Web page for the book 'Guide to Internet Cryptography'

This page is still under construction.

This page contains aditional accompanying material for my book 'Guide to Internet Cryptography'. I intent to make all Figures from the book available for use in course material, to provide answeers for the 'Problems' sections of the different chapters, to update existing and provide new material, including new chapters.

Figures from the book

Figures from Chapter 1 - The Internet
Figures from Chapter 2 - Cryptography: Confidentiality
Figures from Chapter 3 - Cryptography: Integrity and Authenticity
Figures from Chapter 4 - Cryptographic Protocols
Figures from Chapter 5 - Point-to-Point Security
Figures from Chapter 6 - Wireless LAN (WLAN)
Figures from Chapter 7 - Cellular Networks
Figures from Chapter 8 - IP Security (IPsec)
Figures from Chapter 9 - Security of HTTP
Figures from Chapter 10 - Transport Layer Security
Figures from Chapter 11 - A Short History of TLS
Figures from Chapter 12 - Attacks on SSL and TLS
Figures from Chapter 13 - Secure Shell (SSH)
Figures from Chapter 14 - Kerberos
Figures from Chapter 15 - DNS Security
Figures from Chapter 16 - File Encryption: PGP
Figures from Chapter 17 - Email Security: S/MIME
Figures from Chapter 18 - Attacks on S/MIME and OpenPGP
Figures from Chapter 19 - Email: Protocols and SPAM
Figures from Chapter 20 - Web Security and Single Sign-On Protcols
Figures from Chapter 21 - Cryptographic Data Formats

Solutions to the problems from the book

Solutions to the problems from Chapter 1 - The Internet
Solutions to the problems from Chapter 2 - Cryptography: Confidentiality