Symmetric Cryptography

Symmetric algorithms do some things really well and other things not so well. Modern symmetric algorithms are great at all of the following: ■ Preserving confidentiality ■ Increasing speed ■ Ensuring simplicity (relatively speaking, of course) ■ Providing authenticity .ymmetric algorithms have their drawbacks in these areas: ■ Key management issues ■ Lack of nonrepudiation … Read more

Cryptography in Action

You will encounter cryptography in many forms throughout this book. It is applied to many different technologies and situations and, as such, is something you need to have a firm grasp of. Some examples of applied cryptography are: Public key infrastructure (PKI)  Digital certificates  Authentication  E-commerce  RSA  MD-5 Secure Hash Algorithm (SHA)  Secure Sockets Layer … Read more

Tracing the Evolution in cryptography

As with the ancient Egyptians and Romans, who used secret writing methods to obscure trade or battle information and hunting routes, one of the most widely used applications of cryptography is in the safeguarding of communications between two parties wanting to share information. Guaranteeing that information is kept secret is one thing, but in the … Read more

Intrusion Prevention and Intrusion Detection Systems

Intrusion prevention systems (IPSs) and intrusion detection systems (IDSs) are important considerations for any smart hacker. It is important for you, as a hacker, to cover your tracks and keep a low profile—as in no profile at all. It should be common sense, but consider this: If instead of tiptoeing around a network, you slam … Read more

Firewalls

The firewall category includes proxy firewalls; however, because of a proxy’s varied functions it seems appropriate to give them their own subsection. Firewalls are most commonly broken down into the following main categories: Packet filtering Stateful packet filtering  Application proxies, which we covered earlier Packet filtering firewalls look at the header information of the packets … Read more