Synopses & Reviews
Two of the worlds top experts in cryptography teach you how to secure your digital future
In todays world, security is a top concern for businesses worldwide. Without a secure computer system, you dont make money, you dont expand, andbottom lineyou dont survive. Cryptography holds great promise as the technology to provide security in cyberspace. Amazingly enough, no literature exists about how to implement cryptography and how to incorporate it into real-world systems. With Practical Cryptography, an author team of international renown provides you with the first hands-on cryptographic product implementation guide, bridging the gap between cryptographic theory and real-world cryptographic applications.
This follow-up guide to the bestselling Applied Cryptography dives in and explains the how-to of cryptography. Youll find discussions on:
- Practical rules for choosing and using cryptographic primitives, from block ciphers to digital signatures
- Implementing cryptographic algorithms and systems in a secure way on todays computers
- A consistent design philosophy to ensure that every part of the system achieves the required security level
- Why security affects every part of the system, and why it has to be a primary goal of the project
- How simple interfaces for cryptographic primitives reduce system complexity and increase system security
Synopsis
Die Kryptographie ist die Schl sseltechnologie zur Sicherung gespeicherter und bertragener digitaler Information. Dieses Buch beschreibt die Kryptographie im Unterschied zu fast allen derzeit erh ltlichen Werken auf diesem Gebiet nicht theoretisch, sondern erl utert praktische Aspekte der Implementation.
- eine konsequent praxisorientierte Anleitung f r Systems Engineers und Techniker, kryptographische Algorithmen in Produkte einzubauen
- schl gt eine Br cke zwischen der verf gbaren theoretisch angelegten Literatur und der Praxis
- ideale Verbindung zu Applied Cryptography vom gleichen Autor; dort werden die Grundlagen der Kryptographie beschrieben
- die Autoren geh ren zu den weltbesten Fachleuten ihres Gebiets
Synopsis
Definition of Topic: Security is the # 1 concern for business worldwide. The gold standard for attaining security is cryptography because it provides THE most reliable tools for storing or transmitting digital information.
Synopsis
Security is the number one concern for businesses worldwide. The gold standard for attaining security is cryptography because it provides the most reliable tools for storing or transmitting digital information. Written by Niels Ferguson, lead cryptographer for Counterpane, Bruce Schneier's security company, and Bruce Schneier himself, this is the much anticipated follow-up book to Schneier's seminal encyclopedic reference, Applied Cryptography, Second Edition (0-471-11709-9), which has sold more than 150,000 copies.
Niels Ferguson (Amsterdam, Netherlands) is a cryptographic engineer and consultant at Counterpane Internet Security. He has extensive experience in the creation and design of security algorithms, protocols, and multinational security infrastructures. Previously, Ferguson was a cryptographer for DigiCash and CWI. At CWI he developed the first generation of off-line payment protocols. He has published numerous scientific papers.
Bruce Schneier (Minneapolis, MN) is Founder and Chief Technical Officer at Counterpane Internet Security, a managed-security monitoring company. He is also the author of Secrets and Lies: Digital Security in a Networked World (0-471-25311-1).
Synopsis
Includes bibliographical references (p. 387-395) and index.
Synopsis
Bruce Schneier (Minneapolis, MN) is Founder and Chief Technical Officer at Counterpane Internet Security, a managed-security monitoring company. He is also the author of Secrets and Lies: Digital Security in a Networked World (0-471-25311-1).
About the Author
NIELS FERGUSON is a cryptographic engineer and consultant. He has extensive experience in the design and implementation of cryptographic algorithms, protocols, and large-scale security infrastructures. Previously, Ferguson was a cryptographer for DigiCash and CWI, and he worked closely with Bruce Schneier at Counterpane Internet Security. He has published numerous scientific papers.
BRUCE SCHNEIER is founder and chief technical officer at Counterpane Internet Security, a managed-security monitoring company. A world-renowned scientist, security expert, and lecturer, he is the author of Secrets and Lies: Digital Security in a Networked World and Applied Cryptography (both from Wiley).
Table of Contents
Preface.
1. Our Design Philosophy.
2. The Context of Cryptography.
3. Introduction to Cryptography.
I Message Security.
4. Block Ciphers.
5. Block Cipher Modes.
6. Hash Functions.
7. Message Authentication Codes.
8. The Secure Channel.
9. Implementation. Issues (I).
II Key Negotiation.
10. Generating Randomness.
11. Primes.
12. Diffie-Hellman.
13. RSA.
14. Introduction to Cryptographic Protocols.
15. Negotiation Protocol.
16. Implementation Issues.
III Key Management.
17. The Clock.
18. Key Servers.
19. The Dream of PKI.
20. PKI Reality.
21. PKI Practicalities.
22. Storing Secrets.
IV Miscellaneous.
23. Standards.
24. Patents.
25. Involving Experts.
Acknowledgments.
Bibliography.
Index.