Preface |
|
xi | |
Acknowledgments |
|
xv | |
Chapter 1 Introduction |
|
1 | (8) |
Chapter 2 Internet Messaging |
|
9 | (24) |
|
|
9 | (4) |
|
2.2 Internet Message Format |
|
|
13 | (8) |
|
|
14 | (4) |
|
|
18 | (1) |
|
|
18 | (3) |
|
2.3 Internet Messaging Protocols |
|
|
21 | (8) |
|
2.3.1 Message Transfer and Delivery |
|
|
22 | (4) |
|
2.3.2 Message Store Access |
|
|
26 | (2) |
|
|
28 | (1) |
|
|
29 | (4) |
Chapter 3 Cryptographic Techniques |
|
33 | (40) |
|
|
33 | (9) |
|
3.1.1 Preliminary Remarks |
|
|
33 | (2) |
|
3.1.2 Cryptographic Systems |
|
|
35 | (2) |
|
3.1.3 Classes of Cryptographic Systems |
|
|
37 | (1) |
|
3.1.4 Secure Cryptosystems |
|
|
38 | (3) |
|
3.1.5 Historical Background Information |
|
|
41 | (1) |
|
3.2 Cryptosystems Overview |
|
|
42 | (25) |
|
3.2.1 Unkeyed Cryptosystems |
|
|
43 | (5) |
|
3.2.2 Secret Key Cryptosystems |
|
|
48 | (6) |
|
3.2.3 Public Key Cryptosystems |
|
|
54 | (13) |
|
|
67 | (6) |
Chapter 4 Certificate Management |
|
73 | (18) |
|
|
73 | (5) |
|
|
78 | (6) |
|
|
78 | (3) |
|
4.2.2 Hierarchical Trust Model |
|
|
81 | (3) |
|
|
84 | (2) |
|
|
84 | (1) |
|
4.3.2 Cumulative Trust Model |
|
|
85 | (1) |
|
|
86 | (5) |
Chapter 5 Secure Messaging |
|
91 | (12) |
|
|
91 | (6) |
|
|
92 | (2) |
|
|
94 | (3) |
|
|
97 | (3) |
|
5.2.1 What Does "Secure Messaging" Mean? |
|
|
97 | (2) |
|
5.2.2 How Can "Secure Messaging" Be Implemented? |
|
|
99 | (1) |
|
|
100 | (3) |
Chapter 6 OpenPGP |
|
103 | (46) |
|
|
103 | (3) |
|
|
106 | (24) |
|
6.2.1 Preliminary Remarks |
|
|
106 | (2) |
|
|
108 | (1) |
|
|
109 | (5) |
|
|
114 | (3) |
|
6.2.5 Supported Algorithms |
|
|
117 | (5) |
|
|
122 | (6) |
|
|
128 | (2) |
|
|
130 | (11) |
|
|
130 | (2) |
|
6.3.2 Trust Establishment |
|
|
132 | (5) |
|
|
137 | (2) |
|
|
139 | (2) |
|
|
141 | (3) |
|
|
141 | (1) |
|
|
142 | (2) |
|
|
144 | (5) |
Chapter 7 S/MIME |
|
149 | (26) |
|
|
149 | (3) |
|
|
152 | (18) |
|
|
153 | (9) |
|
7.2.2 Cryptographic Algorithms |
|
|
162 | (4) |
|
|
166 | (1) |
|
7.2.4 Enhanced Security Services |
|
|
167 | (3) |
|
|
170 | (1) |
|
|
171 | (1) |
|
|
172 | (3) |
Chapter 8 Web-Based Messaging |
|
175 | (8) |
|
|
175 | (2) |
|
|
177 | (3) |
|
|
180 | (3) |
Chapter 9 Gateway Solutions |
|
183 | (8) |
|
|
183 | (2) |
|
9.2 Products and Solutions |
|
|
185 | (3) |
|
9.2.1 Totemomail Encryption Gateway |
|
|
186 | (1) |
|
|
187 | (1) |
|
|
188 | (3) |
Chapter 10 Certified Mail |
|
191 | (14) |
|
|
191 | (3) |
|
|
194 | (6) |
|
|
194 | (3) |
|
10.2.2 TTP-Based Solutions |
|
|
197 | (3) |
|
10.3 Message Delivery Platforms |
|
|
200 | (1) |
|
|
201 | (4) |
Chapter 11 Instant Messaging |
|
205 | (10) |
|
|
205 | (2) |
|
|
207 | (3) |
|
11.3 Off-the-Record Messaging |
|
|
210 | (3) |
|
|
213 | (2) |
Chapter 12 Research Challenges and Open Questions |
|
215 | (6) |
|
|
215 | (2) |
|
12.2 P2P Principles and Technologies |
|
|
217 | (2) |
|
12.3 New Approaches and Architectures |
|
|
219 | (2) |
Chapter 13 Conclusions and Outlook |
|
221 | (4) |
Appendix A Character Sets |
|
225 | (4) |
|
|
225 | (2) |
|
|
227 | (1) |
|
|
227 | (1) |
|
A.4 ISO/IEC 10646-1, UCS, and UTF-8 |
|
|
228 | (1) |
Appendix B Transfer Encoding Schemes |
|
229 | (8) |
|
|
229 | (1) |
|
|
230 | (4) |
|
|
234 | (1) |
|
|
235 | (2) |
Appendix C ASN.1 and Encoding Rules |
|
237 | (10) |
|
|
237 | (6) |
|
|
239 | (2) |
|
|
241 | (1) |
|
|
242 | (1) |
|
|
243 | (1) |
|
|
243 | (4) |
Appendix D Public Key Cryptography Standards |
|
247 | (4) |
Abbreviations and Acronyms |
|
251 | (6) |
About the Author |
|
257 | (2) |
Index |
|
259 | |