en
James Forshaw

Attacking Network Protocols

Értesítsen, ha a könyv hozzá lesz adva
Ennek a könyvnek az olvasásához töltsön fel EPUB vagy FB2 formátumú fájlt a Bookmate-re. Hogyan tölthetek fel egy könyvet?
Ez a könyv jelenleg nem érhető el
545 nyomtatott oldalak
Már olvasta? Mit gondol róla?
👍👎

Benyomások

  • Максим Павловmegosztott egy benyomást6 évvel ezelőtt
    💡Sokat tanultam

Idézetek

  • Максим Павловidézett6 évvel ezelőtt
    To complete this hierarchy, valid certificates must contain at least four pieces of information:

    • The subject, which specifies the identity for the certificate

    • The subject’s public key

    • The issuer, which identifies the signing certificate

    • A valid signature applied over the certificate and authenticated by the issuer’s private key
  • Максим Павловidézett6 évvel ezelőtt
    X.509 certificates are used to verify web servers, sign executable programs, or authenticate to a network service. Trust is provided through a hierarchy of certificates using asymmetric signature algorithms, such as RSA and DSA.
  • Максим Павловidézett6 évvel ezelőtt
    For a hashing algorithm to be suitable for cryptographic purposes, it has to fulfill three requirements:

    Pre-image resistance Given a hash value, it should be difficult (such as by requiring a massive amount of computing power) to recover a message.

    Collision resistance It should be difficult to find two different messages that hash to the same value.

    Nonlinearity It should be difficult to create a message that hashes to any given value.

    A number of hashing algorithms are available, but the most common are members of either the Message Digest (MD) or Secure Hashing Algorithm (SHA) families. The Message Digest family includes the MD4 and MD5 algorithms, which were developed by Ron Rivest. The SHA family, which contains the SHA-1 and SHA-2 algorithms, among others, is published by NIST.

Könyvespolcokon

fb2epub
Húzza és ejtse ide a fájljait (egyszerre maximum 5-öt)