Introduction to Cryptography with Coding Theory
Author: Wade Trapp
With its conversational tone and practical focus, this text mixes applied and theoretical aspects for a solid introduction to cryptography and security, including the latest significant advancements in the field. Assumes a minimal background. The level of math sophistication is equivalent to a course in linear algebra. Presents applications and protocols where cryptographic primitives are used in practice, such as SET and SSL. Provides a detailed explanation of AES, which has replaced Feistel-based ciphers (DES) as the standard block cipher algorithm. Includes expanded discussions of block ciphers, hash functions, and multicollisions, plus additional attacks on RSA to make readers aware of the strengths and shortcomings of this popular scheme. For engineers interested in learning more about cryptography.
Table of Contents:
1 | Overview of cryptography and its applications | 1 |
2 | Classical cryptosystems | 12 |
3 | Basic number theory | 63 |
4 | The data encryption standard | 113 |
5 | The advanced encryption standard : Rijndael | 151 |
6 | The RSA algorithm | 164 |
7 | Discrete logarithms | 201 |
8 | Hash functions | 218 |
9 | Digital signatures | 244 |
10 | Security protocols | 256 |
11 | Digital cash | 287 |
12 | Secret sharing schemes | 296 |
13 | Games | 307 |
14 | Zero-knowledge techniques | 316 |
15 | Information theory | 325 |
16 | Elliptic curves | 347 |
17 | Lattice methods | 376 |
18 | Error correcting codes | 392 |
19 | Quantum techniques in cryptography | 450 |
A | Mathematica examples | 467 |
B | Maple examples | 495 |
C | MATLAB examples | 527 |
New interesting textbook: Hana Sushi or Indian in 6
Threat Modeling (Microsoft Professional Books Series)
Author: Frank Swiderski
Threat modeling has become one of the top security analysis methodologies that Microsoft's developers use to identify risks and make better design, coding, and testing decisions. This book provides a clear, concise explanation of the threat-modeling process, describing a structured approach you can use to assess the security vulnerabilities for any application, regardless of platform. Software designers and developers discover how to use threat modeling during the specification phase of a new project or a major revision-from verifying application architecture to identifying and evaluating threats and designing countermeasures. Test engineers discover how to apply threat-modeling principles when creating test plans to verify results. It's the essential, high-level reference for software professionals responsible for designing, refining, and maximizing the security features in their application architecture.
No comments:
Post a Comment