Overview
- Presents a comprehensive overview on critical cryptographic mechanisms
- Provides materials for lectures for courses in ‘computer networks’ and ‘introduction to cryptography’
- Includes questions and exercises and can complement additional material like slides, videos, and exams
Part of the book series: Information Security and Cryptography (ISC)
Access this book
Tax calculation will be finalised at checkout
Other ways to access
About this book
This practical textbook/guide is intended for academic courses in IT security and as a reference guide for Internet security. It describes important Internet standards in a language close to real-world cryptographic research and covers the essential cryptographic standards used on the Internet, from WLAN encryption to TLS and e-mail security. From academic and non-academic research, the book collects information about attacks on implementations of these standards (because these attacks are the main source of new insights into real-world cryptography). By summarizing all this in one place, this useful volume can highlight cross-influences in standards, as well as similarities in cryptographic constructions.
Topics and features:
· Covers the essential standards in Internet cryptography
· Integrates work exercises and problems in each chapter
· Focuses especially on IPsec, secure e-mail and TLS
· Summarizes real-world cryptography in three introductory chapters
· Includes necessary background from computer networks
· Keeps mathematical formalism to a minimum, and treats cryptographic primitives mainly as blackboxes
· Provides additional background on web security in two concluding chapters
Offering a uniquely real-world approach to Internet cryptography, this textbook/reference will be highly suitable to students in advanced courses on cryptography/cryptology, as well as eminently useful to professionals looking to expand their background and expertise.
Professor Dr. Jörg Schwenk holds the Chair for Network and Data Security at the Ruhr University in Bochum, Germany. He (co-)authored about 150 papers on the book’s topics, including for conferences like ACM CCS, Usenix Security, IEEE S&P, and NDSS.
Similar content being viewed by others
Keywords
Table of contents (21 chapters)
Authors and Affiliations
About the author
Professor Dr. Jörg Schwenk holds the Chair for Network and Data Security at the Ruhr University in Bochum, Germany. He (co-)authored about 150 papers on the book’s topics, including for conferences like ACM CCS, Usenix Security, IEEE S&P, and NDSS.
Bibliographic Information
Book Title: Guide to Internet Cryptography
Book Subtitle: Security Protocols and Real-World Attack Implications
Authors: Jörg Schwenk
Series Title: Information Security and Cryptography
DOI: https://doi.org/10.1007/978-3-031-19439-9
Publisher: Springer Cham
eBook Packages: Computer Science, Computer Science (R0)
Copyright Information: The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG 2022
Hardcover ISBN: 978-3-031-19438-2Published: 26 November 2022
Softcover ISBN: 978-3-031-19441-2Published: 26 November 2023
eBook ISBN: 978-3-031-19439-9Published: 25 November 2022
Series ISSN: 1619-7100
Series E-ISSN: 2197-845X
Edition Number: 1
Number of Pages: XIX, 530
Number of Illustrations: 192 b/w illustrations, 80 illustrations in colour
Topics: Cryptology, Systems and Data Security, Security Services