Table of Contents
Encrypting the Internet
Overview
Threat ModelsI.e, What are you worried about?
Confidentiality
Authentication/Integrity
Traffic Analysis
Denial of Service
Enforcing Subnetwork Transparency
Cryptography Basics
Properties of a Good Modern Cipher
Types of Cryptography
DES: a typical symmetric block cipher
Brute force keysearching
Deep Crack
Deep Crack
Alternatives to DES
More DES alternatives
Encryption for Authentication
Sample authentication scheme
Challenge-response protocols
Cryptographic hash functions
Generic hash function
Properties of hash functions
Hash functions for confidentiality
Public key cryptography
Why public key?
Public key theory
Discrete logarithm
Diffie-Hellman key exchange
Diffie-Hellman in detail
RSA
RSA in detail
RSA decryption
RSA Signatures
Generating a digital signature
Verifying a digital signature
Public Key Management
Certificates
Other PK algorithms
Crypto - Necessary But Not Sufficient
The Internet Reference Model
The Internet Reference Model
The Major Internet Protocols
The End-to-End Principle
Encryption in the Internet
Encryption in the Subnet
Encryption Above IP
IP Security (IPSEC)
IPSec Packet Format
Authentication Header (AH)
Encapsulating Security Protocol (ESP)
IPSec Key Management
Encryption Above TCP
Encryption Protocols Above TCP
Application-layer Encryption
Encryption Layer Choices
Crypto Politics
Bernstein Case
Karn Case
Junger Case
Current Status of Export Controls
Legal Status
|