Security is the number one concern for business worldwide, but, amazingly, there is no practical implementation literature available about cryptography. Written by a former cryptographic engineering consultant and bestselling author, this is an ideal guide for an engineer or systems engineer or technology professional who want to learn how to actually incorporate cryptography into a product. This book bridges the gap between textbook cryptography and cryptography in the real world and will appeal to a broad range of IT professionals.
Rezensionen / Stimmen
"...the insight into the world of security that is offered here makes for an interesting read...any readers who are responsible for network and data security will find plenty of valuable pointers..." (PC Utilities, June 2003) "...absolutely brilliantly written... I loved the chapters on PKI...a must read!..." (Information Security Bulletin, July 2003)
Auflage
Sprache
Verlagsort
Verlagsgruppe
Zielgruppe
Für höhere Schule und Studium
Für Beruf und Forschung
Illustrationen
Maße
Höhe: 24.3 cm
Breite: 19.6 cm
Gewicht
ISBN-13
978-0-471-22894-3 (9780471228943)
Schweitzer Klassifikation
NIELS FERGUSON is a cryptographic engineer and consultant. He has extensive experience in the design and implementation of cryptographic algorithms, protocols, and large-scale security infrastructures. Previously, Ferguson was a cryptographer for DigiCash and CWI, and he worked closely with Bruce Schneier at Counterpane Internet Security. He has published numerous scientific papers.
BRUCE SCHNEIER is founder and chief technical officer at Counterpane Internet Security, a managed-security monitoring company. A world-renowned scientist, security expert, and lecturer, he is the author of Secrets and Lies: Digital Security in a Networked World and Applied Cryptography (both from Wiley).
Preface. 1. Our Design Philosophy. 2. The Context of Cryptography. 3. Introduction to Cryptography. I Message Security. 4. Block Ciphers. 5. Block Cipher Modes. 6. Hash Functions. 7. Message Authentication Codes. 8. The Secure Channel. 9. Implementation Issues ( I ) II Key Negotiation. 10. Generating Randomness. 11. Primes. 12. Diffie Hellman. 13. RSA. 14. Introduction to Cryptographic Protocols. 15. Key Negotiation Protocol. 16. Implementation Issues ( II ). III Key Management. 17. The Clock. 18. Key Servers. 19. The Dream of PKI. 20. PKI Reality. 21. PKI Practicalities. 22. Storing Secrets. IV Miscellaneous. 23. Standards. 24. Patents. 25. Involving Experts. Acknowledgments. Bibliography. Index.