Treść książki

Przejdź do opcji czytnikaPrzejdź do nawigacjiPrzejdź do informacjiPrzejdź do stopki
12.6.2.3.Podziałtekstunablokiśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśś87
12.6.2.4.Permutacjarozszerzającaśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśś87
12.6.2.5.SzyfrowanieprzyużyciuS-blokówśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśś87
12.6.2.6.PermutacjewP-blokachśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśś87
12.6.2.7.Permutacjakońcowaśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśś88
12.6.2.8.DeszyfrowanieDESśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśś88
12.6.2.9.ModyfikacjeDESśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśś88
12.6.2.10.SieciFeistelaśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśś88
12.6.3.AlgorytmAES................................................................89
12.6.3.1.Tworzeniekluczyśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśś89
12.6.3.2.RundaalgorytmuAESśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśś90
12.6.3.3.BezpieczeństwoalgorytmuAESśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśś90
12.6.4.AlgorytmTWOFISH..........................................................90
12.6.5.AlgorytmCAST5.............................................................91
12.6.6.AlgorytmRC2................................................................91
12.6.7.AlgorytmRC5................................................................91
12.6.8.
Innewybranesymetrycznealgorytmyblokowe.....................................92
12.7.Algorytmyzkluczempublicznym....................................................92
12.7.1.AlgorytmDiffiego-Hellmana....................................................92
12.7.2.AlgorytmRSA................................................................93
12.7.2.1.DziałaniasystemuRSAśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśś94
12.7.2.2.PrzykładoweszyfrowanieideszyfrowanieRSAśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśś94
12.7.2.3.ImplementacjaRSAśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśś94
12.7.3.AlgorytmElGamala...........................................................97
12.7.4.Innewybranealgorytmyasymetryczne............................................98
13.Protokołykomunikacyjnepodwyższającebezpieczeństwo
informacjiwsieciach...........................................99
13.1.KonstrukcjawirtualnychsieciprywatnychVPN........................................101
13.1.1.RodzajeiklasyfikacjasieciVPN................................................103
13.1.2.KlasyfikacjesieciVPN........................................................104
13.2.ProtokółIPSEC..................................................................107
13.2.1.Architektura.Zasadadziałania..................................................107
13.2.2.ProtokołybezpieczeństwaIPsec................................................110
13.2.2.1.ProtokółAHśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśś110
13.2.2.2.ProtokółESPśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśś111
13.2.3.RozwójiprzyszłośćIPSec.....................................................112
13.2.4.SSTPjakoprzykładkontrtechnologiidlaIPsec....................................113
13.2.4.1.Architektura.Zasadadziałaniaśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśśś113
13.2.5.Podsumowanie..............................................................114
13.3.ProtokołySSL/TLS...............................................................114
13.3.1.ZasadadziałaniaSSL.........................................................114
13.3.2.ZasadadziałaniaTLS.........................................................118
7