throbber
APPENDIX C
`
`APPENDIX C
`
`Apple 1122 (Part 4 of 5)
`Apple v. USR
`|PR201 8-00813
`
`493
`
`493
`
`Apple 1122 (Part 4 of 5)
`Apple v. USR
`IPR2018-00813
`
`

`

`
` ° nvrroannnl
`
`
`
`Learn how secure data—encryption
`techniques work
`
`Protect confidential information
`on your network
`
`Get efficiai current cryptography
`grandaros on enclosed CD-ROM
`
`
`
`494
`
`

`

`
`
`OsbornaMcGraW-Ifill
`New York Chicago San Francisco
`Lisban Lamina Madrid Mexico City
`Milan New Deihi San Juan
`Seoul Singapore Sydney Tenants
`
`495
`
`495
`
`

`

`
`
`OsborneMcGraW-Hill
`
`2600 Tenth Street
`
`Berkeley, California 94710
`USA.
`
`To arrange bulk purchase discounts for sales promotions, premiums, or fund-
`raisers, please contact OshomefMeGraw-Hill at the above address. For
`information on translations or book distributors outside the U.S.A., please see
`the International Contact Information page immediately following the inéex of
`this book.
`
`BSA Security’s Official Guide to Cryptography
`
`Copyright © 2001 by The McGraw—Ifill Companies. All rights reserved, Printed
`in the United States ofAmez'ica. Except as permitted under the Copyright Act of
`1976, no part of this publication may be reproduced or distributed in any form or
`by any means, or stored in a database or retrieval system, without the prior
`written permission of the publisher, with the exception that the program listings
`may be entered, stereo, and executed in a computer system, but they may not be
`reproduced for publication.
`
`234567890 FGR FGR 01987654321
`
`Book pin 0437-2131384 and CD p/n 0-07-213137~3
`parts of
`ISBN 0477-2131394:
`
`Publisher
`Brandon Al Nordin
`Vice President &
`
`Associate Publisher
`Scott Rogers
`Executive Editor
`Steven Elliot
`Senior Project Editor
`LeeAnn Pickrell
`Acquisitions Coordinator
`Alexander Corona
`
`Technical Editors
`Blake Doumaee
`“1353i” Nelson
`
`Copy Editor
`Betsy Hardinger
`Composition and Indexer
`MacAllister Publishing Services, LLC
`Illustrators
`Michael Mueller
`Beth Yoong
`Lyssa Szeben-Wald
`
`Information has been obtained by Osborne/McGraw-Hili (ion; sources believed to be reli»
`able. However: heeause of the possibility of human or mechanical error by our sources,
`ClsbomechGraw-Hill, or others, OsbomeMcGraw—Hill does not guarantee the accuracy,
`adequacy, or completeness of” any information and is not responsible for any errors or omis—
`sions or the results obtained from use of such information.
`
`496
`
`496
`
`

`

`To Fae-Chi, Gwen, Ray, Satomi, Michelle, Alexander,
`Warren, Maria, Daniel, and Julia
`
`“Steve Burnett
`
`To Danielle, thanks for understanding While I worked on
`this back
`
`To Alexis and Elizabeth, a father could not ask for better
`children
`
`w—Stephen Paine
`
`497
`
`497
`
`

`

`Contents
`
`Credits
`Foreword
`Acknowiedgmenrs
`Preface
`About the Authors
`
`Chapter 1 Why Cryptography?
`
`Security Provided by Computer Operating Systems
`How Operaiing Systems Work
`Default 05 Security: Permissions
`Attacks on Passwords
`Attacks That Bypass Operating Systems
`Data Recovery Atrack
`Memory Reconstruction Attack
`Adored Protection Through Cryptography
`The Roie of Cryptography in Data Security
`
`Chapter 2
`
`Symmetric—Key Cryptography
`
`Some Crypto Jargon
`What is a Key?
`Why is a Key Necessary?
`Generating a Key
`A Random Number Generator
`A Pseudo-Random Number Generator
`Attacks on Encrypted Data
`Attacking the Key
`Breaking the Ngorithm
`
`Measuring the Time it Takes to Break Your Message
`Symmetric Aigorithms: The Key Ta Die
`Symmetric Algorithms: Biock Versus Stream Ciphers
`Biock Ciphers
`Stream Ciphers
`Biocic Versus Stream: Which is Berrer?
`Digitai Encryption Standard
`Triple DES
`Commercial DES Repiacements
`Advanced Encwprion Standard
`
`498
`
`L
`
`:1.
`
`
`
`xiii
`xv
`xvii
`xix
`xxii
`
`2
`2
`3
`4
`6
`6
`9
`i
`i
`12
`
`i5
`
`is
`20
`22
`22
`2?
`28
`30
`30
`36
`
`37
`37
`38
`38
`4i
`4S
`46
`47
`49
`50
`
`498
`
`

`

`VI
`
`Contents
`
`Summary
`{Zeal-World Exampie: Grade Databases
`
`Chapter 3
`
`Symmetric—Key Management
`
`The Key Distribution Problem and Pubiic—Key Cryptography 81
`
`Password—Based Encryption
`Programming Convenience
`Braking PBE
`Sowing Dawn an Attack or: a Password
`Good Passwords
`Password Generamrs
`Hardware-Based Key Storage
`Tokens
`Crypro Accelerators
`Hardware Devices and Random Numbers
`Biemetrics
`Summary
`ReaLWoer Examples
`Keen Desktap
`Other Products
`
`Chapter 4
`
`Sharing Keys in Advance
`rrobrems mm This Scheme
`
`51
`5!
`
`53
`
`54
`59
`(:3
`(:4
`65
`67
`69
`69
`33
`75
`7’5
`76
`76
`77
`79
`
`83
`84
`
`Using a Trusted Third Party
`Problems Wrth This Scheme
`
`Public~i<ey Cryptography and the Digiraf Envelope
`Security issues
`Breaking a PublieKey Algarithm
`Some History of Puma—Key Crypzography
`How Public—Key Cryptography Works
`The RSA Ngerithm
`The DH Algorithm
`The ECDH Algorithm
`Comparing the Ngorithms
`Securfty
`Key Sizes
`Performance
`Transmission Size
`interoperabifiry
`
`3
`
`85
`86
`
`88
`9 2
`92
`93
`94
`98
`£05
`3
`i
`1
`l 17
`1 17
`2 :9
`I 20
`222
`i 22
`
`499
`
`499
`
`

`

`
`
`
`
`
`
`Contents V"
`
`Protecting Private Keys
`Using the Digital Envelope for Key Recovery
`Key Recovery via a Trusted Third Party
`Key Recovery via a Group of Trustees
`Key Recovery via Threshoid Schemes
`How 2: Threshold Scheme Works
`Summary
`Real-Worm Example
`
`Chapter 5
`
`The Digital Signature
`
`The Uniqueness of a Digital Signature
`Message Digests
`Collisions
`The Three important Digest Algorithms
`A Representative of Larger Data
`Data integrity
`Back to Digital Signatures
`Trying to Cheat
`
`impiementing Authentication, Data integrity, and Nonrepudiation
`Undersranding the Aigorirhms
`RSA
`BSA
`ECDSA
`Comparing the Algorithms
`Security
`Performance
`Transmission Size
`interoperability
`Protecting Private Keys
`introduction to Certificates
`Key Recovery
`Summary
`Reai~Worio Example
`
`Chapter 5
`
`Pubiic—Key infrastructures and the X509 Standard
`
`PubiiC-Key Certificates
`Unique identifiers
`Standard Version 3 Certificate Extensions
`Entity Names
`
`iZZ
`i23
`i24
`i26
`227
`130
`l32
`i33
`
`i3?
`
`138
`i4!
`i 45
`748
`i 49
`153
`i 54
`iSé
`
`159
`l 5‘?
`léo
`lei
`i63
`i 63
`i63
`i (:4
`265
`l 65
`iéé
`166
`i6“)
`1:39
`i70
`
`1 7 i
`
`2 72
`l74
`£75
`l 77
`
`500
`
`500
`
`

`

`‘
`Contents
`V] H
`WW
`
`ASNJ Notation and Encoding
`The Components of a PK!
`Certification Authority
`Registration Authority
`Certificate Directory
`Key Recovery Server
`Management Protocois
`Operational Protocois
`Registering and issuing Certificates
`Revoking a Certificate
`Certificate Revocation Lists
`Suspendéng a Certificate
`Authority Revocation Lists
`Trust Modeis
`Certificate Hierarchies
`Crossfiertification
`X509 Certificate Chain
`The Push Model Versus the Full Mode!
`Managing Key Pairs
`Generating Key Pairs
`Protecting Private Keys
`Managing Muitipie Key Pairs
`Updating Key Pairs
`Keeping a History of Key Pairs
`Depioying 3 PK!
`The Future of PK!
`Roaming Certificates
`Attribute Certificates
`Certificate Policies and Certification Practice Statements
`Summary
`Reai~Worid Exampies
`Keon Certificate Server
`Kean Web PassPort
`
`Network and Transport Security Protocois
`Chapter 2?
`internal: Protocol Security
`i? Security Nchétecture
`WEEK Services
`The Authentication Header Protocol
`Integrity Check Vaiue Caicutation
`
`179
`379
`#80
`3 80
`i8!
`1 82
`{82
`184
`i84
`183
`186
`190
`190
`19!
`F92
`i 93
`194
`:95
`P96 ‘
`i9?
`197
`198
`I99
`200
`20!
`202
`201
`203
`204
`206
`206
`207
`207
`
`209
`209
`2 30
`2! i
`2 i
`i
`212
`
`501
`
`501
`
`

`

`1XW
`
`Contents
`
`2 i 3
`2 l S
`2 i e
`2] 7
`2 l 8
`2 i 9
`220
`222
`222
`223
`224
`227
`22 7
`228
`230
`231
`232
`233
`234
`235
`236
`236
`237
`237
`23?
`238
`238
`239
`239
`2‘40
`Z40
`240
`24!
`242
`
`,i'
`
`:
`a
`
`
`
`
`
`Transport and Tunnel Modes
`The Encapsulating Security Payload Protocol
`Encryption Algorithms
`ESP in Transport and Tunnel Modes
`Security Associations
`Combining Security Associations
`Security Databases
`Security Policy Database
`Security Association Database
`Key Management
`internet Key Exchange
`Secure Sockets Layer
`The History of SSL
`Session and Connection States
`The Record Layer Protocol
`The Change Cipher Spec Protocol
`The Alert Protocol
`The Handshake Protocol
`The Client Hello Message
`The Server Hello Message
`The Server Certificate Message
`The Server Key Exchange Message
`The Certificate Request Message
`The Sewer Hello Done Message
`The Client Certificate Message
`The Client Key Exchange Message
`The Certificate Verify Message
`The Finished Message
`Ending a Session and Connection
`Resuming Sessions
`Cryptographic Computations
`Encryption and Authentication Algorithms
`Summary
`Real—World Examples
`
`Chapter 8
`
`Application-Layer Security Protocols
`
`SfMlME
`Overview
`S/MIME Functionality
`Cryptographic: Algorithms
`
`243
`
`243
`244
`245
`245
`
`502
`
`502
`
`

`

`Contents
`
`S/MlME Messages
`Enhanced Security Services
`interoperability
`Secure Electronic Transaction {SET}
`Business Requirements
`SET Features
`
`SET Participants
`Dual Signatures
`SET Certificates
`
`Payment Processing
`Summary
`Real-World Examples
`
`247
`252
`253
`253
`254
`255
`
`256
`257
`258
`
`260
`2&4
`265
`
`Chapter 9
`
`Hardware Solutions: Overcoming Software Limitations
`
`267
`
`Cryptographic Accelerators
`Authentication Tokens
`Token Form Factors
`Noncontact Tokens
`Contact Tokens
`Smart Cards
`Smart Card Standards
`
`Types of Smart Cards
`Readers and Terminals
`JavaCards
`
`History and Standards
`JavaCard Operations
`Other Java Tokens
`Biometrics
`Biometric Systems Ovewiew
`Recognition Methods
`Biometric Accuracy
`Combining Authentication Methods
`Summary
`Vendors
`
`Chapter 10 Digital Signatures: Beyond Security
`
`Legislative Approaches
`Legal Guidelines from the American Bar Association
`iogal Concepts Related to Digital Signatures
`
`2637
`269
`270
`2 70
`27S
`275
`276
`
`276
`278
`279
`
`279
`280
`2.8 l
`282
`282
`285
`288
`289
`291
`29l
`
`293
`
`295
`295
`2%
`
`503
`
`503
`
`

`

`
`
`Contents XIWW
`
`2%
`298
`29‘}
`299
`300
`300
`300
`302
`3GB
`306
`307
`307
`
`309
`
`30‘?
`3 i 0
`31 i
`Bi 1
`3 i 2
`3 i 3
`314
`3 14
`315
`315
`3 i 5
`3 if:
`316
`3 i 7
`31 I?
`3 i 7
`3 28
`3 i 9
`320
`32?
`322
`
`323
`
`324
`324
`
`Nontepudiation
`Authenticatien
`Written Versus Digitai Signatures
`Requirements fer the Use of Digital Signatures
`Fubiic Key infrastructures
`Centre! of Key Revacatfon
`”time-Stamping
`Current and Pending Legisiatiori
`The E—SIGN Act
`Dealing with Legai Uncertainties
`Summary
`Reai~Worid Examples
`
`Chapter I 1 Doing it Wrong: The Break—ins
`
`Measuring Losses
`Types of Security Threats
`Unauthorized Sisciosure of Data
`Unauthorized Modification of Data
`Unauthurized Access
`Disciasure of Network Traffic
`Spoofing of Network Traffic
`identifying intruders
`insiders
`Hackers
`Terrorists
`Foreign inteiiigence Services
`Hactivists
`intruder meiedge
`Case Studies
`Data in Transit
`Data at Rest
`Authenticatien
`impiementation
`Information Security: Law Enforcement
`Summary
`
`Chapter 12 Doing it Right: Following Standards
`
`Security Services and Mechanisms
`Authentication
`
`504
`
`504
`
`

`

`XII
`
`Contents
`
`Confidentiality
`Integrity
`Nonrepudiation
`
`Standards, Guidelines, and Regulations
`The Internet Engineering Task Force
`ANSI X9
`
`National Institute of Standards and Technology
`Ccmmon Criteria
`
`The Health Insurance Portability Act
`Developer Assistance
`Insurance
`
`Security Research
`Case Studies
`
`Implementation
`Authentication
`Data at Rest
`Data in Transit
`
`Summary
`
`Appendix A Bits, Bytes, Hex, and ASCII
`
`Appendix B A Layman's Guide to a Subset ofASN. I, BER, and DER
`
`Appendix C Further Technical Details
`
`Index
`
`326
`326
`327‘
`327
`327
`328
`328
`330
`330
`33V
`332
`332
`333
`333
`334
`335
`336
`336
`
`339
`
`347
`
`387
`
`407
`
`505
`
`505
`
`

`

`#33:
`m
`”,
`silks“
`a ailmgé
`
`3
`
`lQHUGAfi:
`
`UN‘WERSUTY QF »
`
`UUUU
`UU UUUUU -
`UU
`UU '
`
`
`
`5
`33
`_
`3 50, 2; 17.
`SE“;
`33
`.56 ”:1? {ng- g3 5%;
`ylfiifiifi’é‘ggfiififi 42%?lm this annual (collectively referred to as the “Product ) ere the piopemy ofRSA
`Secoiity Inc (“RS A Security”) and are protected by both United States copyright law andontemational copyright
`,
`~
`I,
`‘
`3 3.
`h' 3 P eglufii'a. 3,31% lilmia figgfigmgpgohgg yogyay copy it into a computer to be
`neat}; promsion.You must me
`fix;
`3
`If
`,3,
`g:
`ééfifl} k“
`f
`
`used and you mas; make archi
`éofiiéé dfitlieafiiodmis fin’iheeole purpose
`. ac mg up our so tware and pro-
`ieotin
`our investment from loss.
`3
`gyggivin" “just like a book » RSA Security means, for example, that the Product may be used by any number
`14 i u
`b
`v
`1
`of people and may be freely moved firom one computer location to another, so long as there is no possibility of the
`Product (or any part Of the Product) being used at one location or on one computer While it IS being used at an-
`other. Just as a book cannot be read by two different people in two different plaoes at the same time, Rather Can
`the Product be used by two difi'erent people in two different places at the same time (unless, of course, RSA Seen-
`z‘ity’s rights are being violated).
`.
`RSA Security reserves the right to alter or modify the contents of the Product; at any time.
`This agreement; is effective until terminated. The Agreement will terminate automatically Without notice ifyou
`fall to comply with any provisions of this Agreement. In the event of termination by reason of your breach, you
`will destroy or erase all copies of the Product installed on any computer 83’5th 01' made f0? backup purposes and
`shall expunge the Product from your data storage facilities.
`
`LIMITED WARRANTY
`
`RSA Security warrants the (ID-ROME) enclosed herein to be free of defects in materials and workmanship for a
`period of sixty days from the purchase date. If RSA Security receives written notification Within the warranty pe-
`riod of defects in materials or workmanship, and such notification is determined by RSA Security to be correct,
`RSA Security will replace the defective diskettels). Send request to:
`
`BSA Press
`
`RSA Security Inc.
`2955 Campus Dri¥e
`Suite 400
`
`San Mateo, CA 94403
`
`The entire and exclusive liability and remedy for breach of this Limited Warranty shall be limiteel to replacement
`of defective (ID—ROMS) and shall not inclncie or extend any claim for or right to cover any other damages, including
`but not limited to, loss of profit, data, or use of the software, or special, incidental, or consequenfiial damages or
`other similar claims, even if RSA Security or The McGraw-Hill Companies, Inc. (“McGraw—Hill”) has been specifi
`ically advised as to the possibility of such damages. In no event will RSA Seemity’s or McGraw-Hill’s liability for
`any damages to you or any other person ever exceed the lower of suggested list: price or actual price paid for the
`license to use the Procluct, regardless of any form of the claim.
`RSA SECURITY INC. AND THE McGRAW-HILL COMPANIES, INC. SPECIFICALLY DISCLAIMS ALL
`GTflER WARRANTIES, EXPRESS OR IMPLIED, INCLUDING BUT NOT IJIVIITED TO, ANY IMPLIED
`WARRANTY OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Specifically, 391‘
`that BSA Security 11013‘MCGTaW*Hlll makes any representation or warranty that the Product is fit for any panic.
`
`rant?! covering fl“? physical CD'ROMESU only (and not the software or information) and is otherwise expresslv and
`spemfically éisclaimed,
`'
`Tim lelmd Warranty gives you3813931? legal rights; you may have others which may vary from state to state
`some states do not allow the exclusion of mmdental or consequential damages, or the fimitafian on how 103g an
`impliecl warranty lasts, so some of the above may not apply to you.
`
`choice of law principles. If any provision of this Agreement 1‘
`,
`,
`_
`3
`s held to be contra ‘ to 1
`.~ ‘
`'
`forced to the maxmum extent perm1ss1ble and the remaining provisions will $131113; l”::::par::ll:l§:cffl b
`
`*3
`
`9 en-
`
`3
`
`506
`
`506
`
`

`

`
`
`
`
`507
`
`507
`
`

`

`
`
`RSA PRf—Jisgj
`
`
`
`
`
`
`Understand X509 certificates r,
`
`311613331:er structures " '
`"
`
`Distinguish different types of
`symmetric-key encryption
`aigerithms and know when»:
`each is best used
`
`,
`
`Find out how password~based '
`encryption works
`
`'
`
`Get details on current PK!
`standards and technoleg'ya
`inciuding vendor information
`
`_ V'Get an ayerationai overviewm‘
`wideiy—used pratocois—
`
`ineiudiag iPSec, SSL and SE:
`
`View cryptography from difleyaa
`
`WWWatporafisng
`deveiopers, andusers
`
`' smiley use digitaisignshhis
`
`emf hardware soiuflenHmfl
`
`cards, tekens, key storaye
`devices, and mare
`
`“
`
`Communicate safety over
`unsecure channeis using
`public-key technoiogy
`
`Use public-key technology for
`authentication and
`non-repudiation
`
`Recognize how corporations use
`cryptography to improve security
`through teak—world case studies
`
`1.2»?
`
`
`
`~m..._.r.mvm»i:_Hyuh‘vuw‘
`
`
`
`
`
`STEVE QUHNETThas degrees iii math from‘erinheii Ceiiege in Ema 332d iii
`
`Sshool in California. He has spent most of hie career com/shiny math 2mm:
`at intergraph Corpmai on and now With BSA Seouhty A freoeerit weaker at 3113:5333
`
`and coiiege Campuses, Steve is the lead engineer for FtSA’e BSAFE Cryyio‘
`
`pmducis, which are generai purpose cryategieohy software dovetopmem i;
`7
`
`STEPHEN mm: has worked in the secuhiy field throughwi mes: of his shes:
`‘
`
`United States Marine Come and for SUN Micmeysieme tiei3 Ciiiffiiiii 23 hyste,
`Security. where he expiains security concepts to cotooretiofis 2m {iteveieheis we
`
`provides training to customers and RSA empieyees
`
`
`i
`
`mantel)” Knawiefige is Secufih
`
`
`
`
`
`
`
`
`
`
`Crypiography is one of the smartest
`
`ways to protect the information on your
`
`network and reduce the risk of security
`
`breaches and attatks from hackers.
`And because impiemehtihg cryptography ,
`is a oompiexprocess, you need the >
`practiced advice and proven techniques
`contained inside this ofticiai guide.
`
`
`
`Written by insiders at RSA Security,
`
`this expertresource expiains the
`
`V'iiereh’oefsibetwieen symmetries—key and
`
`
`uhiie-skeycryptography, how PKi and
`
`
`"X509 affect security, how the RSA
`
`rarigiorithm works within protocois, and
`
`83333315113:th Yoii’ii aiso read
`f i
`' case studies detailing
`
`
`itiitiergnt types of security
`
`yuitggrabiiities and what
`
`types of cryptography appiications
`, 3393}ngpfgyefit afiacks‘
`
`"
`‘ ‘
`’
`
`
`
`
`
`,
`
`'_
`
`‘
`
`‘
`
`.
`.
`>
`
`
`
`'
`‘
`‘
`“
`'_
`i
`' QM? AVAiLhBLE FROM BSA SECURiTY
`‘ 33" magmas somii‘e‘e FAQ 4“
`Pubiic‘Key Cryptography Standards
`‘ giwme Bytes Technioai Newsletters
`
`,
`
`
`
`E3
`‘
`i
`“fl ihétwoakihe/seouami
`he.” mi
`SBDRNE
`ISBN {3Ho?I233333i~3
`
`MO

`iiIi ii
`553151351}REAWIJHferriteisfermafianfige
`i?iIi
`i i
`i
`1;
`’_
`J
`-
`v 3325403603 5
`i ii
`i"
`.iiiiqqhshr‘ii.2 ’
`~
`if} g;
`3:39.39 353 2‘
`'
`*
`i ‘i
`3:33221333333
`'
`
`
`,
`
`-
`
`.
`
`_ 59‘3me fie
`
`is
`
`i
`
`I’
`
`QQGSQ
`i
`
`‘
`
`508
`
`

`

`APPENDIX D
`
`APPENDIX D
`
`509
`
`509
`
`

`

`QWorldCati
`
`SeQFCh.W9T'qQ?F ,
`
`
`isegrshj‘
`Advanced Search Find a Library
`
`<< Return to Search Results
`
`Cite/Extgrt
`
`Print
`
`E—mail
`
`Share
`
`Permalink
`
`Add to list
`
`Add tags
`
`Write a review
`
`Rate this item:
`
`1
`
`2
`
`3
`
`4
`
`5
`
`RSA security's official guide to cryptography
`
`:r
`
`:
`
`:
`
`Author:
`
`Steve Burnett; Stephen Paine
`
`”T ”7' "’7 f“ "7 ""7”“ 7‘
`3 Mpymmrx
`”—17"; “a f—QJW. ,, rim“
`AbeBooks
`$1.72 ‘
`,
`~
`‘ a»
`.
`,y @122”.
`$71.21 .-
`:TjiZTfjff1: 7;?
`Barnes & Noble
`$49.98 f
`
`77-
`
`,
`
`'
`t
`'
`2
`,
`"
`,
`'
`,
`Publisher:
`New York : Osborne/McGraw—Hill, cop. 2001.
`cmmnflflnpm Edition/Format: ' Print book : English View all editions and formats
`Summary:
`Helps in implementing cryptography, the most
`secure form of data encryption. This work, with
`case studies, is written in conjunction with "RSA
`Security". It is a part of the "RSA Press Series“.
`
`I 1.5»,
`
`Rating:
`SUbJ'eC'iS
`
`0 with reviews - Be the first.
`(not yet rated)
`Computer networks -- Security measures.
`A
`Data encryption (Computer science)
`erpLogtallhy.
`View all subjects
`
`‘
`
`More like this
`
`Similar Items
`
`$4.98
`. Better World Books
`' if ,
`f 1 »
`“7..
`' FEW-3:”. * ,_
`339E)?
`
`
`
`{:3 Finding libraries that hold this item...
`
`7
`Enter your location: District of Columbia
`Submit a complete postal address for best results.
`
`‘Find libraries j
`
`Displaying libraries 1—6 out of 575 for all 19 editions (Washington, DC, USA)
`*3 First {Prev 1 23%}: List.»
`
`Show libraries holding just this edition
`
`Library
`1.
`
`2_
`
`3.
`
`4.
`
`5.
`
`55
`f c n
`Lib
`__@IV§_QI_O_QL9._
`ashlngton, DC 20540 United States
`
`_
`
`Arlington Public Library
`Library Administration
`Arlington, VA 22201 United States
`
`University of Maryland Libraries
`.
`.
`UMD Libraries
`.
`College Park, MD 20742 United States
`
`University of Maryland University College
`ry
`UMUC Libra
`Adelphi, MD 20783 United States
`
`George Mason University
`Fenwick Library
`Fairfax, VA 22030 United States
`
`Held formats
`
`I Book
`
`'§9_ok
`
`I—BOOk
`
`m
`
`iEQ—‘PL
`
`Distance
`-
`ZMmAQ?:
`
`4 miles
`MAP IT
`
`7
`
`'l
`ml es
`MAP IT
`
`10 miles
`MAP IT
`
`15 miles
`MAP lT
`
`——L“’raW‘—“i9
`Ask a librarian
`Add“) favorites
`
`Library319
`Ask a librarian
`W
`
`:‘brarym
`earch at this library
`Ask a librarian
`Add to favorites
`
`Librarym
`—-—————.
`Ask a librarian
`W
`
`Lbflflig
`Add to favorites
`
`1/3
`
`5 10
`https://www.worldcat.org/title/rsa-securitys—official-guide-to—cryptography/oclc/782997409?referer=br&ht=edition
`
`
`
`510
`
`

`

`
`
`4/7/2019
`
`RSA security's official guide to cryptography (Book, 2001) [VVorldCat.org]
`
`s.
`
`Bowie State University
`Thurgood Marshall Library
`Bowie, MD 20715 United States
`
`,
`
`lm
`
`_
`15A???
`
`_
`_
`flgfims
`
`<€First<Prev12§fl§xj> Last»
`
`.1 Details
`
`Genre/Form:
`
`Handboeken (vorm)
`
`Material Type:
`
`Internet resource
`
`Document Type:
`
`Book, Internet Resource
`
`All Authors/
`Contributors:
`
`Steve Burnett; S_tephen Paine
`
`.
`_
`,,,,,,,,,,,,,,,
`Find more information about: Steve Burnett 7 £93
`
`ISBN:
`
`007213139X 9780072131390 0072131381 9780072131383 0072131373 9780072131376
`
`OCLC Number:
`
`782997409
`
`Notes:
`
`Includes index.
`
`Description:
`
`xxi, 419 p. : ill.
`
`; 24 cm + CD—ROM v.d.t.: RSA security's complete cryptography
`
`Contents:
`
`Chapter 1: Why Cryptography? Chapter 2: Symmetric-Key Cryptography. Chapter 3: Symmetric-Key
`Management. Chapter 4: The Key Distribution Problem and Public-Key Cryptography. Chapter 5: The
`Digital Signature. Chapter 6: Public-Key Infrastructures and the X509 Standard. Chapter 7: Network and
`Transport Security Protocols. Chapter 8: Application-Layer Security Protocols. Chapter 9: Hardware
`Solutions: Overcoming Software Limitations. Chapter 10: Digital Signatures: Beyond Security. Chapter 11:
`Doing It Wrong: The Break-Ins. Chapter 12: Doing It Right: Following Standards. Appendix A: Bits, Bytes,
`Hex, and ASCII. Appendix B: A Layman's Guide to a Subset of ASN.1, BER, and DER. Appendix C: Further
`Technical Details.
`
`Other Titles:
`
`Cryptography
`RSA security's complete cryptography
`
`Responsibility:
`
`Steve Burnett and Stephen Paine.
`
`More information:
`
`catdir.loc.gg
`
`catdirJocgg
`
`catdir.|oc.ggy
`
`:. Reviews
`
`
`User-contributed reviews_
`
`Add a review and share your thoughts with other readers.
`
`; Tags
`
`Add tags for "RSA security's official guide to cryptography".
`
`2. Similar Items
`
`Related Subjects: (6)
`
`511
`
`

`

`W 4
`
`RSA security's official guide to cryptography (Book, 2001) MorldCat.org]
`
`/7/2019
`
`Computer networks -- Security measures.
`
`Data encryption (Computer science)
`
`C_ryp_t29@p_hy;
`
`C_FY.Pt_09rafie.
`
`gmputerbeveiligmg:
`
`TCPIIP.
`
`: Linked Data
`
`httos://www_wor|dcafnm/tifle/rsa-semiritvs—nffinial—m Iide—fn—nrvnfnn r2nhvlnnlnl7899974099mf9mr=hr8 hf=editinn
`
`3/2
`
`512
`
`
`
`
`
`512
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket