`
`APPENDIX C
`
`Apple 1122 (Part 4 of 5)
`Apple v. USR
`|PR201 8-00813
`
`493
`
`493
`
`Apple 1122 (Part 4 of 5)
`Apple v. USR
`IPR2018-00813
`
`
`
`
` ° nvrroannnl
`
`
`
`Learn how secure data—encryption
`techniques work
`
`Protect confidential information
`on your network
`
`Get efficiai current cryptography
`grandaros on enclosed CD-ROM
`
`
`
`494
`
`
`
`
`
`OsbornaMcGraW-Ifill
`New York Chicago San Francisco
`Lisban Lamina Madrid Mexico City
`Milan New Deihi San Juan
`Seoul Singapore Sydney Tenants
`
`495
`
`495
`
`
`
`
`
`OsborneMcGraW-Hill
`
`2600 Tenth Street
`
`Berkeley, California 94710
`USA.
`
`To arrange bulk purchase discounts for sales promotions, premiums, or fund-
`raisers, please contact OshomefMeGraw-Hill at the above address. For
`information on translations or book distributors outside the U.S.A., please see
`the International Contact Information page immediately following the inéex of
`this book.
`
`BSA Security’s Official Guide to Cryptography
`
`Copyright © 2001 by The McGraw—Ifill Companies. All rights reserved, Printed
`in the United States ofAmez'ica. Except as permitted under the Copyright Act of
`1976, no part of this publication may be reproduced or distributed in any form or
`by any means, or stored in a database or retrieval system, without the prior
`written permission of the publisher, with the exception that the program listings
`may be entered, stereo, and executed in a computer system, but they may not be
`reproduced for publication.
`
`234567890 FGR FGR 01987654321
`
`Book pin 0437-2131384 and CD p/n 0-07-213137~3
`parts of
`ISBN 0477-2131394:
`
`Publisher
`Brandon Al Nordin
`Vice President &
`
`Associate Publisher
`Scott Rogers
`Executive Editor
`Steven Elliot
`Senior Project Editor
`LeeAnn Pickrell
`Acquisitions Coordinator
`Alexander Corona
`
`Technical Editors
`Blake Doumaee
`“1353i” Nelson
`
`Copy Editor
`Betsy Hardinger
`Composition and Indexer
`MacAllister Publishing Services, LLC
`Illustrators
`Michael Mueller
`Beth Yoong
`Lyssa Szeben-Wald
`
`Information has been obtained by Osborne/McGraw-Hili (ion; sources believed to be reli»
`able. However: heeause of the possibility of human or mechanical error by our sources,
`ClsbomechGraw-Hill, or others, OsbomeMcGraw—Hill does not guarantee the accuracy,
`adequacy, or completeness of” any information and is not responsible for any errors or omis—
`sions or the results obtained from use of such information.
`
`496
`
`496
`
`
`
`To Fae-Chi, Gwen, Ray, Satomi, Michelle, Alexander,
`Warren, Maria, Daniel, and Julia
`
`“Steve Burnett
`
`To Danielle, thanks for understanding While I worked on
`this back
`
`To Alexis and Elizabeth, a father could not ask for better
`children
`
`w—Stephen Paine
`
`497
`
`497
`
`
`
`Contents
`
`Credits
`Foreword
`Acknowiedgmenrs
`Preface
`About the Authors
`
`Chapter 1 Why Cryptography?
`
`Security Provided by Computer Operating Systems
`How Operaiing Systems Work
`Default 05 Security: Permissions
`Attacks on Passwords
`Attacks That Bypass Operating Systems
`Data Recovery Atrack
`Memory Reconstruction Attack
`Adored Protection Through Cryptography
`The Roie of Cryptography in Data Security
`
`Chapter 2
`
`Symmetric—Key Cryptography
`
`Some Crypto Jargon
`What is a Key?
`Why is a Key Necessary?
`Generating a Key
`A Random Number Generator
`A Pseudo-Random Number Generator
`Attacks on Encrypted Data
`Attacking the Key
`Breaking the Ngorithm
`
`Measuring the Time it Takes to Break Your Message
`Symmetric Aigorithms: The Key Ta Die
`Symmetric Algorithms: Biock Versus Stream Ciphers
`Biock Ciphers
`Stream Ciphers
`Biocic Versus Stream: Which is Berrer?
`Digitai Encryption Standard
`Triple DES
`Commercial DES Repiacements
`Advanced Encwprion Standard
`
`498
`
`L
`
`:1.
`
`
`
`xiii
`xv
`xvii
`xix
`xxii
`
`2
`2
`3
`4
`6
`6
`9
`i
`i
`12
`
`i5
`
`is
`20
`22
`22
`2?
`28
`30
`30
`36
`
`37
`37
`38
`38
`4i
`4S
`46
`47
`49
`50
`
`498
`
`
`
`VI
`
`Contents
`
`Summary
`{Zeal-World Exampie: Grade Databases
`
`Chapter 3
`
`Symmetric—Key Management
`
`The Key Distribution Problem and Pubiic—Key Cryptography 81
`
`Password—Based Encryption
`Programming Convenience
`Braking PBE
`Sowing Dawn an Attack or: a Password
`Good Passwords
`Password Generamrs
`Hardware-Based Key Storage
`Tokens
`Crypro Accelerators
`Hardware Devices and Random Numbers
`Biemetrics
`Summary
`ReaLWoer Examples
`Keen Desktap
`Other Products
`
`Chapter 4
`
`Sharing Keys in Advance
`rrobrems mm This Scheme
`
`51
`5!
`
`53
`
`54
`59
`(:3
`(:4
`65
`67
`69
`69
`33
`75
`7’5
`76
`76
`77
`79
`
`83
`84
`
`Using a Trusted Third Party
`Problems Wrth This Scheme
`
`Public~i<ey Cryptography and the Digiraf Envelope
`Security issues
`Breaking a PublieKey Algarithm
`Some History of Puma—Key Crypzography
`How Public—Key Cryptography Works
`The RSA Ngerithm
`The DH Algorithm
`The ECDH Algorithm
`Comparing the Ngorithms
`Securfty
`Key Sizes
`Performance
`Transmission Size
`interoperabifiry
`
`3
`
`85
`86
`
`88
`9 2
`92
`93
`94
`98
`£05
`3
`i
`1
`l 17
`1 17
`2 :9
`I 20
`222
`i 22
`
`499
`
`499
`
`
`
`
`
`
`
`
`
`Contents V"
`
`Protecting Private Keys
`Using the Digital Envelope for Key Recovery
`Key Recovery via a Trusted Third Party
`Key Recovery via a Group of Trustees
`Key Recovery via Threshoid Schemes
`How 2: Threshold Scheme Works
`Summary
`Real-Worm Example
`
`Chapter 5
`
`The Digital Signature
`
`The Uniqueness of a Digital Signature
`Message Digests
`Collisions
`The Three important Digest Algorithms
`A Representative of Larger Data
`Data integrity
`Back to Digital Signatures
`Trying to Cheat
`
`impiementing Authentication, Data integrity, and Nonrepudiation
`Undersranding the Aigorirhms
`RSA
`BSA
`ECDSA
`Comparing the Algorithms
`Security
`Performance
`Transmission Size
`interoperability
`Protecting Private Keys
`introduction to Certificates
`Key Recovery
`Summary
`Reai~Worio Example
`
`Chapter 5
`
`Pubiic—Key infrastructures and the X509 Standard
`
`PubiiC-Key Certificates
`Unique identifiers
`Standard Version 3 Certificate Extensions
`Entity Names
`
`iZZ
`i23
`i24
`i26
`227
`130
`l32
`i33
`
`i3?
`
`138
`i4!
`i 45
`748
`i 49
`153
`i 54
`iSé
`
`159
`l 5‘?
`léo
`lei
`i63
`i 63
`i63
`i (:4
`265
`l 65
`iéé
`166
`i6“)
`1:39
`i70
`
`1 7 i
`
`2 72
`l74
`£75
`l 77
`
`500
`
`500
`
`
`
`‘
`Contents
`V] H
`WW
`
`ASNJ Notation and Encoding
`The Components of a PK!
`Certification Authority
`Registration Authority
`Certificate Directory
`Key Recovery Server
`Management Protocois
`Operational Protocois
`Registering and issuing Certificates
`Revoking a Certificate
`Certificate Revocation Lists
`Suspendéng a Certificate
`Authority Revocation Lists
`Trust Modeis
`Certificate Hierarchies
`Crossfiertification
`X509 Certificate Chain
`The Push Model Versus the Full Mode!
`Managing Key Pairs
`Generating Key Pairs
`Protecting Private Keys
`Managing Muitipie Key Pairs
`Updating Key Pairs
`Keeping a History of Key Pairs
`Depioying 3 PK!
`The Future of PK!
`Roaming Certificates
`Attribute Certificates
`Certificate Policies and Certification Practice Statements
`Summary
`Reai~Worid Exampies
`Keon Certificate Server
`Kean Web PassPort
`
`Network and Transport Security Protocois
`Chapter 2?
`internal: Protocol Security
`i? Security Nchétecture
`WEEK Services
`The Authentication Header Protocol
`Integrity Check Vaiue Caicutation
`
`179
`379
`#80
`3 80
`i8!
`1 82
`{82
`184
`i84
`183
`186
`190
`190
`19!
`F92
`i 93
`194
`:95
`P96 ‘
`i9?
`197
`198
`I99
`200
`20!
`202
`201
`203
`204
`206
`206
`207
`207
`
`209
`209
`2 30
`2! i
`2 i
`i
`212
`
`501
`
`501
`
`
`
`1XW
`
`Contents
`
`2 i 3
`2 l S
`2 i e
`2] 7
`2 l 8
`2 i 9
`220
`222
`222
`223
`224
`227
`22 7
`228
`230
`231
`232
`233
`234
`235
`236
`236
`237
`237
`23?
`238
`238
`239
`239
`2‘40
`Z40
`240
`24!
`242
`
`,i'
`
`:
`a
`
`
`
`
`
`Transport and Tunnel Modes
`The Encapsulating Security Payload Protocol
`Encryption Algorithms
`ESP in Transport and Tunnel Modes
`Security Associations
`Combining Security Associations
`Security Databases
`Security Policy Database
`Security Association Database
`Key Management
`internet Key Exchange
`Secure Sockets Layer
`The History of SSL
`Session and Connection States
`The Record Layer Protocol
`The Change Cipher Spec Protocol
`The Alert Protocol
`The Handshake Protocol
`The Client Hello Message
`The Server Hello Message
`The Server Certificate Message
`The Server Key Exchange Message
`The Certificate Request Message
`The Sewer Hello Done Message
`The Client Certificate Message
`The Client Key Exchange Message
`The Certificate Verify Message
`The Finished Message
`Ending a Session and Connection
`Resuming Sessions
`Cryptographic Computations
`Encryption and Authentication Algorithms
`Summary
`Real—World Examples
`
`Chapter 8
`
`Application-Layer Security Protocols
`
`SfMlME
`Overview
`S/MIME Functionality
`Cryptographic: Algorithms
`
`243
`
`243
`244
`245
`245
`
`502
`
`502
`
`
`
`Contents
`
`S/MlME Messages
`Enhanced Security Services
`interoperability
`Secure Electronic Transaction {SET}
`Business Requirements
`SET Features
`
`SET Participants
`Dual Signatures
`SET Certificates
`
`Payment Processing
`Summary
`Real-World Examples
`
`247
`252
`253
`253
`254
`255
`
`256
`257
`258
`
`260
`2&4
`265
`
`Chapter 9
`
`Hardware Solutions: Overcoming Software Limitations
`
`267
`
`Cryptographic Accelerators
`Authentication Tokens
`Token Form Factors
`Noncontact Tokens
`Contact Tokens
`Smart Cards
`Smart Card Standards
`
`Types of Smart Cards
`Readers and Terminals
`JavaCards
`
`History and Standards
`JavaCard Operations
`Other Java Tokens
`Biometrics
`Biometric Systems Ovewiew
`Recognition Methods
`Biometric Accuracy
`Combining Authentication Methods
`Summary
`Vendors
`
`Chapter 10 Digital Signatures: Beyond Security
`
`Legislative Approaches
`Legal Guidelines from the American Bar Association
`iogal Concepts Related to Digital Signatures
`
`2637
`269
`270
`2 70
`27S
`275
`276
`
`276
`278
`279
`
`279
`280
`2.8 l
`282
`282
`285
`288
`289
`291
`29l
`
`293
`
`295
`295
`2%
`
`503
`
`503
`
`
`
`
`
`Contents XIWW
`
`2%
`298
`29‘}
`299
`300
`300
`300
`302
`3GB
`306
`307
`307
`
`309
`
`30‘?
`3 i 0
`31 i
`Bi 1
`3 i 2
`3 i 3
`314
`3 14
`315
`315
`3 i 5
`3 if:
`316
`3 i 7
`31 I?
`3 i 7
`3 28
`3 i 9
`320
`32?
`322
`
`323
`
`324
`324
`
`Nontepudiation
`Authenticatien
`Written Versus Digitai Signatures
`Requirements fer the Use of Digital Signatures
`Fubiic Key infrastructures
`Centre! of Key Revacatfon
`”time-Stamping
`Current and Pending Legisiatiori
`The E—SIGN Act
`Dealing with Legai Uncertainties
`Summary
`Reai~Worid Examples
`
`Chapter I 1 Doing it Wrong: The Break—ins
`
`Measuring Losses
`Types of Security Threats
`Unauthorized Sisciosure of Data
`Unauthorized Modification of Data
`Unauthurized Access
`Disciasure of Network Traffic
`Spoofing of Network Traffic
`identifying intruders
`insiders
`Hackers
`Terrorists
`Foreign inteiiigence Services
`Hactivists
`intruder meiedge
`Case Studies
`Data in Transit
`Data at Rest
`Authenticatien
`impiementation
`Information Security: Law Enforcement
`Summary
`
`Chapter 12 Doing it Right: Following Standards
`
`Security Services and Mechanisms
`Authentication
`
`504
`
`504
`
`
`
`XII
`
`Contents
`
`Confidentiality
`Integrity
`Nonrepudiation
`
`Standards, Guidelines, and Regulations
`The Internet Engineering Task Force
`ANSI X9
`
`National Institute of Standards and Technology
`Ccmmon Criteria
`
`The Health Insurance Portability Act
`Developer Assistance
`Insurance
`
`Security Research
`Case Studies
`
`Implementation
`Authentication
`Data at Rest
`Data in Transit
`
`Summary
`
`Appendix A Bits, Bytes, Hex, and ASCII
`
`Appendix B A Layman's Guide to a Subset ofASN. I, BER, and DER
`
`Appendix C Further Technical Details
`
`Index
`
`326
`326
`327‘
`327
`327
`328
`328
`330
`330
`33V
`332
`332
`333
`333
`334
`335
`336
`336
`
`339
`
`347
`
`387
`
`407
`
`505
`
`505
`
`
`
`#33:
`m
`”,
`silks“
`a ailmgé
`
`3
`
`lQHUGAfi:
`
`UN‘WERSUTY QF »
`
`UUUU
`UU UUUUU -
`UU
`UU '
`
`
`
`5
`33
`_
`3 50, 2; 17.
`SE“;
`33
`.56 ”:1? {ng- g3 5%;
`ylfiifiifi’é‘ggfiififi 42%?lm this annual (collectively referred to as the “Product ) ere the piopemy ofRSA
`Secoiity Inc (“RS A Security”) and are protected by both United States copyright law andontemational copyright
`,
`~
`I,
`‘
`3 3.
`h' 3 P eglufii'a. 3,31% lilmia figgfigmgpgohgg yogyay copy it into a computer to be
`neat}; promsion.You must me
`fix;
`3
`If
`,3,
`g:
`ééfifl} k“
`f
`
`used and you mas; make archi
`éofiiéé dfitlieafiiodmis fin’iheeole purpose
`. ac mg up our so tware and pro-
`ieotin
`our investment from loss.
`3
`gyggivin" “just like a book » RSA Security means, for example, that the Product may be used by any number
`14 i u
`b
`v
`1
`of people and may be freely moved firom one computer location to another, so long as there is no possibility of the
`Product (or any part Of the Product) being used at one location or on one computer While it IS being used at an-
`other. Just as a book cannot be read by two different people in two different plaoes at the same time, Rather Can
`the Product be used by two difi'erent people in two different places at the same time (unless, of course, RSA Seen-
`z‘ity’s rights are being violated).
`.
`RSA Security reserves the right to alter or modify the contents of the Product; at any time.
`This agreement; is effective until terminated. The Agreement will terminate automatically Without notice ifyou
`fall to comply with any provisions of this Agreement. In the event of termination by reason of your breach, you
`will destroy or erase all copies of the Product installed on any computer 83’5th 01' made f0? backup purposes and
`shall expunge the Product from your data storage facilities.
`
`LIMITED WARRANTY
`
`RSA Security warrants the (ID-ROME) enclosed herein to be free of defects in materials and workmanship for a
`period of sixty days from the purchase date. If RSA Security receives written notification Within the warranty pe-
`riod of defects in materials or workmanship, and such notification is determined by RSA Security to be correct,
`RSA Security will replace the defective diskettels). Send request to:
`
`BSA Press
`
`RSA Security Inc.
`2955 Campus Dri¥e
`Suite 400
`
`San Mateo, CA 94403
`
`The entire and exclusive liability and remedy for breach of this Limited Warranty shall be limiteel to replacement
`of defective (ID—ROMS) and shall not inclncie or extend any claim for or right to cover any other damages, including
`but not limited to, loss of profit, data, or use of the software, or special, incidental, or consequenfiial damages or
`other similar claims, even if RSA Security or The McGraw-Hill Companies, Inc. (“McGraw—Hill”) has been specifi
`ically advised as to the possibility of such damages. In no event will RSA Seemity’s or McGraw-Hill’s liability for
`any damages to you or any other person ever exceed the lower of suggested list: price or actual price paid for the
`license to use the Procluct, regardless of any form of the claim.
`RSA SECURITY INC. AND THE McGRAW-HILL COMPANIES, INC. SPECIFICALLY DISCLAIMS ALL
`GTflER WARRANTIES, EXPRESS OR IMPLIED, INCLUDING BUT NOT IJIVIITED TO, ANY IMPLIED
`WARRANTY OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Specifically, 391‘
`that BSA Security 11013‘MCGTaW*Hlll makes any representation or warranty that the Product is fit for any panic.
`
`rant?! covering fl“? physical CD'ROMESU only (and not the software or information) and is otherwise expresslv and
`spemfically éisclaimed,
`'
`Tim lelmd Warranty gives you3813931? legal rights; you may have others which may vary from state to state
`some states do not allow the exclusion of mmdental or consequential damages, or the fimitafian on how 103g an
`impliecl warranty lasts, so some of the above may not apply to you.
`
`choice of law principles. If any provision of this Agreement 1‘
`,
`,
`_
`3
`s held to be contra ‘ to 1
`.~ ‘
`'
`forced to the maxmum extent perm1ss1ble and the remaining provisions will $131113; l”::::par::ll:l§:cffl b
`
`*3
`
`9 en-
`
`3
`
`506
`
`506
`
`
`
`
`
`
`
`507
`
`507
`
`
`
`
`
`RSA PRf—Jisgj
`
`
`
`
`
`
`Understand X509 certificates r,
`
`311613331:er structures " '
`"
`
`Distinguish different types of
`symmetric-key encryption
`aigerithms and know when»:
`each is best used
`
`,
`
`Find out how password~based '
`encryption works
`
`'
`
`Get details on current PK!
`standards and technoleg'ya
`inciuding vendor information
`
`_ V'Get an ayerationai overviewm‘
`wideiy—used pratocois—
`
`ineiudiag iPSec, SSL and SE:
`
`View cryptography from difleyaa
`
`WWWatporafisng
`deveiopers, andusers
`
`' smiley use digitaisignshhis
`
`emf hardware soiuflenHmfl
`
`cards, tekens, key storaye
`devices, and mare
`
`“
`
`Communicate safety over
`unsecure channeis using
`public-key technoiogy
`
`Use public-key technology for
`authentication and
`non-repudiation
`
`Recognize how corporations use
`cryptography to improve security
`through teak—world case studies
`
`1.2»?
`
`
`
`~m..._.r.mvm»i:_Hyuh‘vuw‘
`
`
`
`
`
`STEVE QUHNETThas degrees iii math from‘erinheii Ceiiege in Ema 332d iii
`
`Sshool in California. He has spent most of hie career com/shiny math 2mm:
`at intergraph Corpmai on and now With BSA Seouhty A freoeerit weaker at 3113:5333
`
`and coiiege Campuses, Steve is the lead engineer for FtSA’e BSAFE Cryyio‘
`
`pmducis, which are generai purpose cryategieohy software dovetopmem i;
`7
`
`STEPHEN mm: has worked in the secuhiy field throughwi mes: of his shes:
`‘
`
`United States Marine Come and for SUN Micmeysieme tiei3 Ciiiffiiiii 23 hyste,
`Security. where he expiains security concepts to cotooretiofis 2m {iteveieheis we
`
`provides training to customers and RSA empieyees
`
`
`i
`
`mantel)” Knawiefige is Secufih
`
`
`
`
`
`
`
`
`
`
`Crypiography is one of the smartest
`
`ways to protect the information on your
`
`network and reduce the risk of security
`
`breaches and attatks from hackers.
`And because impiemehtihg cryptography ,
`is a oompiexprocess, you need the >
`practiced advice and proven techniques
`contained inside this ofticiai guide.
`
`
`
`Written by insiders at RSA Security,
`
`this expertresource expiains the
`
`V'iiereh’oefsibetwieen symmetries—key and
`
`
`uhiie-skeycryptography, how PKi and
`
`
`"X509 affect security, how the RSA
`
`rarigiorithm works within protocois, and
`
`83333315113:th Yoii’ii aiso read
`f i
`' case studies detailing
`
`
`itiitiergnt types of security
`
`yuitggrabiiities and what
`
`types of cryptography appiications
`, 3393}ngpfgyefit afiacks‘
`
`"
`‘ ‘
`’
`
`
`
`
`
`,
`
`'_
`
`‘
`
`‘
`
`.
`.
`>
`
`
`
`'
`‘
`‘
`“
`'_
`i
`' QM? AVAiLhBLE FROM BSA SECURiTY
`‘ 33" magmas somii‘e‘e FAQ 4“
`Pubiic‘Key Cryptography Standards
`‘ giwme Bytes Technioai Newsletters
`
`,
`
`
`
`E3
`‘
`i
`“fl ihétwoakihe/seouami
`he.” mi
`SBDRNE
`ISBN {3Ho?I233333i~3
`
`MO
`¥
`iiIi ii
`553151351}REAWIJHferriteisfermafianfige
`i?iIi
`i i
`i
`1;
`’_
`J
`-
`v 3325403603 5
`i ii
`i"
`.iiiiqqhshr‘ii.2 ’
`~
`if} g;
`3:39.39 353 2‘
`'
`*
`i ‘i
`3:33221333333
`'
`
`
`,
`
`-
`
`.
`
`_ 59‘3me fie
`
`is
`
`i
`
`I’
`
`QQGSQ
`i
`
`‘
`
`508
`
`
`
`APPENDIX D
`
`APPENDIX D
`
`509
`
`509
`
`
`
`QWorldCati
`
`SeQFCh.W9T'qQ?F ,
`
`
`isegrshj‘
`Advanced Search Find a Library
`
`<< Return to Search Results
`
`Cite/Extgrt
`
`
`E—mail
`
`Share
`
`Permalink
`
`Add to list
`
`Add tags
`
`Write a review
`
`Rate this item:
`
`1
`
`2
`
`3
`
`4
`
`5
`
`RSA security's official guide to cryptography
`
`:r
`
`:
`
`:
`
`Author:
`
`Steve Burnett; Stephen Paine
`
`”T ”7' "’7 f“ "7 ""7”“ 7‘
`3 Mpymmrx
`”—17"; “a f—QJW. ,, rim“
`AbeBooks
`$1.72 ‘
`,
`~
`‘ a»
`.
`,y @122”.
`$71.21 .-
`:TjiZTfjff1: 7;?
`Barnes & Noble
`$49.98 f
`
`77-
`
`,
`
`'
`t
`'
`2
`,
`"
`,
`'
`,
`Publisher:
`New York : Osborne/McGraw—Hill, cop. 2001.
`cmmnflflnpm Edition/Format: ' Print book : English View all editions and formats
`Summary:
`Helps in implementing cryptography, the most
`secure form of data encryption. This work, with
`case studies, is written in conjunction with "RSA
`Security". It is a part of the "RSA Press Series“.
`
`I 1.5»,
`
`Rating:
`SUbJ'eC'iS
`
`0 with reviews - Be the first.
`(not yet rated)
`Computer networks -- Security measures.
`A
`Data encryption (Computer science)
`erpLogtallhy.
`View all subjects
`
`‘
`
`More like this
`
`Similar Items
`
`$4.98
`. Better World Books
`' if ,
`f 1 »
`“7..
`' FEW-3:”. * ,_
`339E)?
`
`
`
`{:3 Finding libraries that hold this item...
`
`7
`Enter your location: District of Columbia
`Submit a complete postal address for best results.
`
`‘Find libraries j
`
`Displaying libraries 1—6 out of 575 for all 19 editions (Washington, DC, USA)
`*3 First {Prev 1 23%}: List.»
`
`Show libraries holding just this edition
`
`Library
`1.
`
`2_
`
`3.
`
`4.
`
`5.
`
`55
`f c n
`Lib
`__@IV§_QI_O_QL9._
`ashlngton, DC 20540 United States
`
`_
`
`Arlington Public Library
`Library Administration
`Arlington, VA 22201 United States
`
`University of Maryland Libraries
`.
`.
`UMD Libraries
`.
`College Park, MD 20742 United States
`
`University of Maryland University College
`ry
`UMUC Libra
`Adelphi, MD 20783 United States
`
`George Mason University
`Fenwick Library
`Fairfax, VA 22030 United States
`
`Held formats
`
`I Book
`
`'§9_ok
`
`I—BOOk
`
`m
`
`iEQ—‘PL
`
`Distance
`-
`ZMmAQ?:
`
`4 miles
`MAP IT
`
`7
`
`'l
`ml es
`MAP IT
`
`10 miles
`MAP IT
`
`15 miles
`MAP lT
`
`——L“’raW‘—“i9
`Ask a librarian
`Add“) favorites
`
`Library319
`Ask a librarian
`W
`
`:‘brarym
`earch at this library
`Ask a librarian
`Add to favorites
`
`Librarym
`—-—————.
`Ask a librarian
`W
`
`Lbflflig
`Add to favorites
`
`1/3
`
`5 10
`https://www.worldcat.org/title/rsa-securitys—official-guide-to—cryptography/oclc/782997409?referer=br&ht=edition
`
`
`
`510
`
`
`
`
`
`4/7/2019
`
`RSA security's official guide to cryptography (Book, 2001) [VVorldCat.org]
`
`s.
`
`Bowie State University
`Thurgood Marshall Library
`Bowie, MD 20715 United States
`
`,
`
`lm
`
`_
`15A???
`
`_
`_
`flgfims
`
`<€First<Prev12§fl§xj> Last»
`
`.1 Details
`
`Genre/Form:
`
`Handboeken (vorm)
`
`Material Type:
`
`Internet resource
`
`Document Type:
`
`Book, Internet Resource
`
`All Authors/
`Contributors:
`
`Steve Burnett; S_tephen Paine
`
`.
`_
`,,,,,,,,,,,,,,,
`Find more information about: Steve Burnett 7 £93
`
`ISBN:
`
`007213139X 9780072131390 0072131381 9780072131383 0072131373 9780072131376
`
`OCLC Number:
`
`782997409
`
`Notes:
`
`Includes index.
`
`Description:
`
`xxi, 419 p. : ill.
`
`; 24 cm + CD—ROM v.d.t.: RSA security's complete cryptography
`
`Contents:
`
`Chapter 1: Why Cryptography? Chapter 2: Symmetric-Key Cryptography. Chapter 3: Symmetric-Key
`Management. Chapter 4: The Key Distribution Problem and Public-Key Cryptography. Chapter 5: The
`Digital Signature. Chapter 6: Public-Key Infrastructures and the X509 Standard. Chapter 7: Network and
`Transport Security Protocols. Chapter 8: Application-Layer Security Protocols. Chapter 9: Hardware
`Solutions: Overcoming Software Limitations. Chapter 10: Digital Signatures: Beyond Security. Chapter 11:
`Doing It Wrong: The Break-Ins. Chapter 12: Doing It Right: Following Standards. Appendix A: Bits, Bytes,
`Hex, and ASCII. Appendix B: A Layman's Guide to a Subset of ASN.1, BER, and DER. Appendix C: Further
`Technical Details.
`
`Other Titles:
`
`Cryptography
`RSA security's complete cryptography
`
`Responsibility:
`
`Steve Burnett and Stephen Paine.
`
`More information:
`
`catdir.loc.gg
`
`catdirJocgg
`
`catdir.|oc.ggy
`
`:. Reviews
`
`
`User-contributed reviews_
`
`Add a review and share your thoughts with other readers.
`
`; Tags
`
`Add tags for "RSA security's official guide to cryptography".
`
`2. Similar Items
`
`Related Subjects: (6)
`
`511
`
`
`
`W 4
`
`RSA security's official guide to cryptography (Book, 2001) MorldCat.org]
`
`/7/2019
`
`Computer networks -- Security measures.
`
`Data encryption (Computer science)
`
`C_ryp_t29@p_hy;
`
`C_FY.Pt_09rafie.
`
`gmputerbeveiligmg:
`
`TCPIIP.
`
`: Linked Data
`
`httos://www_wor|dcafnm/tifle/rsa-semiritvs—nffinial—m Iide—fn—nrvnfnn r2nhvlnnlnl7899974099mf9mr=hr8 hf=editinn
`
`3/2
`
`512
`
`
`
`
`
`512
`
`