Simple Steps to Data Encryption - 1st Edition - ISBN: 9780124114838, 9780124078826

Simple Steps to Data Encryption

1st Edition

A Practical Guide to Secure Computing

Authors: Peter Loshin
Paperback ISBN: 9780124114838
eBook ISBN: 9780124078826
Imprint: Syngress
Published Date: 25th April 2013
Page Count: 86
Tax/VAT will be calculated at check-out
29.95
18.99
23.95
Unavailable
Compatible Not compatible
VitalSource PC, Mac, iPhone & iPad Amazon Kindle eReader
ePub & PDF Apple & PC desktop. Mobile devices (Apple & Android) Amazon Kindle eReader
Mobi Amazon Kindle eReader Anything else

Institutional Access


Description

To the Reader

Preface. What Is This?

What Is Cryptography?

What Can Cryptography Do?

Basic Cryptographic Functions

Does “Secret” Mean the Same as “Private”?

What OS Should I Use?

How Do I Do All This Stuff?

Introduction

Chapter 1. Using Gnu Privacy Guard

1.1 Keeping Data Secret, for a Novice GnuPG User

1.2 The Simplest Example: GnuPG Symmetric Encrypting Text

1.3 Decrypting a File (Symmetric Key)

1.4 Encrypting Interactively

1.5 ASCII Armor

1.6 Command Summary and Review

1.7 Review Questions

Chapter 2. Selected FAQs on Using GnuPG

2.1 Why Use GnuPG

2.2 Why Start with the Command Line

2.3 Why Use the Command Line

2.4 Getting to the Command Line

2.5 Is GnuPG Even Installed?

2.6 GnuPG Commands and Options

2.7 Simple Examples

2.8 Options: Getting More Information

2.9 Options: Text or Binary

2.10 Command Summary and Review

2.11 Review Questions

Chapter 3. Public Keys

3.1 Getting Someone’s Public Key

3.2 Generating a Public Key

3.3 Why Two Key Pairs?

3.4 Key Length

3.5 Key Expiration and Key Revocation

3.6 Reasons for Key Revocation

3.7 Generating a Public Key Pair, Completed

3.8 Exporting a Public Key

3.9 Command Summary and Review

3.10 Review Questions

Chapter 4. Public Key Functions

4.1 Decrypting and Verifying

4.2 Web of Trust

4.3 Encrypt and Sign

4.4 Benefits of Digital Signatures

4.5 Command Summary and Review

4.6 Review Questions

Chapter 5. More About Signatures

5.1 “Decrypting” a Digital Signature

5.2 More About Signatures

5.3 Digital Signature Types

5.4 Signing and Verifying, Summarized

5.5 Review Questions

Chapter 6. Working with Public Keys

6.1 Trusting a Public Key

6.2 Using Keyservers

6.3 Review Questions

Chapter 7. Editing and Revoking a Public Key

7.1 Editing Keys

7.2 Revoking a Key

7.3 Command Summary and Review

7.4 Review Questions

Chapter 8. Security Practices and Tips

8.1 Verifying Software Downloads

8.2 Passphrases: Doing Them Right

8.3 Dangers of RAM Cache and Other System Artifacts

8.4 Full Disk Encryption

8.5 Encrypting Your System Hard Drive FAQ

Postscript

Key Features

  • Simple descriptions of actual threat scenarios
  • Simple, step-by-step instructions for securing data
  • How to use open source, time-proven and peer-reviewed cryptographic software
  • Easy-to-follow tips for safer computing
  • Unbiased and platform-independent coverage of encryption tools and techniques

Table of Contents

To the Reader

Preface. What Is This?

What Is Cryptography?

What Can Cryptography Do?

Basic Cryptographic Functions

Does “Secret” Mean the Same as “Private”?

What OS Should I Use?

How Do I Do All This Stuff?

Introduction

Chapter 1. Using Gnu Privacy Guard

1.1 Keeping Data Secret, for a Novice GnuPG User

1.2 The Simplest Example: GnuPG Symmetric Encrypting Text

1.3 Decrypting a File (Symmetric Key)

1.4 Encrypting Interactively

1.5 ASCII Armor

1.6 Command Summary and Review

1.7 Review Questions

Chapter 2. Selected FAQs on Using GnuPG

2.1 Why Use GnuPG

2.2 Why Start with the Command Line

2.3 Why Use the Command Line

2.4 Getting to the Command Line

2.5 Is GnuPG Even Installed?

2.6 GnuPG Commands and Options

2.7 Simple Examples

2.8 Options: Getting More Information

2.9 Options: Text or Binary

2.10 Command Summary and Review

2.11 Review Questions

Chapter 3. Public Keys

3.1 Getting Someone’s Public Key

3.2 Generating a Public Key

3.3 Why Two Key Pairs?

3.4 Key Length

3.5 Key Expiration and Key Revocation

3.6 Reasons for Key Revocation

3.7 Generating a Public Key Pair, Completed

3.8 Exporting a Public Key

3.9 Command Summary and Review

3.10 Review Questions

Chapter 4. Public Key Functions

4.1 Decrypting and Verifying

4.2 Web of Trust

4.3 Encrypt and Sign

4.4 Benefits of Digital Signatures

4.5 Command Summary and Review

4.6 Review Questions

Chapter 5. More About Signatures

5.1 “Decrypting” a Digital Signature

5.2 More About Signatures

5.3 Digital Signature Types

5.4 Signing and Verifying, Summarized

5.5 Review Questions

Chapter 6. Working with Public Keys

6.1 Trusting a Public Key

6.2 Using Keyservers

6.3 Review Questions

Chapter 7. Editing and Revoking a Public Key

7.1 Editing Keys

7.2 Revoking a Key

7.3 Command Summary and Review

7.4 Review Questions

Chapter 8. Security Practices and Tips

8.1 Verifying Software Downloads

8.2 Passphrases: Doing Them Right

8.3 Dangers of RAM Cache and Other System Artifacts

8.4 Full Disk Encryption

8.5 Encrypting Your System Hard Drive FAQ

Postscript

Details

No. of pages:
86
Language:
English
Copyright:
© Syngress 2013
Published:
Imprint:
Syngress
eBook ISBN:
9780124078826
Paperback ISBN:
9780124114838

About the Author

Peter Loshin

Pete Loshin writes and consults about Internet protocols and open source network technologies. Formerly on staff at BYTE Magazine, Information Security Magazine and other publications, his work appears regularly in leading trade publications and websites including CPU, Computerworld, PC Magazine, EarthWeb, Internet.com, and CNN.

Pete Loshin, Independent Consultant

Affiliations and Expertise

Internet-Standard.com, Arlington, MA, USA

Reviews

"This book couldn’t have come at a more opportune time...The message here is that everyone can benefit from protecting their information, and you should be doing it as a matter of habit in your everyday life."--Network Security, September 1 2013