Handbook of Applied Cryptography (Google eBook)Cryptography, in particular publickey cryptography, has emerged in the last 20 years as an important discipline that is not only the subject of an enormous amount of research, but provides the foundation for information security in many applications. Standards are emerging to meet the demands for cryptographic protection in most areas of data communications. Publickey cryptographic techniques are now in widespread use, especially in the financial services industry, in the public sector, and by individuals for their personal privacy, such as in electronic mail. This Handbook will serve as a valuable reference for the novice as well as for the expert who needs a wider scope of coverage within the area of cryptography. It is a necessary and timely guide for professionals who practice the art of cryptography. The Handbook of Applied Cryptography provides a treatment that is multifunctional: Now in its third printing, this is the definitive cryptography reference that the novice as well as experienced developers, designers, researchers, engineers, computer scientists, and mathematicians alike will use. 
What people are saying  Write a review
User ratings
5 stars 
 
4 stars 
 
3 stars 
 
2 stars 
 
1 star 

Review: Handbook of Applied Cryptography
User Review  Mohammad Shaker  GoodreadsHeavy in maths. A reference and not a book to read for the first time if you want to learn about Cryptography. Read full review
Review: Handbook of Applied Cryptography
User Review  Mohammad Shaker  GoodreadsHeavy in maths. A reference and not a book to read for the first time if you want to learn about Cryptography. Read full review
Contents
1  
Mathematical Background  49 
NumberTheoretic Reference Problems  87 
PublicKey Parameters  133 
Pseudorandom Bits and Sequences  169 
Stream Ciphers  191 
Block Ciphers  223 
PublicKey Encryption  283 
Digital Signatures  425 
Key Establishment Protocols  489 
Key Management Techniques  543 
Efficient Implementation  591 
Patents and Standards  635 
Bibliography of Papers from Selected Cryptographic Forums  663 
References  703 
755  
Common terms and phrases
Advances in Cryptology Advances in CryptologyCRYPTO adversary Algorithm attack binary bitlength block cipher certificate ciphertext compression function compute cryptanalysis CRYPTO cryptographic Cryptology cryptosystem data integrity decryption defined Definition denotes DiffieHellman digital signature digital signature scheme discrete logarithm problem efficient ElGamal elliptic curve entity authentication Example exponent exponentiation Fact factor finite field hash functions identification input irreducible polynomial ISO/IEC iterated key agreement key establishment key management keystream LFSR linear complexity LNCS message authentication method modular multiplication modulo nbit Note onetime oneway function output sequence pair parameters party password patent permutation plaintext polynomial positive integer preimage private key properties protocol pseudorandom public key publickey encryption quadratic random number rithm Sboxes secret key secret sharing Shamir specified standard stream ciphers subset subset sum problem symmetrickey Table techniques timestamp tion trusted values vector verify zeroknowledge
Popular passages
Page 4  Cryptography is the study of mathematical techniques related to aspects of information security such as confidentiality, data integrity, entity authentication, and data origin authentication. Cryptography is not the only means of providing information security,
Page 4  entering into a communication should identify each other. Information delivered over a channel should be authenticated as to origin, date of origin, data content, time sent, etc. For these reasons this aspect of cryptography is usually subdivided into two major classes:
Page 33  is a computationally efficient function mapping binary strings of arbitrary length to binary strings of some fixed length, called hashvalues.
Page 20  What makes them useful is the fact that the encryption transformation can change for each symbol of plaintext being encrypted. In situations where transmission errors are highly probable, stream ciphers are advantageous because they have no error propagation. They can also be used when the data must be processed one symbol at a time (eg, if the equipment has no memory or buffering of data is limited).