| Preface | p. ix |
| Security Threats, Services, and Mechanisms | p. 1 |
| Introduction | p. 1 |
| The Security Policy | p. 2 |
| Risk Analysis and Management | p. 4 |
| Summary | p. 6 |
| Deliberate Threats to Information | p. 6 |
| Services | p. 7 |
| Security Mechanisms | p. 9 |
| Encryption | p. 9 |
| Integrity Checks | p. 10 |
| Uniqueness Mechanisms | p. 12 |
| Security Standards | p. 13 |
| Summary | p. 16 |
| References | p. 16 |
| Security Procedures | p. 17 |
| Attacks To Be Thwarted | p. 17 |
| Statistical Analysis | p. 17 |
| Known Plaintext Attack | p. 18 |
| Chosen Cyphertext Attack | p. 18 |
| Searching the Key Space | p. 18 |
| Breaking the Algorithm | p. 18 |
| Stealing the Key | p. 19 |
| Introducing a False Key | p. 19 |
| Modifying Cyphertext | p. 19 |
| Modifying Plaintext | p. 19 |
| Encryption Procedures | p. 20 |
| Authentication Procedures | p. 24 |
| Secure Access Management | p. 27 |
| Personal Identification Procedures | p. 31 |
| Chipcards for Access Control | p. 35 |
| The Secure Session | p. 38 |
| Anonymity | p. 41 |
| OSI Layers and Networks | p. 43 |
| References | p. 46 |
| Security Management | p. 47 |
| Scope of Security Management | p. 47 |
| Key Management | p. 48 |
| Key Generation | p. 48 |
| Certification and Notarisation of Keys | p. 51 |
| Distribution of Keys | p. 55 |
| Withdrawal of Keys | p. 59 |
| PIN Management | p. 60 |
| Authorization | p. 61 |
| System Security Management | p. 63 |
| Security Service Management | p. 66 |
| References | p. 68 |
| Algorithms | p. 69 |
| Traditional Cypher Algorithms | p. 69 |
| The Data Encryption Algorithm | p. 77 |
| Asymmetric Algorithms | p. 82 |
| DL Authentication | p. 86 |
| The RSA Algorithm | p. 86 |
| Fiat-Shamir (FS) Signatures | p. 90 |
| Trapdoor Knapsack Schemes | p. 92 |
| Making Asymmetric Cyphers From Symmetric Ones | p. 95 |
| Stream Cyphers | p. 98 |
| Some Other Useful Algorithms | p. 104 |
| Hashing | p. 104 |
| Random Numbers | p. 110 |
| The Euclidean Algorithm | p. 113 |
| Conclusion | p. 115 |
| References | p. 115 |
| OSI and Security | p. 117 |
| The OSI/RM and Security | p. 117 |
| Security and X.400 MHS | p. 122 |
| Origin Authentication | p. 127 |
| Proof and Nonrepudiation of Submission and Delivery | p. 127 |
| Secure Access Management | p. 129 |
| Integrity/Confidentiality | p. 130 |
| General Message Security Services | p. 132 |
| Registration Security Services | p. 132 |
| A Different Approach--PEM | p. 133 |
| EDI Security | p. 134 |
| X.435 and Security | p. 134 |
| The ANSI X12 Secure EDI Approach | p. 138 |
| Security and EDIFACT | p. 142 |
| The X.500 Directory | p. 144 |
| Conclusion | p. 147 |
| References | p. 148 |
| Applications, Systems, Products, and Architectures | p. 149 |
| Some Banking and Financial Applications | p. 149 |
| ISO 8730 | p. 150 |
| SWIFT | p. 151 |
| ETEBAC 5 | p. 152 |
| ATMs and Debit and Credit Cards | p. 154 |
| Security Products | p. 155 |
| Communication Encryptors | p. 155 |
| File Security Products | p. 158 |
| Products for User Identification | p. 159 |
| Products for Intersystem Access Control | p. 162 |
| Security Management Products | p. 163 |
| Some Other Relevant Products | p. 165 |
| A Typical Security Product for a PC | p. 166 |
| Security Architectures | p. 166 |
| Kerberos | p. 167 |
| SESAME | p. 169 |
| Comparison of Architectures | p. 173 |
| Other Security Architectures | p. 174 |
| References | p. 175 |
| Conclusion | p. 177 |
| Voice and Video Networks | p. 177 |
| Security of Mobile- and Radio-Based Systems | p. 179 |
| Some Other Application Areas for Security | p. 181 |
| References | p. 182 |
| The Open Systems Interconnection Reference Model (OSI/RM) and Security | p. 185 |
| References | p. 189 |
| Shannon's Theory of Secrecy Systems | p. 191 |
| Perfect Secrecy | p. 191 |
| The Unicity Key Length and Unicity Distance | p. 193 |
| References | p. 194 |
| Maximum Length Sequences | p. 195 |
| Linear Feedback Shift Registers (LFBSR) | p. 196 |
| Another Form for LFBSRs | p. 198 |
| De Bruijn Sequences | p. 199 |
| Statistical Properties of MLSs | p. 203 |
| Synthesizing Sequences--The Massey Algorithm | p. 204 |
| References | p. 206 |
| Euler's Totient Function | p. 207 |
| References | p. 213 |
| Finding Large Prime Numbers | p. 215 |
| Testing Primality | p. 216 |
| Finding Primes for RSA | p. 220 |
| References | p. 221 |
| Factorising Large Integers | p. 223 |
| Fermat Factorisation | p. 223 |
| Pollard's Monte Carlo Method | p. 224 |
| References | p. 226 |
| The CCITT X.400 (1988) Message Handling Systems Recommendations | p. 227 |
| Information Technology Security Evaluation Criteria | p. 229 |
| Assuring Effectiveness | p. 230 |
| Assuring Correctness | p. 231 |
| Construction | p. 231 |
| Operation | p. 232 |
| Selected Bibliography | p. 233 |
| Index | p. 237 |
| Table of Contents provided by Syndetics. All Rights Reserved. |