| Preface | p. xi |
| Introduction | p. 1 |
| Cryptography | p. 5 |
| Introduction | p. 5 |
| Basic Concepts | p. 5 |
| Ciphertext and Plaintext | p. 5 |
| Types of Cryptosystems | p. 6 |
| Goals of a Cryptosystem | p. 7 |
| Security | p. 8 |
| Symmetric Encryption Schemes | p. 9 |
| Perfect Secrecy: The One-Time Pad | p. 9 |
| Block Ciphers | p. 11 |
| Permutation | p. 11 |
| Substitution | p. 12 |
| Diffusion/Confusion | p. 13 |
| SP Networks | p. 14 |
| Basic Structure | p. 14 |
| Modes of Use | p. 15 |
| DES | p. 17 |
| AES | p. 18 |
| Stream Ciphers | p. 19 |
| Advantages | p. 20 |
| Security Remarks | p. 20 |
| Some Examples | p. 21 |
| Asymmetric Cryptosystems and Digital Signatures | p. 21 |
| Public-Key Encryption | p. 22 |
| Public Key Infrastructure (PKI) and Certificate Authorities (CA) | p. 23 |
| Mathematical Background | p. 25 |
| Diffie-Hellman Key Agreement | p. 27 |
| RSA Cryptosystem | p. 28 |
| ElGamal Cryptosystem | p. 29 |
| Necessary Security for Practical Public Key Encryption Systems | p. 31 |
| Digital Signature | p. 32 |
| Mathematical Background | p. 33 |
| RSA Signature Scheme | p. 35 |
| Digital Signature Algorithm (DSA) | p. 36 |
| Necessary Security for Practical Digital Signature Systems | p. 36 |
| References | p. 38 |
| Security Features in Wireless Environment | p. 41 |
| Introduction | p. 41 |
| Mobile Network Environment | p. 42 |
| General Security Threats of a Network | p. 44 |
| Limitations of Mobile Environment | p. 45 |
| Mobility and Security | p. 46 |
| Attacks in Mobile Environment | p. 46 |
| Nuisance Attack | p. 47 |
| Impersonation Attack | p. 48 |
| Interception Attack | p. 48 |
| Replay Attack | p. 48 |
| Parallel Session Attack | p. 48 |
| Security Issues in Mobile Environment | p. 49 |
| Authentication | p. 49 |
| Anonymity | p. 50 |
| Device Vulnerability | p. 52 |
| Domain Boundary Crossing | p. 52 |
| References | p. 53 |
| Standard Protocols | p. 55 |
| IEEE 802.11 | p. 55 |
| Brief History | p. 55 |
| IEEE802.11 Architecture | p. 56 |
| IEEE 802.11 Layers | p. 60 |
| Security of IEEE 802.11 | p. 62 |
| Key Management | p. 69 |
| Weaknesses of WEP | p. 70 |
| Bluetooth | p. 72 |
| Bluetooth Overview | p. 72 |
| Brief History | p. 73 |
| Benefits | p. 74 |
| Bluetooth Architecture and Components | p. 76 |
| Security of Bluetooth | p. 78 |
| Problems in the Security of Bluetooth | p. 89 |
| Reference | p. 90 |
| Security in 2G Systems | p. 91 |
| GSM System | p. 92 |
| Introduction | p. 92 |
| Architecture of the GSM Network | p. 93 |
| GSM Security Features | p. 96 |
| Attacks on GSM Security | p. 103 |
| I-mode Introduction | p. 106 |
| Introduction | p. 106 |
| I-mode System Overview | p. 107 |
| SSL Overview | p. 108 |
| Protocol Stack | p. 110 |
| HTTP Tunneling Protocol | p. 114 |
| Postscript | p. 116 |
| CDPD | p. 116 |
| Introduction | p. 116 |
| Basic Idea | p. 118 |
| Basic Infrastructure | p. 119 |
| How a CDPD Connection Works | p. 122 |
| CDPD Security | p. 125 |
| References | p. 129 |
| Security in 3G and 4G Systems | p. 131 |
| 3G Wireless Communications Systems | p. 131 |
| Third Generation Partnership Project (3GPP) | p. 133 |
| 3GPP Security Objectives | p. 133 |
| 3G Security Architecture | p. 134 |
| Network Access Security | p. 135 |
| Network Domain Security | p. 136 |
| User Domain Security | p. 136 |
| Provider-User Link Security | p. 136 |
| Visibility and Configurability of Security | p. 137 |
| Authentication and Key Agreement (AKA) in 3GPP | p. 137 |
| Confidentiality and Integrity | p. 138 |
| Confidentiality | p. 139 |
| Data Integrity | p. 140 |
| 4G Wireless Communications Systems | p. 141 |
| References | p. 142 |
| Wireless Application Protocol (WAP) | p. 143 |
| Introduction | p. 143 |
| WAP Protocol Stack | p. 144 |
| WAP PKI Model | p. 147 |
| WTLS Class 2 | p. 148 |
| WTLS Class 3 and SignText | p. 152 |
| Cipher Suite in WTLS | p. 156 |
| Key Exchange Suite | p. 156 |
| Elliptic Curve Parameters in WTLS | p. 160 |
| Bulk Encryption and MAC Suite | p. 161 |
| WAP-Profiled TLS | p. 163 |
| Cipher Suites | p. 164 |
| Session ID and Session Resume | p. 167 |
| Server/Client Authentication and Certificate | p. 168 |
| TLS Tunneling | p. 168 |
| WAP Identity Module | p. 169 |
| Further Information | p. 170 |
| References | p. 171 |
| About the Authors | p. 175 |
| Index | p. 177 |
| Table of Contents provided by Ingram. All Rights Reserved. |