Remarks on Internet Security Issues and Encryption Algorithms Spring 99

4/6/00


Click here to start


Table of Contents

Remarks on Internet Security Issues and Encryption Algorithms Spring 99

Abstract of Internet Security Presentation

Some Reference Material

Some General Issues I

Some General Issues II

Need for Security in Commerce - I

Need for Security in Commerce - II

Structure of Internet and Security-I

Structure of Internet and Security-II

Structure of Internet and Security-III

A PKZIP Anecdote

Downloading Software is Dangerous?

The Moldavia Pornographic Phone Scam

An Early Netscape DNS Bug

Tempest and Control Zones

Military Security Levels

Firewalls and Gateways - I

Firewalls and Gateways II

Encrypted Tunnels

The Great Clipper Controversy

Export Restrictions on Cryptography

Denial of Service versus “Attacks”

Combining Denial of Service with more Malicious Attack

Comments on Denial of Service

Some Attacking Concepts

Naïve way Viruses Spread themselves

Introduction to Cryptography

Breaking an Encryption Scheme

Types of Cryptographic Function

Security Uses of Cryptography

Secret Key Cryptography

Uses of Secret Key Cryptography

Secret Key Authentication

Message Integrity with Secret Key Cryptography

Public Key Cryptography

Insecure Link Transmission with Public Key Cryptography

Authentication with public key Cryptography

Digital Signatures and Public Key Cryptography

Use of Digital Signatures with public key Cryptography

Hash and Message Digests

Some Math Behind Secret Key Cryptography

Some Math behind RSA Algorithm -I

Some Math behind RSA Algorithm -II

Certificate Authorities

Review of Certificate Process

Sample Certificate from Netscape

VeriSign Digital ID’s or Certificates - I

VeriSign Digital ID’s or Certificates - II

VeriSign’s Description of Digital ID’s

VeriSign’s Description of Certificate Revocation I

VeriSign’s Description of Certificate Revocation II

Author: Geoffrey Fox

Email: njm@npac.syr.edu