Book Image

Cryptography Engineering

By : Niels Ferguson‚ÄØ, Tadayoshi Kohno, Bruce Schneier
Book Image

Cryptography Engineering

By: Niels Ferguson‚ÄØ, Tadayoshi Kohno, Bruce Schneier

Overview of this book

Cryptography is vital to keeping information safe, in an era when the formula to do so becomes more and more challenging. Written by a team of world-renowned cryptography experts, this essential guide is the definitive introduction to all major areas of cryptography: message security, key negotiation, and key management. You'll learn how to think like a cryptographer. You'll discover techniques for building cryptography into products from the start and you'll examine the many technical changes in the field. After a basic overview of cryptography and what it means today, this indispensable resource covers such topics as block ciphers, block modes, hash functions, encryption modes, message authentication codes, implementation issues, negotiation protocols, and more. Helpful examples and hands-on exercises enhance your understanding of the multi-faceted field of cryptography.
Table of Contents (9 chapters)

Index

A

  • access control list (ACL)
  • accumulator
    • events
    • pools
    • randomness
  • ACL. See access control list
  • addition
    • bitwise
    • modular
    • modulo
    • without carry
  • AddRandomEvent
  • add-with-carry, CPU
  • Adelman, Leonard
  • administrators
  • Advanced Encryption Standard (AES)
    • initialization
    • 128-bit
    • randomness generator
    • rounds
    • RSA
    • S-box
    • testing
  • adversarial setting
    • failure rate
  • AES. See Advanced Encryption Standard
  • algorithms
    • binary
    • distinguishers
    • efficiency
    • extended Euclidian algorithm
    • Kerckhoff's principle
    • primes
    • public keys
    • secure channel
    • wooping
  • Anderson, Ross
  • Applied Cryptography (Schneier)
  • The Art of Computer Programming (Knuth)
  • ASN.1
  • assertions
  • asymmetric key, encryption
  • ATM, PIN code
  • atomicity, file system updates
  • attack tree
  • attacks. See also specific attack types
    • block ciphers
    • entropy
    • hash functions
    • MAC
    • plaintext
    • quantum physics
    • RF
    • RSA
    • steps
  • authentication. See also message authentication code
    • clock
    • conventions
    • encryption
    • GMAC
    • key negotiation
    • MAC
    • message order
    • messages
    • protocols
    • public...