Remarks on Internet and Java Security CPS616 Certificate Version Summer 97

9/3/97


Click here to start


Table of Contents

Remarks on Internet and Java Security CPS616 Certificate Version Summer 97

Abstract of CPS616 Java and Internet Security Presentation

Some Reference Material

Some General Issues I

Some General Issues II

Need for Security in Commerce - I

Need for Security in Commerce - II

Structure of Internet and Security-I

Structure of Internet and Security-II

Structure of Internet and Security-III

A PKZIP Anecdote

Downloading Software is Dangerous?

The Moldavia Pornographic Phone Scam

An Early Netscape DNS Bug

Tempest and Control Zones

Military Security Levels

Firewalls and Gateways - I

Firewalls and Gateways II

Encrypted Tunnels

The Great Clipper Controversy

Export Restrictions on Cryptography

Denial of Service versus “Attacks”

Comments on Denial of Service

Some Attacking Concepts

Naïve way Viruses Spread themselves

The Java Security Model

What can applets do - I?

What can applets do - II?

What can applets do - III?

The Byte Code Verifier

Byte Code Verification

Why is type checking important!

Applet Class Loader

Java Security Manager

Introduction to Cryptography

Breaking an Encryption Scheme

Types of Cryptographic Function

Security Uses of Cryptography

Secret Key Cryptography

Uses of Secret Key Cryptography

Secret Key Authentication

Message Integrity with Secret Key Cryptography

Public Key Cryptography

Insecure Link Transmission with Public Key Cryptography

Authentication with public key Cryptography

Digital Signatures and Public Key Cryptography

Use of Digital Signatures with public key Cryptography

Hash and Message Digests

Some Math Behind Secret Key Cryptography

Some Math behind RSA Algorithm -I

Some Math behind RSA Algorithm -II

Certificate Authorities

Sample Certificate from Netscape

VeriSign Digital ID’s or Certificates - I

VeriSign Digital ID’s or Certificates - II

VeriSign’s Description of Digital ID’s

VeriSign’s Description of Certificate Revocation I

VeriSign’s Description of Certificate Revocation II

Secure Electronic Transaction SET

Electronic Shopping Experience - I

Electronic Shopping Experience - II

Features of SET - I

Features of SET - II

SET Encryption Summary

Sample SET Cryptography Use

Sample SET Cryptography Steps 2 to 5

Sample SET Cryptography Step 6

Sample SET Cryptography Steps 7-10

Structure of Public Key System in SET

Features of Public Key System in SET - I

Features of Public Key System in SET - II

Cardholder Registration Process in SET

Merchant Registration Process in SET

Purchase Request Process in SET

Payment Authorization and Capture Processes in SET

SSL and S/MIME

SSL from Netscape I

SSL from Netscape II

SSL from Netscape III

Netscape’s Description of S/MIME

Some Other Security Systems

SESAME Security System

Globus System Security Policy and Requirements -- Overview

Further Properties of Globus Entities

Globus Application Requirements

Relevant Components of Globus

Issues in the Globus Security Model

Elements of Globus Security Policy I

Elements of Globus Security Policy II

Globus Security Functional Requirements - I

Globus Security Functional Requirements - II

Author: Geoffrey Fox

Email: gcf@npac.syr.edu

Home Page: http://www.npac.syr.edu