A Public Key Infrastructure (PKI) binds CRYPTOgraphic public keys to physical entities
through digital certificates. A PKI includes components that issue digital certificates and
distribute certificate status information. PKI users select one or more certificate issuers as
trust anchors, and establish security services based on certificates that may be validated
using one of their trust anchors.
The use of FPGAs for CRYPTOgraphic applications is highly attractive for a variety of reasons but at the same time there are many open issues related to the general security of FPGAs. This contribution attempts to provide a state-of-the-art description of this topic. First, the advantages of reconfigurable hardware for CRYPTOgraphic applications are discussed from a systems perspective. Second, potential security problems of FPGAs are described in detail, followed by a proposal of a some countermeasure. Third, a list of open research problems is provided. Even though there have been many contributions dealing with the algorithmic
aspects of CRYPTOgraphic schemes implemented on FPGAs, this contribution appears to be the first comprehensive treatment of system and security aspects.
Sha256 Algorithm. The SHA hash functions are a set of CRYPTOgraphic hash functions designed by the National Security Agency (NSA) and published by the NIST as a U.S. Federal Information Processing Standard. SHA stands for Secure Hash Algorithm
Abstract: As industrial control systems (ICSs) have become increasingly connected and use more off-the-shelfcomponents, new vulnerabilities to cyber attacks have emerged. This tutorial looks at three types of ICSs:programmable logic controllers (PLCs), supervisory control and data acquisition (SCADA) systems, anddistributed control systems (DCSs), and then discusses security issues and remedies. This document alsoexplains the benefits and limitations of two CRYPTOgraphic solutions (digital signatures and encryption) andelaborates on the reasons for using security ICs in an ICS to support cryptography.
Kismet is an 802.11b network sniffer and network dissector. It is capable of sniffing using most wireless cards, automatic network IP block detection via UDP, ARP, and DHCP packets, Cisco equipment lists via Cisco Discovery Protocol, weak CRYPTOgraphic packet logging, and Ethereal and tcpdump compatible packet dump files. It also includes the ability to plot detected networks and estimated network ranges on downloaded maps or user supplied image files.
Kismet是一個針對IEEE802.11b無線局域網的嗅探和包分析器,支持大多數無線網卡,支持自動檢測UDP、ARP和DHCP的數據包,支持通過CDP協議檢測思科網絡設備,支持加密數據包記錄,采用與Ethereal和Tcpdump兼容的的數據包記錄文件,支持通過用戶提供地圖來檢測和評估無線網絡范圍。
Secure Programming Cookbook for C and C++ is an important new resource for developers serious about writing secure code for Unix(including Linux) and Windows environments. This essential code companion covers a wide range of topics, including safe initialization, access control, input validation, symmetric and public key cryptography, CRYPTOgraphic hashes and MACs, authentication and key exchange, PKI, random numbers, and anti-tampering.
《為Windows Vista編寫安全的代碼》,2007年出版
Providing developers with first-hand insights into design decisions and practical advice for solving real-world security issues, this authoritative guide urges developers to write more secure code on the Vista platform to support a growing customer base.
Table of Contents
Writing Secure Code for Windows Vista
Foreword
Introduction
Chapter 1 - Code Quality
Chapter 2 - User Account Control, Tokens, and Integrity Levels
Chapter 3 - Buffer Overrun Defenses
Chapter 4 - Networking Defenses
Chapter 5 - Creating Secure and Resilient
Chapter 6 - Internet Explorer 7 Defenses
Chapter 7 - CRYPTOgraphic Enhancements
Chapter 8 - Authentication and Authorization
Chapter 9 - Miscellaneous Defenses and Security-Related Technologies
Index
List of Figures
List of Tables
List of Sidebars
This standard describes a keyed-hash message authentication code (HMAC), a
mechanism for message authentication using CRYPTOgraphic hash functions. HMAC can
be used with any iterative Approved CRYPTOgraphic hash function, in combination with a
shared secret key. The CRYPTOgraphic strength of HMAC depends on the properties of the
underlying hash function. The HMAC specification in this standard is a generalization of
Internet RFC 2104, HMAC, Keyed-Hashing for Message Authentication, and ANSI
X9.71, Keyed Hash Message Authentication Code.
The Cryptography API: Next Generation(CNG) is a new and agile framework in Windows Vista, which implements an extensible provider model that allows you to load a provider by specifying the required CRYPTOgraphic algorithm rather than having to hardcode a specific provider.