Applied Cryptography: Protocols, Algorithms, and Source Code in CAfter a brief account of the history of cryptography, the latest data on encryption protocols and techniques are explained. Describes present-day applications ranging from electronic cash to anonymous messaging and current security concerns. The second section assumes fairly sophisticated knowledge of the C programming language and features numerous source code fragments. Practical implementations of the code are listed throughout the book's second half. |
Common terms and phrases
Advances in Cryptology-CRYPTO Alice and Bob Alice sends Alice's authentication Berlin block algorithm block cipher byte ByteType Carol chip choose ciphertext Cryptology cryptosystem database decrypts the message define differential cryptanalysis digital signature discrete logarithms document encrypted message encryption key factor fprintf(stderr hash value implementation input integer Kerberos keystream knapsack LFSR Mallet mode modulo money order NIST one-time pad one-way function one-way hash function operations output pair password patent Peggy permutation plaintext polynomial private key problem Proceedings protocol pseudo-random public key public-key algorithms public-key cryptography quadratic residue random bit random number random string result round S-boxes scheme secret key Section sends Bob sequence server session key Shamir signed Springer-Verlag standard step stream ciphers sub-blocks subkeys subliminal channel timestamp Trent unsigned char unsigned long users verify Victor void votes weak keys XORed zero-knowledge