Security is the number one concern for businesses worldwide. The gold standard for attaining security is cryptography because it provides the most reliable tools for storing or transmitting digital information. Written by Niels Ferguson, lead cryptographer for Counterpane, Bruce Schneier's security company, and Bruce Schneier himself, this is the much anticipated follow-up book to Schneier's seminal encyclopedic reference, Applied Cryptography, Second Edition (0-471-11709-9), which has sold more than 150,000 copies.
Niels Ferguson (Amsterdam, Netherlands) is a cryptographic engineer and consultant at Counterpane Internet Security. He has extensive experience in the creation and design of security algorithms, protocols, and multinational security infrastructures. Previously, Ferguson was a cryptographer for DigiCash and CWI. At CWI he developed the first generation of off-line payment protocols. He has published numerous scientific papers.
Bruce Schneier (Minneapolis, MN) is Founder and Chief Technical Officer at Counterpane Internet Security, a managed-security monitoring company. He is also the author of Secrets and Lies: Digital Security in a Networked World (0-471-25311-1).
15 pages matching patent in this book
Results 1-3 of 15
What people are saying - Write a review
We haven't found any reviews in the usual places.
The Context of Cryptography
Introduction to Cryptography
23 other sections not shown
Other editions - View all
algorithm Alice and Bob Alice's authentication birthday attack bits long bits of entropy block cipher block cipher mode bytes CBC-MAC certificate chapter choose a random ciphertext ciphertext blocks clock collision attacks communicate compute counter cryptographic protocols cryptographic systems decryption discuss divisor easy encryption ensure entropy error example hash function HMAC implement input key negotiation protocol key server key size key stream large number MAC function MAC value memory message number modular modulo multiple nonce output password patent pool prime private key PRNG problem public key random data random number real random received requires reseed result S-boxes secret key secure channel security level security system seed file simple single situation solution specifications standard string structure subgroup techniques transaction trust Twofish UMAC verify wipe woop
Codes: The Guide to Secrecy From Ancient to Modern Times
Richard A. Mollin
Limited preview - 2005
All Book Search results »
Reconciling Information Exchange and Confidentiality — A Formal Approach
Limited preview - 2007