Cryptography Engineering

Cryptography Engineering
-0 %
Der Artikel wird am Ende des Bestellprozesses zum Download zur Verfügung gestellt.
Design Principles and Practical Applications
 E-Book
Sofort lieferbar | Lieferzeit: Sofort lieferbar

Unser bisheriger Preis:ORGPRICE: 56,26 €

Jetzt 36,99 €* E-Book

Artikel-Nr:
9781118502822
Veröffentl:
2012
Einband:
E-Book
Seiten:
384
Autor:
Niels Ferguson
eBook Typ:
PDF
eBook Format:
Reflowable E-Book
Kopierschutz:
Adobe DRM [Hard-DRM]
Sprache:
Englisch
Beschreibung:

The ultimate guide to cryptography, updated from an author team of the world's top cryptography experts. Cryptography is vital to keeping information safe, in an era when the formula to do so becomes more and more challenging. Written by a team of world-renowned cryptography experts, this essential guide is the definitive introduction to all major areas of cryptography: message security, key negotiation, and key management. You'll learn how to think like a cryptographer. You'll discover techniques for building cryptography into products from the start and you'll examine the many technical changes in the field. After a basic overview of cryptography and what it means today, this indispensable resource covers such topics as block ciphers, block modes, hash functions, encryption modes, message authentication codes, implementation issues, negotiation protocols, and more. Helpful examples and hands-on exercises enhance your understanding of the multi-faceted field of cryptography. An author team of internationally recognized cryptography experts updates you on vital topics in the field of cryptography Shows you how to build cryptography into products from the start Examines updates and changes to cryptography Includes coverage on key servers, message security, authentication codes, new standards, block ciphers, message authentication codes, and more Cryptography Engineering gets you up to speed in the ever-evolving field of cryptography.
The ultimate guide to cryptography, updated from an author teamof the world's top cryptography experts.Cryptography is vital to keeping information safe, in an erawhen the formula to do so becomes more and more challenging.Written by a team of world-renowned cryptography experts, thisessential guide is the definitive introduction to all major areasof cryptography: message security, key negotiation, and keymanagement. You'll learn how to think like a cryptographer. You'lldiscover techniques for building cryptography into products fromthe start and you'll examine the many technical changes in thefield.After a basic overview of cryptography and what it means todaythis indispensable resource covers such topics as block ciphersblock modes, hash functions, encryption modes, messageauthentication codes, implementation issues, negotiation protocolsand more. Helpful examples and hands-on exercises enhance yourunderstanding of the multi-faceted field of cryptography.* An author team of internationally recognized cryptographyexperts updates you on vital topics in the field ofcryptography* Shows you how to build cryptography into products from thestart* Examines updates and changes to cryptography* Includes coverage on key servers, message securityauthentication codes, new standards, block ciphers, messageauthentication codes, and moreCryptography Engineering gets you up to speed in theever-evolving field of cryptography.
Preface to Cryptography Engineering.Preface to Practical Cryptography (the 1st Edition).Part I Introduction.Chapter 1 The Context of Cryptography.Chapter 2 Introduction to Cryptography.Part II Message Security.Chapter 3 Block Ciphers.Chapter 4 Block Cipher Modes.Chapter 5 Hash Functions.Chapter 6 Message Authentication Codes.Chapter 7 The Secure Channel.Chapter 8 Implementation Issues (I).Part III Key Negotiation.Chapter 9 Generating Randomness.Chapter 10 Primes.Chapter 11 Diffie-Hellman.Chapter 12 RSA.Chapter 13 Introduction to Cryptographic Protocols.Chapter 14 Key Negotiation.Chapter 15 Implementation Issues (II).Part IV Key Management.Chapter 16 The Clock.Chapter 17 Key Servers.Chapter 18 The Dream of PKI.Chapter 19 PKI Reality.Chapter 20 PKI Practicalities.Chapter 21 Storing Secrets.Part V Miscellaneous.Chapter 22 Standards and Patents.Chapter 23 Involving Experts.Bibliography.Index.

Kunden Rezensionen

Zu diesem Artikel ist noch keine Rezension vorhanden.
Helfen sie anderen Besuchern und verfassen Sie selbst eine Rezension.