1 Key Generation 48
3.2.2 Certification and Notarisation of Keys 51
3.2.3 Distribution of Keys 55
3.2.4 Withdrawal of Keys 59
3.3 PIN Management 60
3.4 Authorization 61
3.5 System Security Management 63
3.6 Security Service Management 66
References 68
Chapter 4 Algorithms 69
4.1 Traditional Cypher Algorithms 69
4.2 The Data Encryption Algorithm 77
4.3 Asymmetric Algorithms 82
4.3.1 DL Authentication 86
4.3.2 The RSA Algorithm 86
4.3.3 Fiat Shamir (FS) Signatures 90
4.3.4 Trapdoor Knapsack Schemes 92
4.3.5 Making Asymmetric Cyphers From Symmetric Ones 95
4.4 Stream Cyphers 98
4.5 Some Other Useful Algorithms 104
4.5.1 Hashing 104
4.5.2 Random Numbers 110
4.5.3 The Euclidean Algorithm 113
4.6 Conclusion 115
References 115
Chapter 5 OSI and Security 117
5.1 The OSI/RM and Security 117
5.2 Security and X.400 MHS 122
5.2.1 Origin Authentication 127
5.2.2 Proof and Nonrepudiation of Submission and Delivery 127
VII
5.2.3 Secure Access Management 129
5.2.4 Integrity/Confidentiality 130
5.2.5 General Message Security Services 132
5.2.6 Registration Security Services 132
5.2.7 A Different Approach—PEM 133
5.3 EDI Security 134
5.3.1 X.435 and Security 134
5.3.2 The ANSI X12 Secure EDI Approach 138
5.3.3 Security and EDIFACT 142
5.4 The X.500 Directory 144
5.5 Conclusion 147
References 148
Chapter 6 Applications, Systems, Products, and Architectures 149
6.1 Some Banking and Financial Applications 149
6.1.1 ISO 8730 150
6.1.2 SWIFT 151
6.1.3 ETEBAC 5 152
6.1.4 ATMs and Debit and Credit Cards 154
6.2 Security Products 155
6.2.1 Communication Encryptors 155
6.2.2 File Security Products 158
6.2.3 Products for User Identification 159
6.2.4 Products for Intersystem Access Control 162
6.2.5 Security Management Products 163
6.2.6 Some Other Relevant Products 165
6.2.7 A Typical Security Product for a PC 166
6.3 Security Architectures 166
6.3.1 Kerberos 167
6.3.2 SESAME 169
6.3.3 Comparison of Architectures 173
6.3.4 Other Security Architectures 174
References 175
Chapter 7 Conclusion 177
7.1 Voice and Video Networks 177
7.2 Security of Mobile and Radio Based Systems 179
7.3 Some Other Application Areas for Security 181
References 182
Appendix A The Open Systems Interconnection Reference Model (OSI/RM)
and Security 185
References 189
Appendix B Shannon s Theory of Secrecy Systems 191
VIII
B.I Perfect Secrecy 191
B.2 The Unicity Key Length and Unicity Distance 193
References 194
Appendix C Maximum Length Sequences 195
C.I Linear Feedback Shift Registers (LFBSR) 196
C.2 Another Form for LFBSRs 198
C.3 De Bruijn Sequences 199
C.4 Statistical Properties of MLSs 203
C.5 Synthesizing Sequences—The Massey Algorithm 204
References 206
Appendix D Euler s Totient Function 207
References 213
Appendix E Finding Large Prime Numbers 215
E.I Testing Primality 216
E.2 Finding Primes for RSA 220
References 221
Appendix F Factorising Large Integers 223
F.I Fermat Factorisation 223
F.2 Pollard s Monte Carlo Method 224
References 226
Appendix G The CCITT X.400 (1988) Message Handling Systems
Recommendations 227
Appendix H Information Technology Security Evaluation Criteria 229
H.I Assuring Effectiveness 230
H.2 Assuring Correctness 231
H.2.1 Construction 231
H.2.2 Operation 232
Selected Bibliography 233
Index 237
|
adam_txt |
Contents
Preface ix
Chapter 1 Security Threats, Services, and Mechanisms 1
1.1 Introduction 1
1.1.1 The Security Policy 2
1.1.2 Risk Analysis and Management 4
1.1.3 Summary 6
1.2 Deliberate Threats to Information 6
1.3 Services 7
1.4 Security Mechanisms 9
1.4.1 Encryption 9
1.4.2 Integrity Checks 10
1.4.3 Uniqueness Mechanisms 12
1.5 Security Standards 13
1.6 Summary 16
References 16
Chapter 2 Security Procedures 17
2.1 Attacks To Be Thwarted 17
2.1.1 Statistical Analysis 17
2.1.2 Known Plaintext Attack 18
2.1.3 Chosen Cyphertext Attack 18
2.1.4 Searching the Key Space 18
2.1.5 Breaking the Algorithm 18
2.1.6 Stealing the Key 19
2.1.7 Introducing a False Key 19
2.1.8 Modifying Cyphertext 19
2.1.9 Modifying Plaintext 19
2.2 Encryption Procedures 20
V
VI
2.3 Authentication Procedures 24
2.3.1 Secure Access Management 27
2.3.2 Personal Identification Procedures 31
2.3.3. Chipcards for Access Control 35
2.3.4 The Secure Session 38
2.3.5 Anonymity 41
2.4 OSI Layers and Networks 43
References 46
Chapter 3 Security Management 47
3.1 Scope of Security Management 47
3.2 Key Management 48
3.2.1 Key Generation 48
3.2.2 Certification and Notarisation of Keys 51
3.2.3 Distribution of Keys 55
3.2.4 Withdrawal of Keys 59
3.3 PIN Management 60
3.4 Authorization 61
3.5 System Security Management 63
3.6 Security Service Management 66
References 68
Chapter 4 Algorithms 69
4.1 Traditional Cypher Algorithms 69
4.2 The Data Encryption Algorithm 77
4.3 Asymmetric Algorithms 82
4.3.1 DL Authentication 86
4.3.2 The RSA Algorithm 86
4.3.3 Fiat Shamir (FS) Signatures 90
4.3.4 Trapdoor Knapsack Schemes 92
4.3.5 Making Asymmetric Cyphers From Symmetric Ones 95
4.4 Stream Cyphers 98
4.5 Some Other Useful Algorithms 104
4.5.1 Hashing 104
4.5.2 Random Numbers 110
4.5.3 The Euclidean Algorithm 113
4.6 Conclusion 115
References 115
Chapter 5 OSI and Security 117
5.1 The OSI/RM and Security 117
5.2 Security and X.400 MHS 122
5.2.1 Origin Authentication 127
5.2.2 Proof and Nonrepudiation of Submission and Delivery 127
VII
5.2.3 Secure Access Management 129
5.2.4 Integrity/Confidentiality 130
5.2.5 General Message Security Services 132
5.2.6 Registration Security Services 132
5.2.7 A Different Approach—PEM 133
5.3 EDI Security 134
5.3.1 X.435 and Security 134
5.3.2 The ANSI X12 Secure EDI Approach 138
5.3.3 Security and EDIFACT 142
5.4 The X.500 Directory 144
5.5 Conclusion 147
References 148
Chapter 6 Applications, Systems, Products, and Architectures 149
6.1 Some Banking and Financial Applications 149
6.1.1 ISO 8730 150
6.1.2 SWIFT 151
6.1.3 ETEBAC 5 152
6.1.4 ATMs and Debit and Credit Cards 154
6.2 Security Products 155
6.2.1 Communication Encryptors 155
6.2.2 File Security Products 158
6.2.3 Products for User Identification 159
6.2.4 Products for Intersystem Access Control 162
6.2.5 Security Management Products 163
6.2.6 Some Other Relevant Products 165
6.2.7 A Typical Security Product for a PC 166
6.3 Security Architectures 166
6.3.1 Kerberos 167
6.3.2 SESAME 169
6.3.3 Comparison of Architectures 173
6.3.4 Other Security Architectures 174
References 175
Chapter 7 Conclusion 177
7.1 Voice and Video Networks 177
7.2 Security of Mobile and Radio Based Systems 179
7.3 Some Other Application Areas for Security 181
References 182
Appendix A The Open Systems Interconnection Reference Model (OSI/RM)
and Security 185
References 189
Appendix B Shannon's Theory of Secrecy Systems 191
VIII
B.I Perfect Secrecy 191
B.2 The Unicity Key Length and Unicity Distance 193
References 194
Appendix C Maximum Length Sequences 195
C.I Linear Feedback Shift Registers (LFBSR) 196
C.2 Another Form for LFBSRs 198
C.3 De Bruijn Sequences 199
C.4 Statistical Properties of MLSs 203
C.5 Synthesizing Sequences—The Massey Algorithm 204
References 206
Appendix D Euler's Totient Function 207
References 213
Appendix E Finding Large Prime Numbers 215
E.I Testing Primality 216
E.2 Finding Primes for RSA 220
References 221
Appendix F Factorising Large Integers 223
F.I Fermat Factorisation 223
F.2 Pollard's Monte Carlo Method 224
References 226
Appendix G The CCITT X.400 (1988) Message Handling Systems
Recommendations 227
Appendix H Information Technology Security Evaluation Criteria 229
H.I Assuring Effectiveness 230
H.2 Assuring Correctness 231
H.2.1 Construction 231
H.2.2 Operation 232
Selected Bibliography 233
Index 237 |
any_adam_object | 1 |
any_adam_object_boolean | 1 |
author | Purser, Michael |
author_facet | Purser, Michael |
author_role | aut |
author_sort | Purser, Michael |
author_variant | m p mp |
building | Verbundindex |
bvnumber | BV021914408 |
callnumber-first | T - Technology |
callnumber-label | TK5105 |
callnumber-raw | TK5105.5 |
callnumber-search | TK5105.5 |
callnumber-sort | TK 45105.5 |
callnumber-subject | TK - Electrical and Nuclear Engineering |
ctrlnum | (OCoLC)27727272 (DE-599)BVBBV021914408 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
discipline_str_mv | Informatik |
edition | 1. print. |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01740nam a2200493zc 4500</leader><controlfield tag="001">BV021914408</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20040301000000.0</controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">931025s1993 d||| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0890066922</subfield><subfield code="9">0-89006-692-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)27727272</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV021914408</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-706</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">TK5105.5</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">20</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Purser, Michael</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Secure data networking</subfield><subfield code="c">Michael Purser</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1. print.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boston [u.a.]</subfield><subfield code="b">Artech House</subfield><subfield code="c">1993</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">IX, 241 S.</subfield><subfield code="b">graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">The Artech House optoelectronics library</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Management</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">OSI-Modell</subfield><subfield code="0">(DE-588)4201284-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Sicherheit</subfield><subfield code="0">(DE-588)4054790-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Sicherheit</subfield><subfield code="0">(DE-588)4054790-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="2" ind2="0"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="3" ind2="0"><subfield code="a">OSI-Modell</subfield><subfield code="0">(DE-588)4201284-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">HBZ Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=015129579&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-015129579</subfield></datafield></record></collection> |
id | DE-604.BV021914408 |
illustrated | Illustrated |
index_date | 2024-07-02T16:05:25Z |
indexdate | 2024-07-09T20:47:17Z |
institution | BVB |
isbn | 0890066922 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-015129579 |
oclc_num | 27727272 |
open_access_boolean | |
owner | DE-706 |
owner_facet | DE-706 |
physical | IX, 241 S. graph. Darst. |
publishDate | 1993 |
publishDateSearch | 1993 |
publishDateSort | 1993 |
publisher | Artech House |
record_format | marc |
series2 | The Artech House optoelectronics library |
spelling | Purser, Michael Verfasser aut Secure data networking Michael Purser 1. print. Boston [u.a.] Artech House 1993 IX, 241 S. graph. Darst. txt rdacontent n rdamedia nc rdacarrier The Artech House optoelectronics library Computer networks Management Computer networks Security measures Computer security OSI-Modell (DE-588)4201284-3 gnd rswk-swf Sicherheit (DE-588)4054790-5 gnd rswk-swf Kryptologie (DE-588)4033329-2 gnd rswk-swf Rechnernetz (DE-588)4070085-9 gnd rswk-swf Kryptologie (DE-588)4033329-2 s DE-604 Sicherheit (DE-588)4054790-5 s Rechnernetz (DE-588)4070085-9 s OSI-Modell (DE-588)4201284-3 s HBZ Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=015129579&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Purser, Michael Secure data networking Computer networks Management Computer networks Security measures Computer security OSI-Modell (DE-588)4201284-3 gnd Sicherheit (DE-588)4054790-5 gnd Kryptologie (DE-588)4033329-2 gnd Rechnernetz (DE-588)4070085-9 gnd |
subject_GND | (DE-588)4201284-3 (DE-588)4054790-5 (DE-588)4033329-2 (DE-588)4070085-9 |
title | Secure data networking |
title_auth | Secure data networking |
title_exact_search | Secure data networking |
title_exact_search_txtP | Secure data networking |
title_full | Secure data networking Michael Purser |
title_fullStr | Secure data networking Michael Purser |
title_full_unstemmed | Secure data networking Michael Purser |
title_short | Secure data networking |
title_sort | secure data networking |
topic | Computer networks Management Computer networks Security measures Computer security OSI-Modell (DE-588)4201284-3 gnd Sicherheit (DE-588)4054790-5 gnd Kryptologie (DE-588)4033329-2 gnd Rechnernetz (DE-588)4070085-9 gnd |
topic_facet | Computer networks Management Computer networks Security measures Computer security OSI-Modell Sicherheit Kryptologie Rechnernetz |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=015129579&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT pursermichael securedatanetworking |