• Out-of-Stock
Cryptography for practitioners. Protocols, algorithms and source programs in C language
search
  • Cryptography for practitioners. Protocols, algorithms and source programs in C language
ID: 28683
Bruce Schneier
Delivery date unknown
 

Free shipping

free shipping in Poland for all orders over 500 PLN

 

Same day shipping

If your payment will be credited to our account by 11:00

 

14 days for return

Each consumer can return the purchased goods within 14 days

The book is the second edition of a practical guide for the use of cryptography - an area dealing with data security in computer systems. Programmers and specialists in electronic communication will find detailed information on this subject. They learn about encryption and decryption techniques, as well as many cryptographic algorithms. They will learn how to implement them in the software and how to use them to effectively solve information security problems. This edition includes, inter alia, new developments related to the Clipper integrated circuit, including ways of neutralizing the key storage mechanism; new algorithms, including from the former Soviet Union and South Africa, and the RC4 stream cipher; the latest protocols of digital signatures, authentication, secure products, electronic money. An important part of the book are source programs in C language, in which cryptographic algorithms were used, and an impressive bibliography containing all the items relevant to contemporary cryptography.
The book is intended for IT students, as well as for IT professionals dealing with security and computer data protection.

Table of Contents


Admission

Chapter 1. The basics

Part I Cryptographic protocols


Chapter 2. Elements of building protocols
Chapter 3. Basic protocols
Chapter 4. Indirect protocols
Chapter 5. Advanced protocols
Chapter 6. Esoteric protocols

Part II. Cryptographic techniques


Chapter 7. Key length
Chapter 8. Key management
Chapter 9. Types of algorithms and their work modes
Chapter 10. Alignment of algorithms

Part III. Cryptographic algorithms


Chapter 11. Mathematical basis
Chapter 12. Data encryption standard (DES)
Chapter 13. Other block ciphers
Chapter 14. Next block ciphers
Chapter 15. Combining block ciphers
Chapter 16. Generators of pseudorandom sequences and stream ciphers
Chapter 17. Other stream ciphers and string generators
Chapter 18. Two-way hash functions
Chapter 19. Algorithms with a public key
Chapter 20. Public key algorithms for digital signatures
Chapter 21. Schemes of identification
Chapter 22. Key exchange algorithms
Chapter 23. Special algorithms for protocols

Part IV Reality


Chapter 24. Sample implementations
Chapter 25. The world of politics

Part V Source programs


Literature
Index
28683

Other products in the same category (16)