Atnaujinkite slapukų nuostatas

El. knyga: End-to-End Encrypted Messaging

  • Formatas: 359 pages
  • Išleidimo metai: 31-Jan-2020
  • Leidėjas: Artech House Publishers
  • ISBN-13: 9781630817336
Kitos knygos pagal šią temą:
  • Formatas: 359 pages
  • Išleidimo metai: 31-Jan-2020
  • Leidėjas: Artech House Publishers
  • ISBN-13: 9781630817336
Kitos knygos pagal šią temą:

DRM apribojimai

  • Kopijuoti:

    neleidžiama

  • Spausdinti:

    neleidžiama

  • El. knygos naudojimas:

    Skaitmeninių teisių valdymas (DRM)
    Leidykla pateikė šią knygą šifruota forma, o tai reiškia, kad norint ją atrakinti ir perskaityti reikia įdiegti nemokamą programinę įrangą. Norint skaityti šią el. knygą, turite susikurti Adobe ID . Daugiau informacijos  čia. El. knygą galima atsisiųsti į 6 įrenginius (vienas vartotojas su tuo pačiu Adobe ID).

    Reikalinga programinė įranga
    Norint skaityti šią el. knygą mobiliajame įrenginyje (telefone ar planšetiniame kompiuteryje), turite įdiegti šią nemokamą programėlę: PocketBook Reader (iOS / Android)

    Norint skaityti šią el. knygą asmeniniame arba „Mac“ kompiuteryje, Jums reikalinga  Adobe Digital Editions “ (tai nemokama programa, specialiai sukurta el. knygoms. Tai nėra tas pats, kas „Adobe Reader“, kurią tikriausiai jau turite savo kompiuteryje.)

    Negalite skaityti šios el. knygos naudodami „Amazon Kindle“.

This exciting resource introduces the core technologies that are used for Internet messaging. The book explains how Signal protocol, the cryptographic protocol that currently dominates the field of end to end encryption (E2EE) messaging, is implemented and addresses privacy issues related to E2EE messengers. The Signal protocol and its application in WhatsApp is explored in depth, as well as the different E2EE messengers that have been made available in the last decade are also presented, including SnapChat. It addresses the notion of self-destructing messages (as originally introduced by SnapChat) and the use of metadata to perform traffic analysis.

A comprehensive treatment of the underpinnings of E2EE messengers, including Pretty Good Privacy (PGP) and OpenPGP as well as Secure/Multipurpose Internet Mail Extensions (S/MIME) is given to explain the roots and origins of secure messaging, as well as the evolutionary improvements to PGP/OpenPGP and S/MIME that have been proposed in the past. In addition to the conventional approaches to secure messaging, it explains the modern approaches messengers like Signal are based on. The book helps technical professionals to understand secure and E2EE messaging on the Internet, and to put the different approaches and solutions into perspective.
Preface xi
Acknowledgments xv
Chapter 1 Introduction
1(10)
Chapter 2 Internet Messaging
11(30)
2.1 Introduction
11(1)
2.2 E-Mail
12(21)
2.2.1 Internet Message Format
16(8)
2.2.2 E-Mail Protocols
24(7)
2.2.3 Recent Enhancements
31(2)
2.3 Instant Messaging
33(3)
2.4 Final Remarks
36(5)
Chapter 3 Cryptographic Techniques
41(64)
3.1 Introduction
41(16)
3.1.1 Cryptology
41(2)
3.1.2 Cryptographic Systems
43(12)
3.1.3 Historical Background Information
55(2)
3.2 Cryptosystems
57(28)
3.2.1 Unkeyed Cryptosystems
57(6)
3.2.2 Secret Key Cryptosystems
63(9)
3.2.3 Public Key Cryptosystems
72(13)
3.3 Certificate Management
85(14)
3.3.1 Introduction
85(4)
3.3.2 X.509 Certificates
89(6)
3.3.3 OpenPGP Certificates
95(2)
3.3.4 State of the Art
97(2)
3.4 Final Remarks
99(6)
Chapter 4 Secure Messaging
105(12)
4.1 Threats and Attacks
105(5)
4.1.1 Passive Attacks
106(2)
4.1.2 Active Attacks
108(2)
4.2 Aspects and Notions of Security
110(4)
4.3 Final Remarks
114(3)
Chapter 5 OpenPGP
117(46)
5.1 Origins and History
117(3)
5.2 Technology
120(26)
5.2.1 Preliminary Remarks
121(1)
5.2.2 Key ID
122(1)
5.2.3 Message Format
123(5)
5.2.4 PGP/MIME
128(3)
5.2.5 Cryptographic Algorithms
131(7)
5.2.6 Message Processing
138(6)
5.2.7 Key Management
144(2)
5.3 Web of Trust
146(10)
5.3.1 Keyrings
146(1)
5.3.2 Trust Establishment
147(5)
5.3.3 Key Revocation
152(2)
5.3.4 Key Servers
154(2)
5.4 Security Analysis
156(3)
5.4.1 Specification
156(1)
5.4.2 Implementations
157(2)
5.5 Final Remarks
159(4)
Chapter 6 S/MIME
163(26)
6.1 Origins and History
163(3)
6.2 Technology
166(16)
6.2.1 Message Formats
167(9)
6.2.2 Cryptographic Algorithms
176(2)
6.2.3 Signer Attributes
178(1)
6.2.4 Enhanced Security Services
179(3)
6.3 Certificates
182(2)
6.4 Security Analysis
184(1)
6.5 Final Remarks
185(4)
Chapter 7 Evolutionary Improvements
189(12)
7.1 WKD and WKS
189(2)
7.2 DNS-Based Distribution of Public Keys
191(1)
7.3 Opportunistic Encryption
191(5)
7.3.1 Autocrypt
192(2)
7.3.2 P≡p
194(2)
7.4 Web-Based Solutions
196(2)
7.5 Final Remarks
198(3)
Chapter 8 OTR
201(20)
8.1 Origins and History
201(4)
8.2 Technology
205(12)
8.2.1 OTRAKE
206(7)
8.2.2 Diffie-Hellman Ratchet
213(2)
8.2.3 Message Processing
215(2)
8.3 Security Analysis
217(1)
8.4 Final Remarks
217(4)
Chapter 9 Signal
221(40)
9.1 Origins and History
221(3)
9.2 Technology
224(17)
9.2.1 Key Agreement and Session Establishment
225(6)
9.2.2 Double Ratchet Mechanism
231(6)
9.2.3 Authentication Ceremony
237(2)
9.2.4 Group Messaging
239(2)
9.3 Security Analysis
241(2)
9.4 Implementations
243(12)
9.4.1 Viber
243(7)
9.4.2 Wire
250(2)
9.4.3 Riot
252(3)
9.5 Final Remarks
255(6)
Chapter 10 WhatsApp
261(10)
10.1 Origins and History
261(1)
10.2 Implementation Details
262(6)
10.2.1 Transport Layer Security and Complementary Technologies
263(1)
10.2.2 Cryptographic Algorithms and Key Generation
264(1)
10.2.3 Message Attachments
264(1)
10.2.4 Group Messaging
265(3)
10.3 Security Analysis
268(1)
10.4 Final Remarks
269(2)
Chapter 11 Other E2EE Messengers
271(26)
11.1 Imessage
272(3)
11.2 Wickr
275(6)
11.3 Threema
281(8)
11.4 Telegram
289(8)
Chapter 12 Privacy Issues
297(8)
12.1 Introduction
297(2)
12.2 Self-Destructing Messaging
299(2)
12.3 Online Presence Indication
301(1)
12.4 Final Remarks
302(3)
Chapter 13 Conclusions and Outlook
305(8)
Appendix A Mathematical Notation 313(2)
Appendix B Abbreviations and Acronyms 315(10)
About the Author 325(2)
Index 327