+353-1-416-8900REST OF WORLD
+44-20-3973-8888REST OF WORLD
1-917-300-0470EAST COAST U.S
1-800-526-8630U.S. (TOLL FREE)


Practical Cryptography

  • ID: 2249937
  • Book
  • April 2003
  • 432 Pages
  • John Wiley and Sons Ltd
1 of 3
Two of the world’s top experts in cryptography teach you how to secure your digital future

In today’s world, security is a top concern for businesses worldwide. Without a secure computer system, you don’t make money, you don’t expand, and bottom line you don’t survive. Cryptography holds great promise as the technology to provide security in cyberspace. Amazingly enough, no literature exists about how to implement cryptography and how to incorporate it into real–world systems. With Practical Cryptography, an author team of international renown provides you with the first hands–on cryptographic product implementation guide, bridging the gap between cryptographic theory and real–world cryptographic applications.

This follow–up guide to the bestselling Applied Cryptography dives in and explains the how–to of cryptography. You’ll find discussions on:

  • Practical rules for choosing and using cryptographic primitives, from block ciphers to digital signatures
  • Implementing cryptographic algorithms and systems in a secure way on today’s computers
  • A consistent design philosophy to ensure that every part of the system achieves the required security level
  • Why security affects every part of the system, and why it has to be a primary goal of the project
  • How simple interfaces for cryptographic primitives reduce system complexity and increase system security
Note: Product cover images may vary from those shown
2 of 3

1. Our Design Philosophy.

2. The Context of Cryptography.

3. Introduction to Cryptography.

I  Message Security.

4. Block Ciphers.

5. Block Cipher Modes.

6. Hash Functions.

7. Message Authentication Codes.

8. The Secure Channel.

9. Implementation. Issues (I).

II  Key Negotiation.

10. Generating Randomness.

11. Primes.

12. Diffie–Hellman.

13. RSA.

14. Introduction to Cryptographic Protocols.

15. Negotiation Protocol.

16. Implementation Issues.

III  Key Management.

17. The Clock.

18. Key Servers.

19. The Dream of PKI.

20. PKI Reality.

21. PKI Practicalities.

22. Storing Secrets.

IV  Miscellaneous.

23. Standards.

24. Patents.

25. Involving Experts.




Note: Product cover images may vary from those shown
3 of 3
Niels Ferguson
Bruce Schneier
Note: Product cover images may vary from those shown