Op werkdagen voor 23:00 besteld, morgen in huis Gratis verzending vanaf €20

Applied Cryptography

Protocols, Algorithms and Source Code in C

Specificaties
Gebonden, 758 blz. | Engels
John Wiley & Sons | 20e druk, 2015
ISBN13: 9781119096726
Rubricering
Hoofdrubriek : Computer en informatica
Juridisch :
John Wiley & Sons 20e druk, 2015 9781119096726
Verwachte levertijd ongeveer 8 werkdagen

Samenvatting

This smart, relevant guide is a must for all those committed to computer and cyber security. Bruce Schneier covers general classes of cryptographic protocols and then specific techniques, detailing the inner workings of real–world cryptographic algorithms including the Data Encryption Standard and RSA public–key cryptosystems.

This book includes source–code listings and extensive advice on the practical aspects of cryptography implementation, such as the importance of generating truly random numbers and keeping keys secure. It describes dozens of cryptography algorithms, gives practical advice on how to implement them into cryptographic software, and shows how they can be used to solve security problems.

Written by the world′s most renowned security technologist this special Anniversary Edition celebrates 20 years for the most definitive reference on cryptography ever published, Applied Cryptography, Protocols, Algorithms, and Source Code in C. Inside security enthusiasts will find a compelling introduction by author Bruce Schneider written specifically for this keepsake edition.

Included in this edition:
- Exclusive forward by Bruce Schneier
- Ways to defeat the key escrow mechanism
- Encryption algorithms, including algorithms from the former Soviet Union and South Africa, and the RC4 stream cipher
- Protocols for digital signatures, authentication, secure elections, digital cash, and more
- Detailed information on key management and cryptographic implementations

Specificaties

ISBN13:9781119096726
Taal:Engels
Bindwijze:gebonden
Aantal pagina's:758
Druk:20
Verschijningsdatum:15-5-2015

Inhoudsopgave

Introduction
Foreword
Preface
About the author

1. Foundation

Part 1: CRYPTOGRAPHIC PROTOCOLS.
2. Protocol Building Blocks.
3. Basic Protocols.
4. Intermediate Protocols.
5. Advanced Protocols.
6. Esoteric Protocols.

Part 2: CRYPTOGRAPHIC TECHNIQUES.
7. Key Length.
8. Key Management.
9. Algorithm Types and Modes.
10. Using Algorithms.

Part 3: CRYPTOGRAPHIC ALGORITHMS.
11. Mathematical Background
12. Data Encryption Standard (DES).
13. Other Block Ciphers.
14. Still Other Block Ciphers.
15. Combining Block Ciphers.
16. Pseudo-Randomn-Sequence Generators anmd Stream Ciphers
17. Other Stream Ciphers and Real Random-Sequence Generators
18. One-Way Hash Functions
19. Public-Key Algorithms.
20. Public-Key Digital Signature Algorithms
21. Identification Schemes
22. Key-Exchange Algorithms
23. Special Algorithms for Protocols.

Part 4: THE REAL WORLD.
24. Example Implementations.
25. Politics.

Part 5: SOURCE CODE.source Code.
Source Code
References.

Net verschenen

Rubrieken

Populaire producten

    Personen

      Trefwoorden

        Applied Cryptography