Basic IMAGE version of Foils prepared May 19 99

Foil 32 Uses of Secret Key Cryptography

From Remarks on Internet and Java Security Basic Information Track Computational Science Course CPS616 -- Spring Semester 1999. by Geoffrey Fox, Mehmet Sen
(0 to 5):





© Northeast Parallel Architectures Center, Syracuse University, npac@npac.syr.edu

If you have any comments about this server, send e-mail to webmaster@npac.syr.edu.

Page produced by wwwfoil on Wed May 19 1999

Table of Contents for Remarks on Internet and Java Security


1 Remarks on Internet and Java Security Spring 99
2 Abstract of CPS616 Java and Internet Security Presentation
3 Some Reference Material
4 Some General Issues I
5 Some General Issues II
6 Need for Security in Commerce - I
7 Need for Security in Commerce - II
8 Structure of Internet and Security-I
9 Structure of Internet and Security-II
10 Structure of Internet and Security-III
11 A PKZIP Anecdote
12 Downloading Software is Dangerous?
13 The Moldavia Pornographic Phone Scam
14 An Early Netscape DNS Bug
15 Tempest and Control Zones
16 Military Security Levels
17 Firewalls and Gateways - I
18 Firewalls and Gateways II
19 Encrypted Tunnels
20 The Great Clipper Controversy
21 Export Restrictions on Cryptography
22 Denial of Service versus "Attacks"
23 Combining Denial of Service with more Malicious Attack
24 Comments on Denial of Service
25 Some Attacking Concepts
26 Naïve way Viruses Spread themselves
27 Introduction to Cryptography
28 Breaking an Encryption Scheme
29 Types of Cryptographic Function
30 Security Uses of Cryptography
31 Secret Key Cryptography
32 Uses of Secret Key Cryptography
33 Secret Key Authentication
34 Message Integrity with Secret Key Cryptography
35 Public Key Cryptography
36 Insecure Link Transmission with Public Key Cryptography
37 Authentication with public key Cryptography
38 Digital Signatures and Public Key Cryptography
39 Use of Digital Signatures with public key Cryptography
40 Hash and Message Digests
41 Some Math Behind Secret Key Cryptography
42 Some Math behind RSA Algorithm -I
43 Some Math behind RSA Algorithm -II
44 Certificate Authorities
45 Review of Certificate Process
46 Sample Certificate from Netscape
47 VeriSign Digital ID's or Certificates - I
48 VeriSign Digital ID's or Certificates - II
49 VeriSign's Description of Digital ID's
50 VeriSign's Description of Certificate Revocation I
51 VeriSign's Description of Certificate Revocation II
52 The Java Security Model
53 Sandbox mechanism
54 What can applets do - I?
55 What can applets do - II?
56 What can applets do - III?
57 The Byte Code Verifier
58 Byte Code Verification
59 Why is type checking important!
60 Applet Class Loader
61 Going beyond the Sandbox: History of Java Security Models
62 Going beyond the Sandbox-2
63 Going beyond the Sandbox-3
64 JDK 1.2 Security Model
65 JAVA Fine-grained Access Control-1
66 JAVA Fine-grained Access Control-2
67 JAVA Fine-grained Access Control-3
68 JAVA Fine-grained Access Control-4
69 JAVA Fine-grained Access Control-5
70 JAVA Fine-grained Access Control-6
71 JAVA Fine-grained Access Control-7
72 Java Security-Related Tools
73 How to sign Java Code
74 Signing Classes with the Netscape Object Signing Tool
75 Netscape Object Signing Tool -2
76 Netscape Object Signing Tool -3
77 Signing Java Applets with Microsoft's Authenticode
78 Microsoft's Authenticode 2
79 Signing Code with Sun's JDK 1.1.x
80 Signing Code with Sun's JDK 1.1.x-2
81 Signing Code with Sun's JDK 1.1.x-3
82 Browsing Signed Applets
83 The Java Authentication Framework
84 The Java Authentication Framework-2
85 Signing Code with Sun's Java 2
86 Signing Code with Sun's Java 2-II
87 Signing Code with Sun's Java 2-III
88 Signing Code with Sun's Java 2-IV
89 Some Comparisons of Sign Tools
90 Some Comparisons of Sign Tools - 2
91 Secure Electronic Transaction SET
92 Electronic Shopping Experience - I
93 Electronic Shopping Experience - II
94 Features of SET - I
95 Features of SET - II
96 SET Encryption Summary
97 Sample SET Cryptography Use
98 Sample SET Cryptography Steps 2 to 5
99 Sample SET Cryptography Step 6
100 Sample SET Cryptography Steps 7-10
101 Structure of Public Key System in SET
102 Features of Public Key System in SET - I
103 Features of Public Key System in SET - II
104 Cardholder Registration Process in SET
105 Merchant Registration Process in SET
106 Purchase Request Process in SET
107 Payment Authorization and Capture Processes in SET
108 SSL and S/MIME
109 SSL from Netscape I
110 SSL from Netscape II
111 SSL from Netscape III
112 Netscape's Description of S/MIME
113 Generating Certificates on Unix-1
114 Generating Certificates on Unix-2
115 Sample Certificate and primary Key
116 Secure Server Example-NPAC Grading System-1
117 Secure Server Example-NPAC Grading System-2
118 Secure Server Example-NPAC Grading System-3
119 Secure Server Example-NPAC Grading System-4
120 Java Security Manager
121 Java Security Package
122 Java Digital Signatures-1
123 Java Digital Signatures-2
124 Some Other Security Systems
125 KERBEROS
126 KERBEROS - 2
127 SESAME Security System
128 Details on SESAME I
129 Details on SESAME II
130 The GSS-API Security Interface
131 Globus System Security Policy and Requirements -- Overview
132 Further Properties of Globus Entities
133 Globus Application Requirements
134 Relevant Components of Globus
135 Issues in the Globus Security Model
136 Elements of Globus Security Policy I
137 Elements of Globus Security Policy II
138 Globus Security Functional Requirements - I
139 Globus Security Functional Requirements - II
140 JavaScript Security Model
141 JavaScript Security Issues
142 Same Origin Policy
143 Signed Script Policy-1
144 Signed Script Policy-2
145 Signed Script Policy-3
146 Codebase Principals-1
147 Codebase Principals-2
148 Scripts Signed by Different Principals
149 Principals of Windows and Layers
150 Determining Container Principals
151 Identifying Signed Scripts
152 Using Expanded Privileges
153 Targets
154 Targets-2
155 Importing and Exporting Functions
156 Weaknesses in the JavaScript Model
157 Signing Scripts
158 Signing Scripts-2
159 Signing Scripts-3
160 Signing Scripts-4
Click outside pointer rectangle to move pointer
Click on Pointer to Hide
Click on Pointer + ALT to toggle message hiding
Click on Pointer + CNTL to abolish pointer
Click on Pointer + Shift to cycle families
Click outside + Alt is Change Image
Click outside + Control is Double Size
Click outside + Shift is Halve Size
Right Mouse Down on Pointer Toggles Index
Shift Right Mouse aligns top with scrolled Page
While With Mouse Down on Current Pointer
h hides This Message while m restores
i Toggles Index Aligned with Page Top
j Toggles Index Aligned with Scrolled View Top
a Abolishes Pointer while CNTL-Click restores
f cycles through pointer families
c cycles through members of a family
u increases Size Up and d decreases Down
Mouse Up-Down between changes of
Pointer to process new option