Title : | Cryptography engineering : design principles and practical applications |
Material Type: | printed text |
Authors: | Niels Ferguson, Author ; Bruce Schneier, Author |
Publisher: | Indianapolis, IN : Wiley Pub. Inc |
Publication Date: | 2010 |
Pagination: | xxix, 353 p. |
Layout: | ill. |
Size: | 24 cm |
ISBN (or other code): | 978-0-470-47424-2 |
General note: | Includes bibliographical references (p. 327)
Includes index (p. 339) |
Languages : | English (eng) Original Language : English (eng) |
Descriptors: | Computer security Cryptography
|
Class number: | 005.82 |
Abstract: | Learn to build cryptographic protocols that work in the real world. Knowing how a camera works does not make you a great photographer. Knowing what cryptographic designs are and how existing cryptographic protocols work does not give you proficiency in using cryptography. You must learn to think like a cryptographer.
That is what this book will teach you. Dive deeply into specific, concrete cryptographic protocols and learn why certain decisions were made. Recognize the challenges and how to overcome them. With this book, which is suitable for both classroom and self study, you will learn to use cryptography effectively in real-world systems.
1. Understand what goes into designing cryptographic protocols
2. Develop an understanding of the interface between cryptography and the surrounding system, including people, economics, hardware, software, ethics, policy, and other aspects of the real world.
3. Look beyond the security protocol to see weaknesses in the surrounding system
4. Thwart the adversary by understanding how adversaries think
5. Learn how to build cryptography into new products |
Contents note: | Introduction; The context of cryptography; Introduction to cryptography; Message security; Block ciphers; Block cipher modes; Hash functions; Message authentication codes; The secure channel; Implementation issues; Key negotiation; Generating randomness; Primes; Diffie-Hellman; RSA; Introduction to Cryptographic Protocols; Key Negotiation; Implementation Issues; Key management; The clock; Key servers; The dream of PKI; PKI reality; PKI practicalities; Storing secrets; Miscellanious; Standards and Patents; Involving experts. |
Record link: | https://library.seeu.edu.mk/index.php?lvl=notice_display&id=17101 |