Books on cryptography | Training Partners   

Technology >> Training >> Books on Cryptography
Cryptography and Network Security : Principles and Practice (3rd Edition)
New edition of a practical survey intended for both classroom use and self study. Coverage includes conventional encryption classical and modern techniques, and algorithms; public-key encryption and hash functions; network security, with regard to e-mail, IP, and the Web; and system security intruders, viruses, worms, and firewalls. The appendix contains research and programming projects, and reading/report assignments for teaching the subject.
Fundamentals of Computer Security
The book studies modern concepts of Computer Security. It is self contained in the sense that it introduces the basic mathematical background necessary to follow computer security concepts. Next we examine modern developments in Cryptography starting from private-key and public-key encryption, going through hashing, digital signatures, authentication, secret sharing, group-oriented cryptography, pseudorandomness, key establishment protocols, zero-knowledge protocols, identification and finishing with an introduction to modern e-business systems based on digital cash. Intrusion detection and access control provide examples of security systems implemented as a part of operating system. Database and network security is also discussed.
 
Applied Cryptography
A book written by Bruce Schneier. It is an excellent book for beginners as well as experienced crypto programmers. It is a "must have" book for all crypto lovers.

 
Java Cryptography
Author: Jonathan Knudsen

Cryptography isn't all there is to security. But rendering information unintelligible to those without the proper key usually plays a big role in any networked data-sharing system. Java Cryptography shows the Java programmer (with or without crypto experience) how to implement ciphers, keys, and other data-obscuring techniques in Java.

The Java language includes lots of classes that are designed to facilitate cryptography, and this book explores them in depth. Key management classes, random-number generators, signed applets, and other parts of the Java security mechanism get attention in these pages. But most interesting are the author's examples. He has written a complete implementation of the ElGamal cipher as a provider in the framework of the Java Security API. If you want to understand how the Provider Architecture works, this is what you need to examine. Don't look here for an explanation of the mathematics, however. In addition to his discussions and examples for individual pieces of the cryptography infrastructure and his implementation of the ElGamal system, Knudsen includes two nifty crypto-enabled programs: a chat system and an e-mail system.

 
Cryptography and Network Security : Principles and Practice
KEY BENEFIT: This book presents detailed coverage of network security technology, the standards that are being developed for security in an internetworking environment, and the practical issues involved in developing security applications.

KEY TOPICS: Opening with a tutorial and survey on network security technology, Stallings provides a sound mathematical foundation for developing the algorithms and results that are the cornerstone of network security. Each basic building block of network security is covered, including conventional and public-key cryptography, authentication, and digital signatures, as are methods for countering hackers and other intruders and viruses. The balance of the book is devoted to an insightful and thorough discussion of all the latest important network security applications, including PGP, PEM, Kerberos, and SNMPv2 security. Now in its Second Edition, the book has been completely updated, reflecting the latest developments in the field.

 
Codes and Cryptography
Dominic Welsh's Codes and Cryptography takes a wide approach and explores the mathematical foundations of this field, considering information theory, entropy, and the encoding of messages. From these roots in information and communication theory, Welsh then moves on to topics in cryptography, including public key cryptography and digital signatures. The text also offers practice exercises along with their solutions.

There is plenty of mathematics here, making this a book for specialists (a result of the author's experience teaching undergraduates at Oxford). Between the formulas, though, the author conveys a genuine enthusiasm for his subject and for the history of cryptography. The text includes an extensive bibliography of sources in the field.


 
Kerberos : A Network Authentication System
"Kerberos is so secure, nobody will even tell you how it works! Or so you might have suspected if you ever looked for an introductory guide to the this powerful, proven, network security technology. Now Brian Tung has filled the gap - extremely well - with Kerberos: A Network Authentication System."



 
Cracking DESC
Authors: Electronic Frontier Foundation, John Gilmore

At 5:10 pm on Wednesday July 15, 1998, The Electronic Frontier Foundation (EFF) successfully cracked RSA Laboratories' DES Challenge II that began 56 hours earlier. The machine that cracked the DES Challenge was built by EFF and is the first unclassified hardware for easily decrypting messages encoded with the government's 56-bit DES (Data Encryption Standard) encryption algorithm.

Technical publisher O'Reilly and Associates has joined with EFF to publish Cracking DES: Secrets of Encryption Research, Wiretap Politics, & Chip Design. Authored by EFF, the book reveals full technical details on how researchers and data-recovery engineers can build a working DES Cracker like the one that won the RSA Challenge.

Cracking DES provides other researchers with the necessary data to fully reproduce, validate, or improve EFF's design. It includes design specifications and board schematics, as well as full source code for the custom chip, a chip simulator, and the software that drives the system. The Data Encryption Standard withstood the test of time for twenty years. This book shows exactly how it was brought down. Every cryptographer, security designer, and student of cryptography policy should read this book to understand how the world changed as it fell.



 
The Official PGP User's Guide
This book is the user's manual for PGP public-key cryptography software, freely available over the Internet, that has become the de facto standard for encryption of electronic mail and data. In addition to technical details, this guide contains valuable insights into the legal, ethical, and political issues that have surrounded PGP since its initial release.

 

 

The Electronic Privacy Papers
While most books on privacy and security issues in cyberspace simply give accounts of debates on the issues, The Electronic Privacy Papers documents the war--practically salvo by salvo. Authors Schneier and Banisar present the actual government and industry documents, which cover both legal and technical matters. The information includes research reports on the value of wiretaps, influential speeches and articles, and actual legislation that has gone before Congress. Many of the government documents, although legally available to the public through the Freedom of Information Act, were improperly kept secret until several lawsuits eventually forced their release. These "hidden" papers exhibit the FBI's push for government access to all electronic communications, report on how increased government access could also increase the opportunities for computer crime, and record the conflict between those who favor private encryption technology and those who'd make illegal encryption systems that don't allow government agencies access to decryption keys. Legislation and Supreme Court decisions on these disputes are also presented. This book will give you a clear understanding of both sides of the debate and will provide insight into the strategies that both government and privacy advocates use in attempt to achieve their desired result.
 

 

 

Basics Methods of Cryptography
Authors: Jan C.A. Van Der Lubbe

This text covers the fundamentals of cryptography, which is concerned with methods of security in the storage and transportation of information. Computers are now found in every layer of society, and information is being communicated and processed automatically on a large scale. Examples include medical and financial files, automatic banking, video-phones, pay-tv, facsimiles, tele-shopping, and global computer networks. The book will be of value to advanced students and researchers involved in data protection and information processing, especially electrical engineers and people working in informatics and computer science.
 

 

 

Handbook of Applied Cryptography
Authors: Alfred J. Menezes, Paul C. Van Oorschot, Scott A. Vanstone

Cryptography, in particular public-key cryptography, has emerged in the last 20 years as a very serious discipline that is not only the subject of an enormous amount of research, but is providing the basis for information security in many applications. This Handbook will serve as a valuable reference for the novice as well as for the expert who needs a wider scope of coverage within the area of cryptography.
 

 

Encyclopedia of Cryptography
Author: David E. Newton

David E. Newton, a former mathematics and science teacher with a doctorate from Harvard, is now a freelance writer who has authored scores of books on science and social issues. His latest effort is a fascinating new reference on cryptology. As the author states near the end of the book, interest in cryptology has increased with the invention of the computer, and he has tried to provide enough information for interested persons to understand basic concepts and obtain additional information.

With entries arranged alphabetically, this monograph surveys codes from ancient history through modern electronic media. The 550 entries vary from a short sentence to several pages in length, with most being about half a page. The book is well illustrated, with 42 black-and-white photographs and numerous line drawings of instruments and codes. Entries cover biographies of individuals such as Edgar Allen Poe, who used cryptology in some of his stories, and mathematician Alan Turing, who worked as a cryptanalyst during World War II; entries also cover significant military and diplomatic events. In addition, a variety of applications is examined in entries such as literary cryptology, hobo codes, sign language, and universal product codes. Several unsolved codes are also presented for users seeking a challenge in cryptanalysis.

 

 

Code Breaking : A History and Exploration
Authors: Rudolf Kippenhahn, Ewald Osers

A brief history of cryptographyencoding and decoding messages from ancient times to the present, including technical details of various systems used in the transmission of secret information. Kippenhahn (100 Billion Suns: The Birth, Life, and Death of the Stars, 1983), a former professor of astronomy and astrophysics at the University of G"ttingen and a former director of the Max Planck Institute for Astrophysics, in Munich, leads the reader into the arcane world of intricate number puzzles, secret keys, codebooks, and other devices often used by the military, undercover agents, and organizations such as the Ku Klux Klan to avoid detection by enemies and the public. Citing anecdotes in history, the author tells of the Greek historian Polybius, who devised cipher codes; of Herodotus sending secret messages warning of a Persian invasion at Thermopylae; of Scotland being betrayed when encoded messages from its supporters against Queen Elizabeth were found; of Jefferson's key wheel, used by the US Army until 1920; and of the discovery of the famous Zimmermann telegram from Germany, which helped propel the US into WWI. Kippenhahn writes at length about the ingenious German code ``Enigmait was changed daily, growing more complicated over time. After many years of effort in the 1930s and later, the code was finally broken by three Polish mathematicians and Englishman Alan Turing. The Allies in WWII were then able to intercept military orders and plans the Nazis thought were beyond penetration. Today computers can process huge amounts of encoded data and do elaborate mathematical manipulations in a relatively short time. Will interest math mavens and computer junkies, but despite the fascinating anecdotes, the large mass of technical info may discourage reders who are less agile at manipulating numbers.