In today’s world, security is a top concern for businesses worldwide. Without a secure computer system, you don’t make money, you don’t expand, and bottom line you don’t survive. Cryptography holds great promise as the technology to provide security in cyberspace. Amazingly enough, no literature exists about how to implement cryptography and how to incorporate it into real–world systems. With Practical Cryptography, an author team of international renown provides you with the first hands–on cryptographic product implementation guide, bridging the gap between cryptographic theory and real–world cryptographic applications.
This follow–up guide to the bestselling Applied Cryptography dives in and explains the how–to of cryptography. You’ll find discussions on:
- Practical rules for choosing and using cryptographic primitives, from block ciphers to digital signatures
- Implementing cryptographic algorithms and systems in a secure way on today’s computers
- A consistent design philosophy to ensure that every part of the system achieves the required security level
- Why security affects every part of the system, and why it has to be a primary goal of the project
- How simple interfaces for cryptographic primitives reduce system complexity and increase system security
1. Our Design Philosophy.
2. The Context of Cryptography.
3. Introduction to Cryptography.
I Message Security.
4. Block Ciphers.
5. Block Cipher Modes.
6. Hash Functions.
7. Message Authentication Codes.
8. The Secure Channel.
9. Implementation. Issues (I).
II Key Negotiation.
10. Generating Randomness.
14. Introduction to Cryptographic Protocols.
15. Negotiation Protocol.
16. Implementation Issues.
III Key Management.
17. The Clock.
18. Key Servers.
19. The Dream of PKI.
20. PKI Reality.
21. PKI Practicalities.
22. Storing Secrets.
25. Involving Experts.
BRUCE SCHNEIER is founder and chief technical officer at Counterpane Internet Security, a managed–security monitoring company. A world–renowned scientist, security expert, and lecturer, he is the author of Secrets and Lies: Digital Security in a Networked World and Applied Cryptography (both from Wiley).