Serious Cryptography, 2nd Edition : A Practical Introduction to Modern Encryption

個数:
電子版価格
¥7,641
  • 電子版あり

Serious Cryptography, 2nd Edition : A Practical Introduction to Modern Encryption

  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Paperback:紙装版/ペーパーバック版/ページ数 376 p.
  • 言語 ENG
  • 商品コード 9781718503847
  • DDC分類 005.824

Full Description

This practical guide to modern encryption breaks down the fundamental mathematical concepts at the heart of cryptography without shying away from meaty discussions of how they work. You'll learn about authenticated encryption, secure randomness, hash functions, block ciphers, and public-key techniques such as RSA and elliptic curve cryptography. You'll also learn: key concepts in cryptography, such as computational security, attacker models, and forward secrecy; the strengths and limitations of the TLS protocol behind HTTPS secure websites; quantum computation and post-quantum cryptography; about various vulnerabilities by examining numerous code examples and use cases; how to choose the best algorithm or protocol and ask vendors the right questions. Each chapter includes a discussion of common implementation mistakes using real-world examples and details what could go wrong and how to avoid these pitfalls. This new second edition has been thoroughly revised and updated, with a new chapter on Cryptocurrency. Whether you're a seasoned practitioner or a beginner looking to dive into the field, Serious Cryptography will provide a complete survey of modern encryption and its applications.

Contents

Foreword from the First Edition
Acknowledgments
Introduction
Abbreviations
Part I: Fundamentals
Chapter 1: Encryption
Chapter 2: Randomness
Chapter 3: Cryptographic Security
Part II: Symmetric Crypto
Chapter 4: Block Ciphers
Chapter 5: Stream Ciphers
Chapter 6: Hash Functions
Chapter 7: Keyed Hashing
Chapter 8: Authenticated Encryption
Part III: Asymmetric Crypto
Chapter 9: Hard Problems
Chapter 10: RSA
Chapter 11: Diffie-Hellman
Chapter 12: Elliptic Curves
Part IV: Applications
Chapter 13: TLS 255
Chapter 14: Quantum and Post-Quantum
Chapter 15: Cryptocurrency Cryptography
Index

最近チェックした商品