0

Cryptography Engineering

Design Principles and Practical Applications

Erschienen am 05.03.2010, 1. Auflage 2010
Bibliografische Daten
ISBN/EAN: 9780470474242
Sprache: Englisch
Umfang: 353 S.
Format (T/L/B): 2 x 23.4 x 18.8 cm
Einband: kartoniertes Buch

Beschreibung

InhaltsangabePreface to Cryptography Engineering. Preface to Practical Cryptography (the 1st Edition). Part I Introduction. Chapter 1 The Context of Cryptography. Chapter 2 Introduction to Cryptography. Part II Message Security. Chapter 3 Block Ciphers. Chapter 4 Block Cipher Modes. Chapter 5 Hash Functions. Chapter 6 Message Authentication Codes. Chapter 7 The Secure Channel. Chapter 8 Implementation Issues (I). Part III Key Negotiation. Chapter 9 Generating Randomness. Chapter 10 Primes. Chapter 11 Diffie-Hellman. Chapter 12 RSA. Chapter 13 Introduction to Cryptographic Protocols. Chapter 14 Key Negotiation. Chapter 15 Implementation Issues (II). Part IV Key Management. Chapter 16 The Clock. Chapter 17 Key Servers. Chapter 18 The Dream of PKI. Chapter 19 PKI Reality. Chapter 20 PKI Practicalities. Chapter 21 Storing Secrets. Part V Miscellaneous. Chapter 22 Standards and Patents. Chapter 23 Involving Experts. Bibliography. Index.

Produktsicherheitsverordnung

Hersteller:
Wiley-VCH GmbH
[email protected]
Boschstr. 12
DE 69469 Weinheim

Autorenportrait

Niels Ferguson is a cryptographer for Microsoft who has designed and implemented cryptographic algorithms, protocols, and large-scale security infrastructures. Bruce Schneier is an internationally renowned security technologist whose advice is sought by business, government, and the media. He is the author of Applied Cryptography, Secrets and Lies, and Schneier on Security. Tadayoshi Kohno is a professor at the University of Washington. He is known for his research and for developing innovative new approaches to cryptography and computer security education.

Leseprobe

Leseprobe

Inhalt

Preface to Cryptography Engineering. Preface to Practical Cryptography (the 1st Edition). Part I Introduction. Chapter 1 The Context of Cryptography. Chapter 2 Introduction to Cryptography. Part II Message Security. Chapter 3 Block Ciphers. Chapter 4 Block Cipher Modes. Chapter 5 Hash Functions. Chapter 6 Message Authentication Codes. Chapter 7 The Secure Channel. Chapter 8 Implementation Issues (I). Part III Key Negotiation. Chapter 9 Generating Randomness. Chapter 10 Primes. Chapter 11 Diffie-Hellman. Chapter 12 RSA. Chapter 13 Introduction to Cryptographic Protocols. Chapter 14 Key Negotiation. Chapter 15 Implementation Issues (II). Part IV Key Management. Chapter 16 The Clock. Chapter 17 Key Servers. Chapter 18 The Dream of PKI. Chapter 19 PKI Reality. Chapter 20 PKI Practicalities. Chapter 21 Storing Secrets. Part V Miscellaneous. Chapter 22 Standards and Patents. Chapter 23 Involving Experts. Bibliography. Index.