Real-World Cryptography
eBook - ePub

Real-World Cryptography

  1. 400 pages
  2. English
  3. ePUB (mobile friendly)
  4. Available on iOS & Android
eBook - ePub

Real-World Cryptography

About this book

"A staggeringly comprehensive review of the state of modern cryptography. Essential for anyone getting up to speed in information security." - Thomas Doylend, Green Rocket Security

An all-practical guide to the cryptography behind common tools and protocols that will help you make excellent security choices for your systems and applications.

In Real-World Cryptography, you will find:

    Best practices for using cryptography
    Diagrams and explanations of cryptographic algorithms
    Implementing digital signatures and zero-knowledge proofs
    Specialized hardware for attacks and highly adversarial environments
    Identifying and fixing bad practices
    Choosing the right cryptographic tool for any problem

Real-World Cryptography reveals the cryptographic techniques that drive the security of web APIs, registering and logging in users, and even the blockchain. You’ll learn how these techniques power modern security, and how to apply them to your own projects. Alongside modern methods, the book also anticipates the future of cryptography, diving into emerging and cutting-edge advances such as cryptocurrencies, and post-quantum cryptography. All techniques are fully illustrated with diagrams and examples so you can easily see how to put them into practice.

Purchase of the print book includes a free eBook in PDF, Kindle, and ePub formats from Manning Publications.

About the technology
Cryptography is the essential foundation of IT security. To stay ahead of the bad actors attacking your systems, you need to understand the tools, frameworks, and protocols that protect your networks and applications. This book introduces authentication, encryption, signatures, secret-keeping, and other cryptography concepts in plain language and beautiful illustrations.

About the book
Real-World Cryptography teaches practical techniques for day-to-day work as a developer, sysadmin, or security practitioner. There’s no complex math or jargon: Modern cryptography methods are explored through clever graphics and real-world use cases. You’ll learn building blocks like hash functions and signatures; cryptographic protocols like HTTPS and secure messaging; and cutting-edge advances like post-quantum cryptography and cryptocurrencies. This book is a joy to read—and it might just save your bacon the next time you’re targeted by an adversary after your data.

What's inside

    Implementing digital signatures and zero-knowledge proofs
    Specialized hardware for attacks and highly adversarial environments
    Identifying and fixing bad practices
    Choosing the right cryptographic tool for any problem

About the reader
For cryptography beginners with no previous experience in the field.

About the author
David Wong is a cryptography engineer. He is an active contributor to internet standards including Transport Layer Security.

Table of Contents
PART 1 PRIMITIVES: THE INGREDIENTS OF CRYPTOGRAPHY
1 Introduction
2 Hash functions
3 Message authentication codes
4 Authenticated encryption
5 Key exchanges
6 Asymmetric encryption and hybrid encryption
7 Signatures and zero-knowledge proofs
8 Randomness and secrets
PART 2 PROTOCOLS: THE RECIPES OF CRYPTOGRAPHY
9 Secure transport
10 End-to-end encryption
11 User authentication
12 Crypto as in cryptocurrency?
13 Hardware cryptography
14 Post-quantum cryptography
15 Is this it? Next-generation cryptography
16 When and where cryptography fails

Frequently asked questions

Yes, you can cancel anytime from the Subscription tab in your account settings on the Perlego website. Your subscription will stay active until the end of your current billing period. Learn how to cancel your subscription.
At the moment all of our mobile-responsive ePub books are available to download via the app. Most of our PDFs are also available to download and we're working on making the final remaining ones downloadable now. Learn more here.
Perlego offers two plans: Essential and Complete
  • Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
  • Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Both plans are available with monthly, semester, or annual billing cycles.
We are an online textbook subscription service, where you can get access to an entire online library for less than the price of a single book per month. With over 1 million books across 1000+ topics, we’ve got you covered! Learn more here.
Look out for the read-aloud symbol on your next book to see if you can listen to it. The read-aloud tool reads text aloud for you, highlighting the text as it is being read. You can pause it, speed it up and slow it down. Learn more here.
Yes! You can use the Perlego app on both iOS or Android devices to read anytime, anywhere — even offline. Perfect for commutes or when you’re on the go.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Yes, you can access Real-World Cryptography by David Wong in PDF and/or ePUB format, as well as other popular books in Computer Science & Client-Server Computing. We have over one million books available in our catalogue for you to explore.

Information

Table of contents

  1. Real-World Cryptography
  2. Copyright
  3. dedication
  4. contents
  5. front matter
  6. Part 1. Primitives: The ingredients of cryptography
  7. 1 Introduction
  8. 2 Hash functions
  9. 3 Message authentication codes
  10. 4 Authenticated encryption
  11. 5 Key exchanges
  12. 6 Asymmetric encryption and hybrid encryption
  13. 7 Signatures and zero-knowledge proofs
  14. 8 Randomness and secrets
  15. Part 2. Protocols: The recipes of cryptography
  16. 9 Secure transport
  17. 10 End-to-end encryption
  18. 11 User authentication
  19. 12 Crypto as in cryptocurrency?
  20. 13 Hardware cryptography
  21. 14 Post-quantum cryptography
  22. 15 Is this it? Next-generation cryptography
  23. 16 When and where cryptography fails
  24. Appendix. Answers to exercises
  25. index