Everyday Cryptography: Fundamental Principles and Applications, 2nd Edition
- Length: 720 pages
- Edition: 2
- Language: English
- Publisher: Oxford University Press
- Publication Date: 2017-08-01
- ISBN-10: 0198788010
- ISBN-13: 9780198788010
- Sales Rank: #1382618 (See Top 100 Books)
Cryptography is a vital technology that underpins the security of information in computer networks. This book presents a comprehensive introduction to the role that cryptography plays in providing information security for everyday technologies such as the Internet, mobile phones, Wi-Fi networks, payment cards, Tor, and Bitcoin.
This book is intended to be introductory, self-contained, and widely accessible. It is suitable as a first read on cryptography. Almost no prior knowledge of mathematics is required since the book deliberately avoids the details of the mathematics techniques underpinning cryptographic mechanisms. Instead our focus will be on what a normal user or practitioner of information security needs to know about cryptography in order to understand the design and use of everyday cryptographic applications.
By focusing on the fundamental principles of modern cryptography rather than the technical details of current cryptographic technology, the main part this book is relatively timeless, and illustrates the application of these principles by considering a number of contemporary applications of cryptography. Following the revelations of former NSA contractor Edward Snowden, the book considers the wider societal impact of use of cryptography and strategies for addressing this.
A reader of this book will not only be able to understand the everyday use of cryptography, but also be able to interpret future developments in this fascinating and crucially important area of technology.
Table of Contents
Part I Setting the Scene
Chapter 1 Basic Principles
Chapter 2 Historical Cryptosystems
Chapter 3 Theoretical Versus Practical Security
Part II The Cryptographic Toolkit
Chapter 4 Symmetric Encryption
Chapter 5 Public-Key Encryption
Chapter 6 Data Integrity
Chapter 7 Digital Signature Schemes
Chapter 8 Entity Authentication
Chapter 9 Cryptographic Protocols
Part III Key Management
Chapter 10 Key Management
Chapter 11 Public-Key Management
Part IV Use of Cryptography
Chapter 12 Cryptographic Applications
Chapter 13 Cryptography For Personal Devices
Chapter 14 Control Of Cryptography
Chapter 15 Closing Remarks