Cryptography for Developers
暫譯: 開發者的密碼學
Tom St Denis
- 出版商: Syngress Media
- 出版日期: 2006-11-01
- 售價: $2,610
- 貴賓價: 9.5 折 $2,480
- 語言: 英文
- 頁數: 400
- 裝訂: Paperback
- ISBN: 1597491047
- ISBN-13: 9781597491044
-
相關分類:
資訊安全
海外代購書籍(需單獨結帳)
買這商品的人也買了...
-
$500$395 -
$1,570$1,492 -
$1,127Design of Analog CMOS Integrated Circuits (Hardcover)
-
$980$980 -
$880$695 -
$800$720 -
$680$666 -
$270$213 -
$480$379 -
$720$569 -
$590$502 -
$480$432 -
$750$713 -
$780$616 -
$550$468 -
$980$774 -
$680$578 -
$650$507 -
$780$616 -
$860$731 -
$680$537 -
$480$374 -
$890$703 -
$680$537 -
$450$383
相關主題
商品描述
Description
The Only Cryptography Guide Written for Software Developers
Developers tasked with security problems are often not cryptographers themselves. They are bright people who, with careful guidance, can implement secure cryptosystems. This book will guide developers in their journey towards solving cryptographic problems. If you have ever asked yourself “just how do I setup AES?” then this text is for you.
Topics Include:
• ASN.1 Encoding
The chapter on ASN.1 encoding delivers a treatment of the Abstract Syntax Notation One (ASN.1) encoding rules for data elements such as strings, binary strings, integers, dates and times, and sets and sequences.
• Random Number Generation
This chapter discusses the design and construction of standard random number generators (RNGs) such as those specified by NIST.
• Advanced Encryption Standard
This chapter discusses the AES block cipher design, implementation trade-offs, side channel hazards, and modes of use. It concentrates on the key design elements important to implementers and how to exploit them in various trade-off conditions.
• Hash Functions
This chapter discusses collision resistance, provides examples of exploits, and concludes with known incorrect usage patterns.
• Message Authentication Code Algorithms
This chapter discusses the HMAC and CMAC Message Authentication Code (MAC) algorithms, which are constructed from hash and cipher functions.
• Encrypt and Authenticate Modes
This chapter discusses the IEEE and NIST encrypt and authenticate modes GCM and CCM. Both modes introduce new concepts to cryptographic functions. Focus is given to the concept of replay attacks, and initialization techniques are explored in depth.
• Large Integer Arithmetic
This chapter discusses the techniques behind manipulating large integers such as those used in public key algorithms.
• Public Key Algorithms
This chapter introduces public key cryptography, including the RSA algorithm and its related PKCS #1 padding schemes. It also introduces new math in the form of various elliptic curve point multipliers.
商品描述(中文翻譯)
**描述**
**唯一為軟體開發人員撰寫的密碼學指南**
負責安全問題的開發人員通常並不是密碼學家。他們是聰明的人,在仔細的指導下,可以實現安全的密碼系統。本書將指導開發人員在解決密碼學問題的旅程中。如果你曾經問過自己「我該如何設置 AES?」那麼這本書就是為你而寫的。
**主題包括:**
• ASN.1 編碼
本章介紹了抽象語法標記一(ASN.1)編碼規則,適用於字符串、二進制字符串、整數、日期和時間,以及集合和序列等數據元素。
• 隨機數生成
本章討論了標準隨機數生成器(RNG)的設計和構建,例如 NIST 所指定的那些。
• 高級加密標準
本章討論了 AES 區塊加密的設計、實現權衡、側信道風險和使用模式。重點放在對實現者重要的關鍵設計元素,以及如何在各種權衡條件下利用它們。
• 雜湊函數
本章討論了碰撞抵抗性,提供了利用的範例,並以已知的不正確使用模式作結。
• 訊息驗證碼演算法
本章討論了 HMAC 和 CMAC 訊息驗證碼(MAC)演算法,這些演算法是由雜湊和加密函數構成的。
• 加密與驗證模式
本章討論了 IEEE 和 NIST 的加密與驗證模式 GCM 和 CCM。這兩種模式為密碼學函數引入了新概念。重點放在重播攻擊的概念上,並深入探討初始化技術。
• 大整數運算
本章討論了操作大整數的技術,例如在公鑰演算法中使用的大整數。
• 公鑰演算法
本章介紹了公鑰密碼學,包括 RSA 演算法及其相關的 PKCS #1 填充方案。它還介紹了以各種橢圓曲線點乘法器形式出現的新數學。