real-world_cryptography_by_david_wong

Real-World Cryptography by David Wong

Book Summary

An all-practical guide to the cryptography behind common tools and cryptographic protocols that will help you make excellent security choices for your systems and applications.

In Real-World Cryptography, you will find:

  • Best practices for using cryptography
  • Diagrams and explanations of cryptographic algorithms
  • Implementing digital signatures and zero-knowledge proofs
  • Specialized hardware for attacks and highly adversarial environments
  • Identifying and fixing bad practices
  • Choosing the right cryptographic tool for any problem

Real-World Cryptography reveals the cryptographic techniques that drive the security of web APIs, registering and logging in users, and even the blockchain. You’ll learn how these techniques power modern security, and how to apply them to your own projects. Alongside modern methods, the book also anticipates the future of cryptography, diving into emerging and cutting-edge advances such as cryptocurrencies, and post-quantum cryptography. All techniques are fully illustrated with diagrams and examples so you can easily see how to put them into practice.

Purchase of the print book includes a free eBook in PDF, Kindle, and ePub formats from Manning Publications.

About the technology

Cryptography is the essential foundation of IT security. To stay ahead of the bad actors attacking your systems, you need to understand the tools, frameworks, and protocols that protect your networks and applications. This book introduces authentication, encryption, signatures, secret-keeping, and other cryptography concepts in plain language and beautiful illustrations.

Real-World Cryptography teaches practical techniques for day-to-day work as a developer, sysadmin, or security practitioner. There’s no complex math or jargon: Modern cryptography methods are explored through clever graphics and real-world use cases. You’ll learn building blocks like hash functions and signatures; cryptographic protocols like HTTPS and secure messaging; and cutting-edge advances like post-quantum cryptography and cryptocurrencies. This book is a joy to read—and it might just save your bacon the next time you’re targeted by an adversary after your data.

What's inside

  • Implementing digital signatures and zero-knowledge proofs
  • Specialized hardware for attacks and highly adversarial environments
  • Identifying and fixing bad practices
  • Choosing the right cryptographic tool for any problem

About the reader

For cryptography beginners with no previous experience in the field.

Table of Contents

PART 1 PRIMITIVES: THE INGREDIENTS OF CRYPTOGRAPHY

  • 1 Introduction
  • 2 Hash functions
  • 3 Message authentication codes
  • 4 Authenticated encryption
  • 5 Key exchanges
  • 6 Asymmetric encryption and hybrid encryption
  • 7 Signatures and zero-knowledge proofs
  • 8 Randomness and secrets

PART 2 PROTOCOLS: THE RECIPES OF CRYPTOGRAPHY

Reviews

“A staggeringly comprehensive review of the state of modern cryptography. Essential for anyone getting up to speed in information security.” — Thomas Doylend, Green Rocket Security

“Covers all the important parts of applied cryptography. A must-read for every Java developer.” — Harald Kuhn, TurnFriendly

“An in-depth introduction to cryptography, covering hot topics like blockchain and quantum computing.” — Gábor László Hajba, ProLion

“A best-in-category book that takes you all the way from curious novice to confident practitioner.” — William Rudenmalm, Creandum

About the Author

David Wong is a senior engineer working on Blockchain at Facebook. He is an active contributor to internet standards like Transport Layer Security (TLS) and to the applied cryptography research community. David is a recognized authority in the field of applied cryptography; he’s spoken at large security conferences like Black Hat and DEF CON and has delivered cryptography training sessions in the industry.

Product Details

Research It More

Fair Use Sources

Cryptography: Encryption, Decryption, Quantum encryption is FUD!

. (navbar_cryptography)


© 1994 - 2024 Cloud Monk Losang Jinpa or Fair Use. Disclaimers

SYI LU SENG E MU CHYWE YE. NAN. WEI LA YE. WEI LA YE. SA WA HE.


real-world_cryptography_by_david_wong.txt · Last modified: 2024/05/01 04:41 by 127.0.0.1

Donate Powered by PHP Valid HTML5 Valid CSS Driven by DokuWiki