Description

Book Synopsis
Security is the number one concern for businesses worldwide. The gold standard for attaining security is cryptography because it provides the most reliable tools for storing or transmitting digital information.

Table of Contents
Preface.

1. Our Design Philosophy.

2. The Context of Cryptography.

3. Introduction to Cryptography.

I Message Security.

4. Block Ciphers.

5. Block Cipher Modes.

6. Hash Functions.

7. Message Authentication Codes.

8. The Secure Channel.

9. Implementation. Issues (I).

II Key Negotiation.

10. Generating Randomness.

11. Primes.

12. Diffie-Hellman.

13. RSA.

14. Introduction to Cryptographic Protocols.

15. Negotiation Protocol.

16. Implementation Issues.

III Key Management.

17. The Clock.

18. Key Servers.

19. The Dream of PKI.

20. PKI Reality.

21. PKI Practicalities.

22. Storing Secrets.

IV Miscellaneous.

23. Standards.

24. Patents.

25. Involving Experts.

Acknowledgments.

Bibliography.

Index.

Practical Cryptography

Product form

£27.96

Includes FREE delivery

RRP £34.95 – you save £6.99 (20%)

Order before 4pm tomorrow for delivery by Mon 22 Dec 2025.

A Paperback / softback by Niels Ferguson, Bruce Schneier

15 in stock


    View other formats and editions of Practical Cryptography by Niels Ferguson

    Publisher: John Wiley & Sons Inc
    Publication Date: 15/04/2003
    ISBN13: 9780471223573, 978-0471223573
    ISBN10: 0471223573

    Description

    Book Synopsis
    Security is the number one concern for businesses worldwide. The gold standard for attaining security is cryptography because it provides the most reliable tools for storing or transmitting digital information.

    Table of Contents
    Preface.

    1. Our Design Philosophy.

    2. The Context of Cryptography.

    3. Introduction to Cryptography.

    I Message Security.

    4. Block Ciphers.

    5. Block Cipher Modes.

    6. Hash Functions.

    7. Message Authentication Codes.

    8. The Secure Channel.

    9. Implementation. Issues (I).

    II Key Negotiation.

    10. Generating Randomness.

    11. Primes.

    12. Diffie-Hellman.

    13. RSA.

    14. Introduction to Cryptographic Protocols.

    15. Negotiation Protocol.

    16. Implementation Issues.

    III Key Management.

    17. The Clock.

    18. Key Servers.

    19. The Dream of PKI.

    20. PKI Reality.

    21. PKI Practicalities.

    22. Storing Secrets.

    IV Miscellaneous.

    23. Standards.

    24. Patents.

    25. Involving Experts.

    Acknowledgments.

    Bibliography.

    Index.

    Recently viewed products

    © 2025 Book Curl

      • American Express
      • Apple Pay
      • Diners Club
      • Discover
      • Google Pay
      • Maestro
      • Mastercard
      • PayPal
      • Shop Pay
      • Union Pay
      • Visa

      Login

      Forgot your password?

      Don't have an account yet?
      Create account