Serious Cryptography: A Practical Introduction to Modern Encryption

Предна корица
No Starch Press, 21.11.2017 г. - 312 страници
This practical guide to modern encryption breaks down the fundamental mathematical concepts at the heart of cryptography without shying away from meaty discussions of how they work. You’ll learn about authenticated encryption, secure randomness, hash functions, block ciphers, and public-key techniques such as RSA and elliptic curve cryptography.

You’ll also learn:
- Key concepts in cryptography, such as computational security, attacker models, and forward secrecy
- The strengths and limitations of the TLS protocol behind HTTPS secure websites
- Quantum computation and post-quantum cryptography
- About various vulnerabilities by examining numerous code examples and use cases
- How to choose the best algorithm or protocol and ask vendors the right questions

Each chapter includes a discussion of common implementation mistakes using real-world examples and details what could go wrong and how to avoid these pitfalls. 

Whether you’re a seasoned practitioner or a beginner looking to dive into the field, Serious Cryptography will provide a complete survey of modern encryption and its applications.
 

Избрани страници

Съдържание

The OneTime
7
Asymmetric Encryption
15
How Things Can Go Wrong
18
Cryptographic vs NonCryptographic PRNGS
27
3
39
Achieving Security
46
4
53
How to Construct Block Ciphers
55
An Authenticated Cipher Faster than GCM
155
9
162
Complexity Classes
168
The Discrete Logarithm Problem
174
RSA
181
Signing with RSA
188
11
201
ELLIPTIC CURVES
217

How Things Can Go Wrong
72
How Stream Ciphers Work
78
SoftwareOriented Stream Ciphers
91
How Things Can Go Wrong
100
Secure Hash Functions
106
7
127
AUTHENTICATED ENCRYPTION
145
The ECDLP Problem
224
How Things Can Go Wrong
231
14
251
Quantum SpeedUp
257
Index
271
Авторско право

Други издания - Преглед на всички

Често срещани думи и фрази

Информация за автора (2017)

Jean-Philippe Aumasson is Principal Research Engineer at Kudelski Security, an international cybersecurity company based in Switzerland. He has authored more than 40 research ­articles in the field of cryptography and cryptanalysis and designed the widely used hash functions BLAKE2 and SipHash. He speaks regularly at information security conferences and has presented at Black Hat, DEF CON, Troopers, and ­Infiltrate.

Библиография