Cryptography for Developers

本书为开发者提供了一条解决密码学问题的清晰路径,涵盖了从ASN.1编码规则到随机数生成,再到高级加密标准(AES)、哈希函数、消息认证码算法等内容。书中还深入探讨了公钥算法和大整数运算的技术细节。

摘要生成于 C知道 ,由 DeepSeek-R1 满血版支持, 前往体验 >

版权声明:原创作品,允许转载,转载时请务必以超链接形式标明文章原始出版、作者信息和本声明。否则将追究法律责任。 http://blog.youkuaiyun.com/topmvp - topmvp

Developers tasked with security problems are often not cryptographers themselves. They are bright people who, with careful guidance, can implement secure cryptosystems. This book will guide developers in their journey towards solving cryptographic problems. If you have ever asked yourself "just how do I setup AES?" then this text is for you.

*ASN.1 Encoding The chapter on ASN.1 encoding delivers a treatment of the Abstract Syntax Notation One (ASN.1) encoding rules for data elements such as strings, binary strings, integers, dates and times, and sets and sequences.
*Random Number Generation This chapter discusses the design and construction of standard random number generators (RNGs) such as those specified by NIST.
*Advanced Encryption Standard This chapter discusses the AES block cipher design, implementation trade-offs, side channel hazards, and modes of use. It concentrates on the key design elements important to implementers and how to exploit them in various trade-off conditions.
*Hash Functions This chapter discusses collision resistance, provides examples of exploits, and concludes with known incorrect usage patterns.
*Message Authentication Code Algorithms This chapter discusses the HMAC and CMAC Message
*Authentication Code (MAC) algorithms, which are constructed from hash and cipher functions.
*Encrypt and Authenticate Modes This chapter discusses the IEEE and NIST encrypt and authenticate modes GCM and CCM. Both modes introduce new concepts to cryptographic functions. Focus is given to the concept of replay attacks, and initialization techniques are explored in depth.
*Large Integer Arithmetic This chapter discusses the techniques behind manipulating large integers such as those used in public key algorithms.
*Public Key Algorithms This chapter introduces public key cryptography, including the RSA algorithm and its related PKCS #1 padding schemes. It also introduces new math in the form of various elliptic curve point multipliers.

http://rapidshare.com/files/7696136/N1597491047.rar
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值