Manuel Mogollon


Manuel Mogollon has been involved in the field of cryptography since 1981, principally in the areas of encryption algorithms, product development, and academia. At AT&T Datotek, he collaborated with Datotek’s Chief Cryptographer in the development of encryption algorithms based on linear feedback shift registers and public key for several encryptor units. Mr. Mogollon coauthor of the manuscript, Statistical Methods for Key Generator Evaluation, a paper written to provide the theoretical background for a series of randomness tests that were implemented in a crypto algorithm diagnostic tool software. Mr. Mogollon has traveled extensively to many countries around the world, demonstrating from the mathematical point of view, the level of security of the different encryption algorithms used in AT&T Datotek products. He has given crypto seminars in Chile, Colombia, Egypt, Mexico, Spain, and Saudi Arabia. Currently, Mr. Mogollon is a Nortel Senior Manager and Adjunct Professor in the Graduate School of Management, Information Assurance, at the University of Dallas, Center of Academic Excellence in Information Assurance Education, where he teaches Cryptography and Network Security.

Publications

Cryptography and Security Services: Mechanisms and Applications
Manuel Mogollon. © 2008. 488 pages.
Today's information technology and security networks demand increasingly complex algorithms and cryptographic systems. Individuals implementing security policies for their...
Classic Cryptography
Manuel Mogollon. © 2008. 14 pages.
Chapters 1 and 2 cover information on classic cryptography and the aspects of information security related to security services and mechanisms. The history of cryptography and...
Information Assurance
Manuel Mogollon. © 2008. 18 pages.
The TCP/IP protocol is becoming the world standard for network and computer communications. The number of TCP/IP applications on the Internet and in corporate networks is...
Number Theory and Finite Fields
Manuel Mogollon. © 2008. 18 pages.
Mathematics plays an important role in encryption, public-key, authentication, and digital signatures. Knowing certain basic math concepts such as counting techniques...
Confidentiality: Symmetric Encryption
Manuel Mogollon. © 2008. 50 pages.
In the world of communications, assurance is sought that (1) a message is not accidentally or deliberately modified in transit by replacement, insertion, or deletion; (2) the...
Confidentiality: Asymmertic Encrypton
Manuel Mogollon. © 2008. 21 pages.
Asymmetric encryption is a form of cryptography in which one key is used to encipher and the other to decipher. The two keys are mathematically related, and if it is possible to...
Integrity and Authentication
Manuel Mogollon. © 2008. 30 pages.
In this chapter, methods that can check if a message was modified are explained; this includes the Message Authentication Code (MAC), hash functions, and the Keyed-Hash Message...
Access Authentication
Manuel Mogollon. © 2008. 37 pages.
Unless a corporation can reliably authenticate its network users, it is not possible to keep unauthorized users out of its networks. Authentication is essential for two parties...
Elliptic Curve Cryptograpy
Manuel Mogollon. © 2008. 28 pages.
For the same level of security that public-key cryptosystems such as RSA have, elliptic curve cryptography (ECC) offers the benefit of smaller key sizes, hence smaller memory and...
Certificates and Public Key Infrastructure
Manuel Mogollon. © 2008. 29 pages.
In public-key encryption, the secrecy of the public key is not required, but the authenticity of the public key is necessary to guarantee its integrity and to avoid spoofing and...
Electronic Mail Security
Manuel Mogollon. © 2008. 20 pages.
In previous chapters of this book, crypto systems, security mechanisms, and security services have been discussed and reviewed as separate crypto modules. In Chapters 10 to 14...
VPNS and IPSEC
Manuel Mogollon. © 2008. 34 pages.
Virtual private networks (VPN) and IPsec are discussed in this chapter. A VPN emulates a private wide area network (WAN) facility using IP networks, such as the public Internet...
TLS, SSL, and SET
Manuel Mogollon. © 2008. 34 pages.
In an Internet commercial transaction, the secure Web server and the buyer’s computer authenticate each other and encipher the data transmitted using transport layer security...
Web Services Security
Manuel Mogollon. © 2008. 75 pages.
A service is an application offered by an organization that can be accessed through a programmable interface. Web services allow computers running on different operating...
Wireless Security
Manuel Mogollon. © 2008. 38 pages.
The nature of wireless is that of a physically open medium which makes authentication, access control, and confidentiality necessary in the implementation of a wireless LAN....