Cryptography Engineering: Design Principles and Practical Applications Front Cover

Cryptography Engineering: Design Principles and Practical Applications

  • Length: 384 pages
  • Edition: 1
  • Publisher:
  • Publication Date: 2010-03-15
  • ISBN-10: 0470474246
  • ISBN-13: 9780470474242
  • Sales Rank: #92300 (See Top 100 Books)
Description

The ultimate guide to cryptography, updated from an author team of the world’s top cryptography experts. Cryptography is vital to keeping information safe, in an era when the formula to do so becomes more and more challenging. Written by a team of world-renowned cryptography experts, this essential guide is the definitive introduction to all major areas of cryptography: message security, key negotiation, and key management. You’ll learn how to think like a cryptographer. You’ll discover techniques for building cryptography into products from the start and you’ll examine the many technical changes in the field. After a basic overview of cryptography and what it means today, this indispensable resource covers such topics as block ciphers, block modes, hash functions, encryption modes, message authentication codes, implementation issues, negotiation protocols, and more. Helpful examples and hands-on exercises enhance your understanding of the multi-faceted field of cryptography. An author team of internationally recognized cryptography experts updates you on vital topics in the field of cryptography Shows you how to build cryptography into products from the start Examines updates and changes to cryptography Includes coverage on key servers, message security, authentication codes, new standards, block ciphers, message authentication codes, and more Cryptography Engineering gets you up to speed in the ever-evolving field of cryptography.

Table of Contents

Part I: Introduction
Chapter 1: The Context of Cryptography
Chapter 2: Introduction to Cryptography

Part II: Message Security
Chapter 3: Block Ciphers
Chapter 4: Block Cipher Modes
Chapter 5: Hash Functions
Chapter 6: Message Authentication Codes
Chapter 7: The Secure Channel
Chapter 8: Implementation Issues (I)

Part III: Key Negotiation
Chapter 9: Generating Randomness
Chapter 10: Primes
Chapter 11: Diffie-Hellman
Chapter 12: RSA
Chapter 13: Introduction to Cryptographic Protocols
Chapter 14: Key Negotiation
Chapter 15: Implementation Issues (II)

Part IV: Key Management
Chapter 16: The Clock
Chapter 17: Key Servers
Chapter 18: The Dream of PKI
Chapter 19: PKI Reality
Chapter 20: PKI Practicalities
Chapter 21: Storing Secrets

Part V: Miscellaneous
Chapter 22: Standards and Patents
Chapter 23: Involving Experts

To access the link, solve the captcha.