Đang chuẩn bị nút TẢI XUỐNG, xin hãy chờ
Tải xuống
(BQ) In this age of universal electronic connectivity, viruses and hackers, electronic eavesdropping, and electronic fraud, security is paramount. This text provides a practical survey of both the principles and practice of cryptography and network security. The book is divided into 2 parts, part 2 from chapter 16 to chapter 23. | Part 5 Network and Internet Security chapter Transport-Level Security 16.1 Web Security Considerations Web Security Threats Web Traffic Security Approaches 16.2 Secure Socket Layer and Transport Layer Security SSL Architecture SSL Record Protocol Change Cipher Spec Protocol Alert Protocol Handshake Protocol Cryptographic Computations 16.3 Transport Layer Security Version Number Message Authentication Code Pseudorandom Function Alert Codes Cipher Suites Client Certificate Types Certificate_Verify and Finished Messages Cryptographic Computations Padding 16.4 HTTPS Connection Initiation Connection Closure 16.5 Secure Shell SSH Transport Layer Protocol User Authentication Protocol Connection Protocol 16.6 Recommended Reading and Web Sites 16.7 Key Terms Review Questions and Problems 485 486 CHAPTER 16 TRANSPORT-LEVEL SECURITY Use your mentality Wake up to reality From the song I ve Got You Under My Skin by Cole Porter KEY POINTS Secure Socket Layer SSL provides security services between TCP and applications that use TCP. The Internet standard version is called Transport Layer Service TLS . SSL TLS provides confidentiality using symmetric encryption and message integrity using a message authentication code. SSL TLS includes protocol mechanisms to enable two TCP users to determine the security mechanisms and services they will use. HTTPS HTTP over SSL refers to the combination of HTTP and SSL to implement secure communication between a Web browser and a Web server. Secure Shell SSH provides secure remote logon and other secure client server facilities. Virtually all businesses most government agencies and many individuals now have Web sites. The number of individuals and companies with Internet access is expanding rapidly and all of these have graphical Web browsers. As a result businesses are enthusiastic about setting up facilities on the Web for electronic commerce. But the reality is that the Internet and the Web are extremely vulnerable to compromises of various .