Serious Cryptography: A Practical Introduction to Modern EncryptionNo Starch Press, 21.11.2017 г. - 312 страници This practical guide to modern encryption breaks down the fundamental mathematical concepts at the heart of cryptography without shying away from meaty discussions of how they work. You’ll learn about authenticated encryption, secure randomness, hash functions, block ciphers, and public-key techniques such as RSA and elliptic curve cryptography. You’ll also learn: - Key concepts in cryptography, such as computational security, attacker models, and forward secrecy - The strengths and limitations of the TLS protocol behind HTTPS secure websites - Quantum computation and post-quantum cryptography - About various vulnerabilities by examining numerous code examples and use cases - How to choose the best algorithm or protocol and ask vendors the right questions Each chapter includes a discussion of common implementation mistakes using real-world examples and details what could go wrong and how to avoid these pitfalls. Whether you’re a seasoned practitioner or a beginner looking to dive into the field, Serious Cryptography will provide a complete survey of modern encryption and its applications. |
Съдържание
7 | |
Asymmetric Encryption | 15 |
How Things Can Go Wrong | 18 |
Cryptographic vs NonCryptographic PRNGS | 27 |
3 | 39 |
Achieving Security | 46 |
4 | 53 |
How to Construct Block Ciphers | 55 |
An Authenticated Cipher Faster than GCM | 155 |
9 | 162 |
Complexity Classes | 168 |
The Discrete Logarithm Problem | 174 |
RSA | 181 |
Signing with RSA | 188 |
11 | 201 |
ELLIPTIC CURVES | 217 |
How Things Can Go Wrong | 72 |
How Stream Ciphers Work | 78 |
SoftwareOriented Stream Ciphers | 91 |
How Things Can Go Wrong | 100 |
Secure Hash Functions | 106 |
7 | 127 |
AUTHENTICATED ENCRYPTION | 145 |
The ECDLP Problem | 224 |
How Things Can Go Wrong | 231 |
14 | 251 |
Quantum SpeedUp | 257 |
271 | |
Други издания - Преглед на всички
Често срещани думи и фрази
actual algorithm allows applications attack authenticated bits block cipher break bytes called certificate Chapter ciphertext client collision combination complexity compression compute construction create crypto cryptographic decrypt designed determine Diffie-Hellman discussed efficient elliptic curve encryption entropy equal equation example factoring Figure four given hard hash function implementation initial input insecure internal least length LFSR Listing look means memory mode multiple nonce NOTE operations output padding perform permutation plaintext points possible practice prime private key PRNG probability problem produce proof protocol public key quantum random require resistance result rounds scheme secret sends server shared shown shows signature simple solve specific standard stream ciphers string takes tion verify weak