Cryptography Engineering: Design Principles and Practical Applications / Edition 1

Cryptography Engineering: Design Principles and Practical Applications / Edition 1

by Niels Ferguson, Bruce Schneier, Tadayoshi Kohno
     
 

Learn to build cryptographic protocols that work in the real world

Knowing how a camera works does not make you a great photographer. Knowing what cryptographic designs are and how existing cryptographic protocols work does not give you proficiency in using cryptography. You must learn to think like a cryptographer.

That is what this book will teach you.

See more details below

Overview

Learn to build cryptographic protocols that work in the real world

Knowing how a camera works does not make you a great photographer. Knowing what cryptographic designs are and how existing cryptographic protocols work does not give you proficiency in using cryptography. You must learn to think like a cryptographer.

That is what this book will teach you. Dive deeply into specific, concrete cryptographic protocols and learn why certain decisions were made. Recognize the challenges and how to overcome them. With this book, which is suitable for both classroom and self-study, you will learn to use cryptography effectively in real-world systems.

  • Understand what goes into designing cryptographic protocols
  • Develop an understanding of the interface between cryptography and the surrounding system, including people, economics, hardware, software, ethics, policy, and other aspects of the real world
  • Look beyond the security protocol to see weaknesses in the surrounding system
  • Thwart the adversary by understanding how adversaries think
  • Learn how to build cryptography into new products

Read More

Product Details

ISBN-13:
9780470474242
Publisher:
Wiley
Publication date:
03/08/2010
Pages:
384
Sales rank:
477,004
Product dimensions:
7.30(w) x 9.10(h) x 0.60(d)

Table of Contents

Preface to Cryptography Engineering.

Preface to Practical Cryptography (the 1st Edition).

Part I Introduction.

Chapter 1 The Context of Cryptography.

Chapter 2 Introduction to Cryptography.

Part II Message Security.

Chapter 3 Block Ciphers.

Chapter 4 Block Cipher Modes.

Chapter 5 Hash Functions.

Chapter 6 Message Authentication Codes.

Chapter 7 The Secure Channel.

Chapter 8 Implementation Issues (I).

Part III Key Negotiation.

Chapter 9 Generating Randomness.

Chapter 10 Primes.

Chapter 11 Diffie-Hellman.

Chapter 12 RSA.

Chapter 13 Introduction to Cryptographic Protocols.

Chapter 14 Key Negotiation.

Chapter 15 Implementation Issues (II).

Part IV Key Management.

Chapter 16 The Clock.

Chapter 17 Key Servers.

Chapter 18 The Dream of PKI.

Chapter 19 PKI Reality.

Chapter 20 PKI Practicalities.

Chapter 21 Storing Secrets.

Part V Miscellaneous.

Chapter 22 Standards and Patents.

Chapter 23 Involving Experts.

Bibliography.

Index.

Read More

Customer Reviews

Average Review:

Write a Review

and post it to your social network

     

Most Helpful Customer Reviews

See all customer reviews >