.NET Security and Cryptography

by ;
Edition: 1st
Format: Paperback
Pub. Date: 2003-08-18
Publisher(s): Prentice Hall
List Price: $54.99

Rent Book

Select for Price
There was a problem. Please try again later.

New Book

We're Sorry
Sold Out

Used Book

We're Sorry
Sold Out

eBook

We're Sorry
Not Available

Summary

Text provides coverage of implementing cryptography and security in the .NET platform. Demonstrates standard encryption algorithms and new techniques of XML encryption and XML signatures. Includes examples with detailed explanations of how the code works. For developers. Softcover. DLC: Computer security.

Author Biography

Peter Thorsteinson is a systems analyst who has been programming, teaching, and developing instructional materials for software development for more than 10 years G. Gnana Arun Ganesh is a developer, author, and .NET consultant

Table of Contents

Prefacep. xiii
Acknowledgmentsp. xvii
About This Seriesp. xviii
.NET Cryptography and Securityp. 1
The Nature of This Bookp. 2
The Nature of Cryptography and Securityp. 5
Windows Security Comes of Agep. 12
The .NET Framework and the CLRp. 14
.NET Cryptography Programmingp. 17
.NET Security Programmingp. 18
Summaryp. 19
Fundamentals of Cryptographyp. 21
Security and Keeping Secretsp. 22
Steganographyp. 47
Modern Ciphersp. 49
Cryptanalytic Attacksp. 60
Issues in Human Interaction and Trustp. 61
Summaryp. 63
Symmetric Cryptographyp. 65
Symmetric Ciphersp. 65
Programming with .NET Symmetric Cryptographyp. 79
Key Exchange Issuesp. 92
Summaryp. 98
Asymmetric Cryptographyp. 99
Problems with Symmetric Algorithmsp. 99
The Idea Behind Asymmetric Cryptographyp. 102
Existing Asymmetric Algorithmsp. 108
RSA: The Most Used Asymmetric Algorithmp. 109
Caveat: Provability Issuesp. 113
Programming with .NET Asymmetric Cryptographyp. 114
Digital Certificatesp. 124
Summaryp. 125
Digital Signaturesp. 127
Hash Algorithmsp. 127
How Digital Signatures Workp. 135
RSA Used as a Digital Signature Algorithmp. 137
The Digital Signature Algorithmp. 141
The Asymmetric AlgorithmHierarchy Class Hierarchyp. 147
Summaryp. 152
XML Cryptographyp. 153
XML Encryptionp. 154
XML Signaturesp. 178
Combining XML Signing and XML Encryptionp. 190
Summaryp. 191
.NET User-Based Securityp. 193
Authentication and Authorizationp. 194
.NET Security Modelp. 195
Administrating Windows Securityp. 196
Administrating .NET Securityp. 201
Permissionsp. 202
User-Based Securityp. 208
Two Approaches to User-Based Securityp. 218
Credentialsp. 226
Security Disciplinep. 228
Summaryp. 228
NET Code Access Securityp. 229
The Need for Code Access Securityp. 229
Security, Managed Code, and the CLRp. 235
How CAS Is Usedp. 237
Managing Security Policy with Code Groupsp. 239
Imperative Versus Declarative CASp. 257
Evidence-Based Securityp. 258
Code Access Permissionsp. 271
Declarative Code Access Permissionsp. 284
Permission Requestsp. 287
Permission Setsp. 289
Summaryp. 300
ASP.NET Securityp. 301
Fundamental Security Mechanismsp. 302
Implementing ASP.NET Authenticationp. 303
ASP.NET Configurationp. 304
Forms Authenticationp. 312
Forms Authentication Classesp. 322
Passport Authenticationp. 325
Implementing ASP.NET Authorizationp. 336
Implementing ASP.NET Impersonationp. 339
Summaryp. 339
Web Services Securityp. 341
Basic Techniques in Securing Web Servicesp. 342
Authenticate Web Service Using Soapheaderp. 350
Summaryp. 379
A Security Attack Example: The Stack Overrunp. 381
How the RSA Cipher Worksp. 387
Modular Arithmeticp. 387
The BigRSA Example Programp. 388
The CrackRSAWorkFactorDemo Example Programp. 391
Using the GNU GMP Libraryp. 395
Installing Cygwinp. 395
Testing Your Cygwin Installationp. 401
Installing GMPp. 403
Uninstalling Cygwinp. 406
Cryptography and Security Resourcesp. 407
Background Knowledge and Conceptual Booksp. 407
Cryptographic Mathematics Booksp. 408
Implementing Security Guide Booksp. 409
Human Interest Books on Cryptographyp. 410
Cryptography News Groupsp. 410
Useful Cryptographic and Security Web Sitesp. 411
Exploring Web Servicesp. 413
Motivation for Web Servicesp. 414
Web Services Definitionp. 415
Backbones of Web Servicesp. 415
Next Generation of Distributed Computing: Web Servicesp. 416
Code Model for Web Servicesp. 420
Developing a Simple Concatenate Web Servicep. 420
Protocolsp. 433
Accessing a Web Servicep. 434
Asynchronous Programming in Web Servicesp. 437
Creating an ASP.NET Calculator Web Servicep. 438
Web Services Are Still Evolvingp. 442
Summaryp. 442
Indexp. 443
Table of Contents provided by Ingram. All Rights Reserved.

Excerpts

Over the last several years, security and cryptography technologies have been continually increasing in importance to Windows users and software developers. Additionally, in some respects the security and cryptographic capabilities of 32-bit Windows has reached parity with larger mini and mainframe computing platforms, where security has always been a major priority. Now, with the advent of .NET, these security capabilities have become much easier to implement than ever before. Of course, a significant investment in effort is still required in understanding the concepts and acquiring the skills necessary to leverage the many security features provided by .NET. Indeed, that is exactly what this book is all about. Although much of the same functionality was provided in the form of an arcane Win32 C Windows library, the advent of .NET has made security and cryptography programming much simpler and much more powerful than ever before. The .NET Security Framework provides a powerful set of security and cryptographic classes that are relatively easy to use, and this framework is explored throughout this book.This book is intended to provide a practical and comprehensive coverage on implementing both cryptography and security functionality on the .NET platform. It is an effective tutorial, providing a large number of clear and focused code examples. OrganizationThe book is organized into 10 chapters and five appendixes. Chapter 1 introduces cryptography and security on the .NET platform and provides a nontechnical overview of the topics that are described in greater detail in subsequent chapters. This first chapter also provides the reasoning behind the layout of the book and how the two main topics of cryptography and security interrelate. The purpose of this chapter is not to provide significant depth or code examples, but rather to convey conceptual understanding and to provide an overview of cryptography and security technologies on the .NET platform. Chapter 2 provides a solid theoretical background to promote a deeper insight into all subsequent chapters. The point is made that all security is based on cryptography, and, to understand cryptography in a meaningful way, it is necessary to first understand several basic theoretical cryptographic concepts. Chapters 3, 4, 5, and 6 provide detailed hands-on .NET programming examples, using symmetric algorithms, asymmetric algorithms, digital signatures, and XML cryptography, respectively. Chapters 7 and 8 cover .NET programming with user-based security and code access security, respectively. Chapter 9 introduces ASP.NET security programming, and chapter 10 introduces .NET Web Services security programming.Each aspect of .NET cryptography and security is dealt with in the proper context and sequence, where they are most relevant and most easily understood. Appendixes describe a few additional topics, such as security attacks and additional cryptography-related mathematical topics.This book is intended to be a practical tutorial with many succinct programming examples that focus on specific and individual concepts. Also, the focus of the book is on practical .NET security programming rather than on administrative security tasks. This book provides sufficient background information to enable the reader to clearly see why security and cryptography are critically important to modern software development. The goal is to equip the reader to begin building significant applications using the .NET Security Framework. This book is part of The Integrated .NET Series from Object Innovations and Prentice Hall PTR. Sample ProgramsThe best way to learn about a significant class library such as the .NET Security Framework is to read and write many programs. This book provides many small programs that illustrate each of the pertinent features of .NET in isolation, which makes them easier to understand. The programs are clearly labeled in the

An electronic version of this book is available through VitalSource.

This book is viewable on PC, Mac, iPhone, iPad, iPod Touch, and most smartphones.

By purchasing, you will be able to view this book online, as well as download it, for the chosen number of days.

Digital License

You are licensing a digital product for a set duration. Durations are set forth in the product description, with "Lifetime" typically meaning five (5) years of online access and permanent download to a supported device. All licenses are non-transferable.

More details can be found here.

A downloadable version of this book is available through the eCampus Reader or compatible Adobe readers.

Applications are available on iOS, Android, PC, Mac, and Windows Mobile platforms.

Please view the compatibility matrix prior to purchase.