Monday, January 19, 2009

Introduction to Cryptography with Coding Theory or Threat Modeling

Introduction to Cryptography with Coding Theory

Author: Wade Trapp

With its conversational tone and practical focus, this text mixes applied and theoretical aspects for a solid introduction to cryptography and security, including the latest significant advancements in the field. Assumes a minimal background. The level of math sophistication is equivalent to a course in linear algebra. Presents applications and protocols where cryptographic primitives are used in practice, such as SET and SSL. Provides a detailed explanation of AES, which has replaced Feistel-based ciphers (DES) as the standard block cipher algorithm. Includes expanded discussions of block ciphers, hash functions, and multicollisions, plus additional attacks on RSA to make readers aware of the strengths and shortcomings of this popular scheme. For engineers interested in learning more about cryptography.



Table of Contents:
1Overview of cryptography and its applications1
2Classical cryptosystems12
3Basic number theory63
4The data encryption standard113
5The advanced encryption standard : Rijndael151
6The RSA algorithm164
7Discrete logarithms201
8Hash functions218
9Digital signatures244
10Security protocols256
11Digital cash287
12Secret sharing schemes296
13Games307
14Zero-knowledge techniques316
15Information theory325
16Elliptic curves347
17Lattice methods376
18Error correcting codes392
19Quantum techniques in cryptography450
AMathematica examples467
BMaple examples495
CMATLAB examples527

New interesting textbook: Hana Sushi or Indian in 6

Threat Modeling (Microsoft Professional Books Series)

Author: Frank Swiderski

Threat modeling has become one of the top security analysis methodologies that Microsoft's developers use to identify risks and make better design, coding, and testing decisions. This book provides a clear, concise explanation of the threat-modeling process, describing a structured approach you can use to assess the security vulnerabilities for any application, regardless of platform. Software designers and developers discover how to use threat modeling during the specification phase of a new project or a major revision-from verifying application architecture to identifying and evaluating threats and designing countermeasures. Test engineers discover how to apply threat-modeling principles when creating test plans to verify results. It's the essential, high-level reference for software professionals responsible for designing, refining, and maximizing the security features in their application architecture.



No comments:

Post a Comment