Cryptographic software solutions and how to use them.

 

By Kurt Seifried, [email protected], Copyright Kurt Seifried


This book is intended as a basic primer for people that do not know a lot (or anything as the case may be) about cryptography but are interested or concerned about it (in an actual "should I be using it, and if yes, what should I use, and how?"). The book starts with a brief set of explanations of why you might want to use cryptographic software, and how cryptography works. This is followed by chapters on the various tasks or problems you wish to solve using cryptography and which packages might be useful. The bulk of the book is practical explanations of how to install, configure and use various software packages for various situations (such as encrypting email in Windows). Sections starting with a * are done (mostly anyways).


Chapter 1 - Why use cryptographic software?

Chapter 2 - Cryptography - the simple explanation

Chapter 3 - Cryptography - the not so simple explanation

Chapter 4 - Public Key Infrastructure (PKI) explained

Chapter 5 - Using cryptographic software properly

Chapter 6 - Which cryptographic software to use?

Chapter 7 - Encrypting email in Windows 95, 98, NT and 2000

Chapter 8 - Encrypting email in Linux, BSD, and other Unices

Chapter 9 - Encrypting files and drives in Windows 95, 98, NT and 2000

Chapter 10 - Encrypting files and drives in Linux, BSD, and other Unices

Chapter 11 - Encrypting UNIX client logins (NIS, Samba, NDS, etc.)

Chapter 12 - Encrypting Windows client logins (NT Domains, NDS, etc.)

Chapter 13 - Encrypting network traffic (Virtual Private Networks) with SSH, etc.

Chapter 14 - Encrypting network traffic (Virtual Private Networks) with IPSec

Chapter 15 - Secure web serving with SSL

Chapter 16 - SSL enabling other services (such as POP and IMAP mail retrieval)

Appendix A - Software packages

Appendix B - Explanations of various popular protocols

Appendix C - Glossary

Appendix D - Further reading (books and sites)

Appendix E - RSA patent issues

Appendix F - Cryptographic export laws (US and other)

 


Back