|Technology >> Training >> Books on Cryptography|
|Cryptography and Network Security : Principles and Practice (3rd Edition)|
|New edition of a practical survey intended for both classroom use and self study. Coverage includes conventional encryption classical and modern techniques, and algorithms; public-key encryption and hash functions; network security, with regard to e-mail, IP, and the Web; and system security intruders, viruses, worms, and firewalls. The appendix contains research and programming projects, and reading/report assignments for teaching the subject.|
|Fundamentals of Computer Security|
|The book studies modern concepts
of Computer Security. It is self contained in the sense that it introduces
the basic mathematical background necessary to follow computer security
concepts. Next we examine modern developments in Cryptography starting from
private-key and public-key encryption, going through hashing, digital
signatures, authentication, secret sharing, group-oriented cryptography,
pseudorandomness, key establishment protocols, zero-knowledge protocols,
identification and finishing with an introduction to modern e-business
systems based on digital cash. Intrusion detection and access control
provide examples of security systems implemented as a part of operating
system. Database and network security is also discussed.
|A book written by Bruce Schneier.
It is an excellent book for beginners as well as experienced crypto
programmers. It is a "must have" book for all crypto lovers.
|Author: Jonathan Knudsen
Cryptography isn't all there is to security. But rendering information unintelligible to those without the proper key usually plays a big role in any networked data-sharing system. Java Cryptography shows the Java programmer (with or without crypto experience) how to implement ciphers, keys, and other data-obscuring techniques in Java.
The Java language includes lots of classes that are designed to facilitate cryptography, and this book explores them in depth. Key management classes, random-number generators, signed applets, and other parts of the Java security mechanism get attention in these pages. But most interesting are the author's examples. He has written a complete implementation of the ElGamal cipher as a provider in the framework of the Java Security API. If you want to understand how the Provider Architecture works, this is what you need to examine. Don't look here for an explanation of the mathematics, however. In addition to his discussions and examples for individual pieces of the cryptography infrastructure and his implementation of the ElGamal system, Knudsen includes two nifty crypto-enabled programs: a chat system and an e-mail system.
|Cryptography and Network Security : Principles and Practice|
|KEY BENEFIT: This book presents
detailed coverage of network security technology, the standards that are
being developed for security in an internetworking environment, and the
practical issues involved in developing security applications.
KEY TOPICS: Opening with a tutorial and survey on network security technology, Stallings provides a sound mathematical foundation for developing the algorithms and results that are the cornerstone of network security. Each basic building block of network security is covered, including conventional and public-key cryptography, authentication, and digital signatures, as are methods for countering hackers and other intruders and viruses. The balance of the book is devoted to an insightful and thorough discussion of all the latest important network security applications, including PGP, PEM, Kerberos, and SNMPv2 security. Now in its Second Edition, the book has been completely updated, reflecting the latest developments in the field.
|Codes and Cryptography|
|Dominic Welsh's Codes and
Cryptography takes a wide approach and explores the mathematical foundations
of this field, considering information theory, entropy, and the encoding of
messages. From these roots in information and communication theory, Welsh
then moves on to topics in cryptography, including public key cryptography
and digital signatures. The text also offers practice exercises along with
There is plenty of mathematics here, making this a book for specialists (a result of the author's experience teaching undergraduates at Oxford). Between the formulas, though, the author conveys a genuine enthusiasm for his subject and for the history of cryptography. The text includes an extensive bibliography of sources in the field.
|Kerberos : A Network Authentication System|
|"Kerberos is so secure, nobody
will even tell you how it works! Or so you might have suspected if you ever
looked for an introductory guide to the this powerful, proven, network
security technology. Now Brian Tung has filled the gap - extremely well -
with Kerberos: A Network Authentication System."
|Authors: Electronic Frontier
Foundation, John Gilmore
At 5:10 pm on Wednesday July 15, 1998, The Electronic Frontier Foundation (EFF) successfully cracked RSA Laboratories' DES Challenge II that began 56 hours earlier. The machine that cracked the DES Challenge was built by EFF and is the first unclassified hardware for easily decrypting messages encoded with the government's 56-bit DES (Data Encryption Standard) encryption algorithm.
Technical publisher O'Reilly and Associates has joined with EFF to publish Cracking DES: Secrets of Encryption Research, Wiretap Politics, & Chip Design. Authored by EFF, the book reveals full technical details on how researchers and data-recovery engineers can build a working DES Cracker like the one that won the RSA Challenge.
Cracking DES provides other researchers with the necessary data to fully reproduce, validate, or improve EFF's design. It includes design specifications and board schematics, as well as full source code for the custom chip, a chip simulator, and the software that drives the system. The Data Encryption Standard withstood the test of time for twenty years. This book shows exactly how it was brought down. Every cryptographer, security designer, and student of cryptography policy should read this book to understand how the world changed as it fell.
|The Official PGP User's Guide|
|This book is the user's manual for
PGP public-key cryptography software, freely available over the Internet,
that has become the de facto standard for encryption of electronic mail and
data. In addition to technical details, this guide contains valuable
insights into the legal, ethical, and political issues that have surrounded
PGP since its initial release.
|The Electronic Privacy Papers|
|While most books on privacy and
security issues in cyberspace simply give accounts of debates on the issues,
The Electronic Privacy Papers documents the war--practically salvo by salvo.
Authors Schneier and Banisar present the actual government and industry
documents, which cover both legal and technical matters. The information
includes research reports on the value of wiretaps, influential speeches and
articles, and actual legislation that has gone before Congress. Many of the
government documents, although legally available to the public through the
Freedom of Information Act, were improperly kept secret until several
lawsuits eventually forced their release. These "hidden" papers exhibit the
FBI's push for government access to all electronic communications, report on
how increased government access could also increase the opportunities for
computer crime, and record the conflict between those who favor private
encryption technology and those who'd make illegal encryption systems that
don't allow government agencies access to decryption keys. Legislation and
Supreme Court decisions on these disputes are also presented. This book will
give you a clear understanding of both sides of the debate and will provide
insight into the strategies that both government and privacy advocates use
in attempt to achieve their desired result.
|Basics Methods of Cryptography|
|Authors: Jan C.A. Van Der Lubbe
This text covers the fundamentals of cryptography, which is concerned with methods of security in the storage and transportation of information. Computers are now found in every layer of society, and information is being communicated and processed automatically on a large scale. Examples include medical and financial files, automatic banking, video-phones, pay-tv, facsimiles, tele-shopping, and global computer networks. The book will be of value to advanced students and researchers involved in data protection and information processing, especially electrical engineers and people working in informatics and computer science.
|Handbook of Applied Cryptography|
|Authors: Alfred J. Menezes, Paul
C. Van Oorschot, Scott A. Vanstone
Cryptography, in particular public-key cryptography, has emerged in the last 20 years as a very serious discipline that is not only the subject of an enormous amount of research, but is providing the basis for information security in many applications. This Handbook will serve as a valuable reference for the novice as well as for the expert who needs a wider scope of coverage within the area of cryptography.
|Encyclopedia of Cryptography|
|Author: David E. Newton
David E. Newton, a former mathematics and science teacher with a doctorate from Harvard, is now a freelance writer who has authored scores of books on science and social issues. His latest effort is a fascinating new reference on cryptology. As the author states near the end of the book, interest in cryptology has increased with the invention of the computer, and he has tried to provide enough information for interested persons to understand basic concepts and obtain additional information.
With entries arranged alphabetically, this monograph surveys codes from ancient history through modern electronic media. The 550 entries vary from a short sentence to several pages in length, with most being about half a page. The book is well illustrated, with 42 black-and-white photographs and numerous line drawings of instruments and codes. Entries cover biographies of individuals such as Edgar Allen Poe, who used cryptology in some of his stories, and mathematician Alan Turing, who worked as a cryptanalyst during World War II; entries also cover significant military and diplomatic events. In addition, a variety of applications is examined in entries such as literary cryptology, hobo codes, sign language, and universal product codes. Several unsolved codes are also presented for users seeking a challenge in cryptanalysis.
|Code Breaking : A History and Exploration|
|Authors: Rudolf Kippenhahn, Ewald
A brief history of cryptographyencoding and decoding messages from ancient times to the present, including technical details of various systems used in the transmission of secret information. Kippenhahn (100 Billion Suns: The Birth, Life, and Death of the Stars, 1983), a former professor of astronomy and astrophysics at the University of G"ttingen and a former director of the Max Planck Institute for Astrophysics, in Munich, leads the reader into the arcane world of intricate number puzzles, secret keys, codebooks, and other devices often used by the military, undercover agents, and organizations such as the Ku Klux Klan to avoid detection by enemies and the public. Citing anecdotes in history, the author tells of the Greek historian Polybius, who devised cipher codes; of Herodotus sending secret messages warning of a Persian invasion at Thermopylae; of Scotland being betrayed when encoded messages from its supporters against Queen Elizabeth were found; of Jefferson's key wheel, used by the US Army until 1920; and of the discovery of the famous Zimmermann telegram from Germany, which helped propel the US into WWI. Kippenhahn writes at length about the ingenious German code ``Enigmait was changed daily, growing more complicated over time. After many years of effort in the 1930s and later, the code was finally broken by three Polish mathematicians and Englishman Alan Turing. The Allies in WWII were then able to intercept military orders and plans the Nazis thought were beyond penetration. Today computers can process huge amounts of encoded data and do elaborate mathematical manipulations in a relatively short time. Will interest math mavens and computer junkies, but despite the fascinating anecdotes, the large mass of technical info may discourage reders who are less agile at manipulating numbers.