Practical Cryptography

  • ID: 2249937
  • Book
  • 432 Pages
  • John Wiley and Sons Ltd
1 of 4
Two of the world’s top experts in cryptography teach you how to secure your digital future

In today’s world, security is a top concern for businesses worldwide. Without a secure computer system, you don’t make money, you don’t expand, and bottom line you don’t survive. Cryptography holds great promise as the technology to provide security in cyberspace. Amazingly enough, no literature exists about how to implement cryptography and how to incorporate it into real–world systems. With Practical Cryptography, an author team of international renown provides you with the first hands–on cryptographic product implementation guide, bridging the gap between cryptographic theory and real–world cryptographic applications.

This follow–up guide to the bestselling Applied Cryptography dives in and explains the how–to of cryptography. You’ll find discussions on:

  • Practical rules for choosing and using cryptographic primitives, from block ciphers to digital signatures
  • Implementing cryptographic algorithms and systems in a secure way on today’s computers
  • A consistent design philosophy to ensure that every part of the system achieves the required security level
  • Why security affects every part of the system, and why it has to be a primary goal of the project
  • How simple interfaces for cryptographic primitives reduce system complexity and increase system security
Note: Product cover images may vary from those shown
2 of 4

1. Our Design Philosophy.

2. The Context of Cryptography.

3. Introduction to Cryptography.

I  Message Security.

4. Block Ciphers.

5. Block Cipher Modes.

6. Hash Functions.

7. Message Authentication Codes.

8. The Secure Channel.

9. Implementation. Issues (I).

II  Key Negotiation.

10. Generating Randomness.

11. Primes.

12. Diffie–Hellman.

13. RSA.

14. Introduction to Cryptographic Protocols.

15. Negotiation Protocol.

16. Implementation Issues.

III  Key Management.

17. The Clock.

18. Key Servers.

19. The Dream of PKI.

20. PKI Reality.

21. PKI Practicalities.

22. Storing Secrets.

IV  Miscellaneous.

23. Standards.

24. Patents.

25. Involving Experts.




Note: Product cover images may vary from those shown
3 of 4


4 of 4
NIELS FERGUSON is a cryptographic engineer and consultant. He has extensive experience in the design and implementation of cryptographic algorithms, protocols, and large–scale security infrastructures. Previously, Ferguson was a cryptographer for DigiCash and CWI, and he worked closely with Bruce Schneier at Counterpane Internet Security. He has published numerous scientific papers.

BRUCE SCHNEIER is founder and chief technical officer at Counterpane Internet Security, a managed–security monitoring company. A world–renowned scientist, security expert, and lecturer, he is the author of Secrets and Lies: Digital Security in a Networked World and Applied Cryptography (both from Wiley).

Note: Product cover images may vary from those shown
5 of 4
Note: Product cover images may vary from those shown