Skip to content

Commit d42d45a

Browse files
committed
added comments
1 parent 5f72076 commit d42d45a

File tree

5 files changed

+29
-16
lines changed

5 files changed

+29
-16
lines changed

crypto.rst

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,15 +1,15 @@
1-
Chapter 3: Cryptographic Building Blocks
2-
=================================
1+
Chapter 3: Cryptographic Primatives
2+
======================================
33

44
We introduce the concepts of cryptography-based security step by step.
55
The first step is the cryptographic algorithms—ciphers and cryptographic
6-
hashes—that are introduced in this section. They are not a solution in
6+
hashes—that are introduced in this chapter. They are not a solution in
77
themselves, but rather building blocks from which a solution can be
88
built. Cryptographic algorithms are parameterized by *keys*, and a later
9-
section then addresses the problem of distributing the keys. In the next
9+
chapter then addresses the problem of distributing the keys. In the next
1010
step, we describe how to incorporate the cryptographic building blocks
1111
into protocols that provide secure communication between participants
12-
who possess the correct keys. A final section then examines several
12+
who possess the correct keys. The final chapter then examines several
1313
complete security protocols and systems in current use.
1414

1515
3.1 Principles of Ciphers
@@ -259,7 +259,7 @@ decrypt the encrypted message, and, assuming that the result of the
259259
decryption matches the expected result, it can be concluded that the
260260
private key must have been used to perform the encryption. Exactly how
261261
this operation is used to provide authentication is the topic of a
262-
later section. As we will see, public-key ciphers are used primarily
262+
later chapter. As we will see, public-key ciphers are used primarily
263263
for authentication and to confidentially distribute secret (symmetric)
264264
keys, leaving the rest of confidentiality to secret-key ciphers.
265265

@@ -452,6 +452,6 @@ this case, the entire ciphertext message is considered to be an
452452
authenticator.
453453

454454
Although authenticators may seem to solve the authentication problem, we
455-
will see in a later section that they are only the foundation of a
455+
will see in a later chapter that they are only the foundation of a
456456
solution. First, however, we address the issue of how participants
457457
obtain keys in the first place.

intro.rst

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,11 @@
11
Chapter 1: Introduction
22
=========================
33

4+
.. This was original the Problem Statement in the full book.
5+
One thing we might do in this Introduction is talk about
6+
the Internet's history, and how the original threat model
7+
(or lack thereof) get us to where we are today.
8+
49
Computer networks are typically a shared resource used by many
510
applications representing different interests. The Internet is
611
particularly widely shared, being used by competing businesses, mutually

key-distro.rst

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -28,8 +28,8 @@ session keys and predistributed keys:
2828
session key establishment but too slow to use for encrypting entire
2929
messages for confidentiality.
3030

31-
This section explains how predistributed keys are distributed, and the
32-
next section will explain how session keys are then established. We
31+
This chapter explains how predistributed keys are distributed, and then
32+
explains how session keys are then established. We
3333
henceforth use “Alice” and “Bob” to designate participants, as is common
3434
in the cryptography literature. Bear in mind that although we tend to
3535
refer to participants in anthropomorphic terms, we are more frequently
@@ -178,7 +178,7 @@ decided these CAs and their keys can be trusted. A user can also add CAs
178178
to those that their browser recognizes as trusted. These certificates
179179
are accepted by Secure Socket Layer (SSL)/Transport Layer Security
180180
(TLS), the protocol most often used to secure Web transactions, which we
181-
discuss in a later section. (If you are curious, you can poke around in
181+
discuss in a later chapter. (If you are curious, you can poke around in
182182
the preferences settings for your browser and find the “view
183183
certificates” option to see how many CAs your browser is configured to
184184
trust.)
@@ -188,7 +188,7 @@ trust.)
188188

189189
An alternative model of trust is the *web of trust* exemplified by
190190
Pretty Good Privacy (PGP), which is further discussed in a later
191-
section. PGP is a security system for email, so email addresses are the
191+
chapter. PGP is a security system for email, so email addresses are the
192192
identities to which keys are bound and by which certificates are signed.
193193
In keeping with PGP’s roots as protection against government intrusion,
194194
there are no CAs. Instead, every individual decides whom they trust and
@@ -290,7 +290,7 @@ Bob—using the keys that the KDC already shares with each of them—and
290290
generates a new session key for them to use. Then Alice and Bob
291291
communicate directly using their session key. Kerberos is a widely used
292292
system based on this approach. We describe Kerberos (which also provides
293-
authentication) in the next section. The following subsection describes
293+
authentication) in the next chapter. The following section describes
294294
a powerful alternative.
295295

296296
4.3 Diffie-Hellman Key Exchange

systems.rst

Lines changed: 9 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,15 @@
11
Chapter 6: Example Systems
22
==============================
33

4+
.. Assuming we keep a substantial set of examples, we should look
5+
for ways to highlight the underlying open source software (and the
6+
general role open source plays in helping secure the Internet --
7+
lots of eyes on the code).
8+
49
We have now seen many of the components required to provide one or two
510
aspects of security. These components include cryptographic algorithms,
611
key predistribution mechanisms, and authentication protocols. In this
7-
section, we examine some complete systems that use these components.
12+
chapter, we examine some complete systems that use these components.
813

914
These systems can be roughly categorized by the protocol layer at which
1015
they operate. Systems that operate at the application layer include
@@ -14,7 +19,7 @@ layer, there is the IETF’s Transport Layer Security (TLS) standard and
1419
the older protocol from which it derives, Secure Socket Layer (SSL). The
1520
IPsec (IP Security) protocols, as their name implies, operate at the IP
1621
(network) layer. 802.11i provides security at the link layer of wireless
17-
networks. This section describes the salient features of each of these
22+
networks. This chapter describes the salient features of each of these
1823
approaches.
1924

2025
You might reasonably wonder why security has to be provided at so many
@@ -49,7 +54,7 @@ Pretty Good Privacy (PGP) is a widely used approach to providing
4954
security for electronic mail. It provides authentication,
5055
confidentiality, data integrity, and nonrepudiation. Originally devised
5156
by Phil Zimmerman, it has evolved into an IETF standard known as
52-
OpenPGP. As we saw in a previous section, PGP is notable for using a
57+
OpenPGP. As we saw in a previous chapter, PGP is notable for using a
5358
“web of trust” model for distribution of keys rather than a tree-like
5459
hierarchy.
5560

@@ -94,7 +99,7 @@ Bob of the level of trust he has in Alice’s public key.
9499
Email has particular characteristics that allow PGP to embed an adequate
95100
authentication protocol in this one-message data transmission protocol,
96101
avoiding the need for any prior message exchange (and sidestepping some
97-
of the complexities described in the previous section). Alice’s digital
102+
of the complexities described in the previous chapter). Alice’s digital
98103
signature suffices to authenticate her. Although there is no proof that
99104
the message is timely, legitimate email isn’t guaranteed to be timely
100105
either. There is also no proof that the message is original, but Bob is

trust.rst

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,9 @@
11
Chapter 2: Trust and Threats
22
==============================
33

4+
.. In addition to a general discussion of threats, this chapter
5+
might also identify common threat models (and attack vectors).
6+
47
Before we address the how’s and why’s of building secure networks, it is
58
important to establish one simple truth: We will inevitably fail. This
69
is because security is ultimately an exercise in making assumptions

0 commit comments

Comments
 (0)