Cryptography for Developers
Elsevier, 1.12.2006 г. - 400 страници
The only guide for software developers who must learn and implement cryptography safely and cost effectively.
Cryptography for Developers begins with a chapter that introduces the subject of cryptography to the reader. The second chapter discusses how to implement large integer arithmetic as required by RSA and ECC public key algorithms The subsequent chapters discuss the implementation of symmetric ciphers, one-way hashes, message authentication codes, combined authentication and encryption modes, public key cryptography and finally portable coding practices. Each chapter includes in-depth discussion on memory/size/speed performance trade-offs as well as what cryptographic problems are solved with the specific topics at hand.
0Xaa 16 bytes array attacker authentication big endian bits block cipher BOOLEAN buffer cache CBC-MAC chapter ciphertext CMAC compression compute const unsigned char CONST64 CRYPT_OK cryptographic CTR mode cycles data types decode decryption define digits Elliptic Curve encoding encrypt entropy example Figure hash function header HMAC implementation inlen input INTEGER key derivation function key schedule keylen LFSR LibTomCrypt loop LTC_FAST_TYPE MAC functions MAC tag macro Message Authentication Code message digest MixColumns modulo Montgomery Reduction multiplication NIST nonce NULL operations Opteron optimization outlen output Oxaa padding param password payload length perform PKCS plaintext platforms pool PRNG processors public key algorithms random return err secret key seed SEQUENCE simply sizeof skey specifies standard stream->channels SubBytes taglen ulong32 unrolling unsigned long void words zero