Serious Cryptography

در کتاب Serious Cryptography (رمزنگاری داده) شما به صورت کاملا حرفه ای با نحوه رمزنگاری ذخیره‌سازی و انتقال دیتا به شیوه‌ای امن است به طوری که در فرآیند ارسال و دریافت دیتا در بستر ناامن اینترنت، صرفاً افراد مد نظر ما توانایی رمزگشایی دیتای رمزگذاری‌شده را داشته باشند و برای این منظور نیز می‌توان تکنیک‌های رمزگذاری و رمزگشایی به شیوۀ Symmetric (متقارن) و Asymmetric (نامتقارن) را به کار برد که در آن‌ها یک یا چند کلید برای تبدیل دیتا از حالت ساده به فرم رمزگذاری‌شده و بالعکس مورد استفاده قرار می‌گیرد…

لینک دانلود کتاب Serious Cryptography


دانلود – حجم : 61 مگابايت

رمز فايل:

A Practical Introduction to Modern Encryption
Price: $49.95
Publisher: nostarch
By: Jean-Philippe Aumasson
Date: November 2017
ISBN-13: 9781593278267
Download Chapter 4: Block Ciphers

This practical guide to modern encryption breaks down the fundamental mathematical concepts at the heart of cryptography without shying away from meaty discussions of how they work. You’ll learn about authenticated encryption, secure randomness, hash functions, block ciphers, and public-key techniques such as RSA and elliptic curve cryptography.

You’ll also learn:

Key concepts in cryptography, such as computational security, attacker models, and forward secrecy
The strengths and limitations of the TLS protocol behind HTTPS secure websites
Quantum computation and post-quantum cryptography
About various vulnerabilities by examining numerous code examples and use cases
How to choose the best algorithm or protocol and ask vendors the right questions

Each chapter includes a discussion of common implementation mistakes using real-world examples and details what could go wrong and how to avoid these pitfalls.

Whether you’re a seasoned practitioner or a beginner looking to dive into the field, Serious Cryptography will provide a complete survey of modern encryption and its applications.

Author Bio

Jean-Philippe Aumasson is Principal Research Engineer at Kudelski Security, an international cybersecurity company based in Switzerland. He has authored more than 40 research ­articles in the field of cryptography and cryptanalysis and designed the widely used hash functions BLAKE2 and SipHash. He speaks regularly at information security conferences and has presented at Black Hat, DEF CON, Troopers, and ­Infiltrate.

Table of contents

Foreword by Matthew D. Green
Chapter 1: Encryption
Chapter 2: Randomness
Chapter 3: Cryptographic Security
Chapter 4: Block Ciphers
Chapter 5: Stream Ciphers
Chapter 6: Hash Functions
Chapter 7: Keyed Hashing
Chapter 8: Authenticated Encryption
Chapter 9: Hard Problems
Chapter 10: RSA
Chapter 11: Diffie-Hellman
Chapter 12: Elliptic Curves
Chapter 13: TLS
Chapter 14: Quantum and Post-Quantum

View the detailed Table of Contents
View the Index


آدرس ایمیل شما منتشر نخواهد شد.