Dewey Decimal005.8/2
Table Of ContentPreface. 1. Our Design Philosophy. 2. The Context of Cryptography. 3. Introduction to Cryptography. I Message Security. 4. Block Ciphers. 5. Block Cipher Modes. 6. Hash Functions. 7. Message Authentication Codes. 8. The Secure Channel. 9. Implementation. Issues (I). II Key Negotiation. 10. Generating Randomness. 11. Primes. 12. Diffie-Hellman. 13. RSA. 14. Introduction to Cryptographic Protocols. 15. Negotiation Protocol. 16. Implementation Issues. III Key Management. 17. The Clock. 18. Key Servers. 19. The Dream of PKI. 20. PKI Reality. 21. PKI Practicalities. 22. Storing Secrets. IV Miscellaneous. 23. Standards. 24. Patents. 25. Involving Experts. Acknowledgments. Bibliography. Index.
SynopsisDie Kryptographie ist die Schlüsseltechnologie zur Sicherung gespeicherter und übertragener digitaler Information. Dieses Buch beschreibt die Kryptographie im Unterschied zu fast allen derzeit erhältlichen Werken auf diesem Gebiet nicht theoretisch, sondern erläutert praktische Aspekte der Implementation. - eine konsequent praxisorientierte Anleitung für Systems Engineers und Techniker, kryptographische Algorithmen in Produkte einzubauen - schlägt eine Brücke zwischen der verfügbaren theoretisch angelegten Literatur und der Praxis - ideale Verbindung zu "Applied Cryptography" vom gleichen Autor; dort werden die Grundlagen der Kryptographie beschrieben - die Autoren gehören zu den weltbesten Fachleuten ihres Gebiets, Two of the world's top experts in cryptography teach you how to secure your digital future In today's world, security is a top concern for businesses worldwide. Without a secure computer system, you don't make money, you don't expand, and bottom line you don't survive. Cryptography holds great promise as the technology to provide security in cyberspace. Amazingly enough, no literature exists about how to implement cryptography and how to incorporate it into real-world systems. With Practical Cryptography, an author team of international renown provides you with the first hands-on cryptographic product implementation guide, bridging the gap between cryptographic theory and real-world cryptographic applications. This follow-up guide to the bestselling Applied Cryptography dives in and explains the how-to of cryptography. You'll find discussions on: Practical rules for choosing and using cryptographic primitives, from block ciphers to digital signatures Implementing cryptographic algorithms and systems in a secure way on today's computers A consistent design philosophy to ensure that every part of the system achieves the required security level Why security affects every part of the system, and why it has to be a primary goal of the project How simple interfaces for cryptographic primitives reduce system complexity and increase system security, Security is the number one concern for businesses worldwide. The gold standard for attaining security is cryptography because it provides the most reliable tools for storing or transmitting digital information., Security is the number one concern for businesses worldwide. The gold standard for attaining security is cryptography because it provides the most reliable tools for storing or transmitting digital information. Written by Niels Ferguson, lead cryptographer for Counterpane, Bruce Schneier's security company, and Bruce Schneier himself, this is the much anticipated follow-up book to Schneier's seminal encyclopedic reference, Applied Cryptography, Second Edition (0-471-11709-9), which has sold more than 150,000 copies. Niels Ferguson (Amsterdam, Netherlands) is a cryptographic engineer and consultant at Counterpane Internet Security. He has extensive experience in the creation and design of security algorithms, protocols, and multinational security infrastructures. Previously, Ferguson was a cryptographer for DigiCash and CWI. At CWI he developed the first generation of off-line payment protocols. He has published numerous scientific papers. Bruce Schneier (Minneapolis, MN) is Founder and Chief Technical Officer at Counterpane Internet Security, a managed-security monitoring company. He is also the author of Secrets and Lies: Digital Security in a Networked World (0-471-25311-1).
LC Classification NumberQA76.825