Table of Contents for
Serious Cryptography

Version ebook / Retour

Cover image for bash Cookbook, 2nd Edition Serious Cryptography by Jean-Philippe Aumasson Published by No Starch Press, 2017
  1. Cover Page
  2. Title Page
  3. Copyright Page
  4. Brief Contents
  5. Contents in Detail
  6. Foreword
  7. Preface
  8. Abbreviations
  9. Chapter 1: Encryption
  10. Chapter 2: Randomness
  11. Chapter 3: Cryptographic Security
  12. Chapter 4: Block Ciphers
  13. Chapter 5: Stream Ciphers
  14. Chapter 6: Hash Functions
  15. Chapter 7: Keyed Hashing
  16. Chapter 8: Authenticated Encryption
  17. Chapter 9: Hard Problems
  18. Chapter 10: RSA
  19. Chapter 11: Diffie–Hellman
  20. Chapter 12: Elliptic Curves
  21. Chapter 13: TLS
  22. Chapter 14: Quantum and Post-Quantum
  23. Index
  24. Serious Cryptography
  25. Resources
  26. serious Cryptography
  27. serious Cryptography

Contents in Detail

  1. Cover Page
  2. Title Page
  3. Copyright Page
  4. Brief Contents
  5. Contents in Detail
  6. Foreword
  7. Preface
    1. This Book’s Approach
    2. Who This Book Is For
    3. How This Book Is Organized
    4. Acknowledgments
  8. Abbreviations
  9. Chapter 1: Encryption
    1. The Basics
    2. Classical Ciphers
    3. How Ciphers Work
    4. Perfect Encryption: The One-Time Pad
    5. Encryption Security
    6. Asymmetric Encryption
    7. When Ciphers Do More Than Encryption
    8. How Things Can Go Wrong
    9. Further Reading
  10. Chapter 2: Randomness
    1. Random or Non-Random?
    2. Randomness as a Probability Distribution
    3. Entropy: A Measure of Uncertainty
    4. Random Number Generators (RNGs) and Pseudorandom Number Generators (PRNGs)
    5. Real-World PRNGs
    6. How Things Can Go Wrong
    7. Further Reading
  11. Chapter 3: Cryptographic Security
    1. Defining the Impossible
    2. Quantifying Security
    3. Achieving Security
    4. Generating Keys
    5. How Things Can Go Wrong
    6. Further Reading
  12. Chapter 4: Block Ciphers
    1. What Is a Block Cipher?
    2. How to Construct Block Ciphers
    3. The Advanced Encryption Standard (AES)
    4. Implementing AES
    5. Modes of Operation
    6. How Things Can Go Wrong
    7. Further Reading
  13. Chapter 5: Stream Ciphers
    1. How Stream Ciphers Work
    2. Hardware-Oriented Stream Ciphers
    3. Software-Oriented Stream Ciphers
    4. How Things Can Go Wrong
    5. Further Reading
  14. Chapter 6: Hash Functions
    1. Secure Hash Functions
    2. Building Hash Functions
    3. The SHA Family of Hash Functions
    4. The BLAKE2 Hash Function
    5. How Things Can Go Wrong
    6. Further Reading
  15. Chapter 7: Keyed Hashing
    1. Message Authentication Codes (MACs)
    2. Pseudorandom Functions (PRFs)
    3. Creating Keyed Hashes from Unkeyed Hashes
    4. Creating Keyed Hashes from Block Ciphers: CMAC
    5. Dedicated MAC Designs
    6. How Things Can Go Wrong
    7. Further Reading
  16. Chapter 8: Authenticated Encryption
    1. Authenticated Encryption Using MACs
    2. Authenticated Ciphers
    3. AES-GCM: The Authenticated Cipher Standard
    4. OCB: An Authenticated Cipher Faster than GCM
    5. SIV: The Safest Authenticated Cipher?
    6. Permutation-Based AEAD
    7. How Things Can Go Wrong
    8. Further Reading
  17. Chapter 9: Hard Problems
    1. Computational Hardness
    2. Complexity Classes
    3. The Factoring Problem
    4. The Discrete Logarithm Problem
    5. How Things Can Go Wrong
    6. Further Reading
  18. Chapter 10: RSA
    1. The Math Behind RSA
    2. The RSA Trapdoor Permutation
    3. RSA Key Generation and Security
    4. Encrypting with RSA
    5. Signing with RSA
    6. RSA Implementations
    7. How Things Can Go Wrong
    8. Further Reading
  19. Chapter 11: Diffie–Hellman
    1. The Diffie–Hellman Function
    2. The Diffie–Hellman Problems
    3. Key Agreement Protocols
    4. Diffie–Hellman Protocols
    5. How Things Can Go Wrong
    6. Further Reading
  20. Chapter 12: Elliptic Curves
    1. What Is an Elliptic Curve?
    2. The ECDLP Problem
    3. Diffie–Hellman Key Agreement over Elliptic Curves
    4. Choosing a Curve
    5. How Things Can Go Wrong
    6. Further Reading
  21. Chapter 13: TLS
    1. Target Applications and Requirements
    2. The TLS Protocol Suite
    3. TLS 1.3 Improvements over TLS 1.2
    4. The Strengths of TLS Security
    5. How Things Can Go Wrong
    6. Further Reading
  22. Chapter 14: Quantum and Post-Quantum
    1. How Quantum Computers Work
    2. Quantum Speed-Up
    3. Why Is It So Hard to Build a Quantum Computer?
    4. Post-Quantum Cryptographic Algorithms
    5. How Things Can Go Wrong
    6. Further Reading
  23. Index
  24. Resources
  1. iii
  2. iv
  3. v
  4. vi
  5. vii
  6. viii
  7. ix
  8. x
  9. xi
  10. xii
  11. xiii
  12. xiv
  13. xv
  14. xvi
  15. xvii
  16. xviii
  17. xix
  18. xx
  19. xxi
  20. xxii
  21. 1
  22. 2
  23. 3
  24. 4
  25. 5
  26. 6
  27. 7
  28. 8
  29. 9
  30. 10
  31. 11
  32. 12
  33. 13
  34. 14
  35. 15
  36. 16
  37. 17
  38. 18
  39. 19
  40. 20
  41. 21
  42. 22
  43. 23
  44. 24
  45. 25
  46. 26
  47. 27
  48. 28
  49. 29
  50. 30
  51. 31
  52. 32
  53. 33
  54. 34
  55. 35
  56. 36
  57. 37
  58. 38
  59. 39
  60. 40
  61. 41
  62. 42
  63. 43
  64. 44
  65. 45
  66. 46
  67. 47
  68. 48
  69. 49
  70. 50
  71. 51
  72. 52
  73. 53
  74. 54
  75. 55
  76. 56
  77. 57
  78. 58
  79. 59
  80. 60
  81. 61
  82. 62
  83. 63
  84. 64
  85. 65
  86. 66
  87. 67
  88. 68
  89. 69
  90. 70
  91. 71
  92. 72
  93. 73
  94. 74
  95. 75
  96. 76
  97. 77
  98. 78
  99. 79
  100. 80
  101. 81
  102. 82
  103. 83
  104. 84
  105. 85
  106. 86
  107. 87
  108. 88
  109. 89
  110. 90
  111. 91
  112. 92
  113. 93
  114. 94
  115. 95
  116. 96
  117. 97
  118. 98
  119. 99
  120. 100
  121. 101
  122. 102
  123. 103
  124. 104
  125. 105
  126. 106
  127. 107
  128. 108
  129. 109
  130. 110
  131. 111
  132. 112
  133. 113
  134. 114
  135. 115
  136. 116
  137. 117
  138. 118
  139. 119
  140. 120
  141. 121
  142. 122
  143. 123
  144. 124
  145. 125
  146. 126
  147. 127
  148. 128
  149. 129
  150. 130
  151. 131
  152. 132
  153. 133
  154. 134
  155. 135
  156. 136
  157. 137
  158. 138
  159. 139
  160. 140
  161. 141
  162. 142
  163. 143
  164. 144
  165. 145
  166. 146
  167. 147
  168. 148
  169. 149
  170. 150
  171. 151
  172. 152
  173. 153
  174. 154
  175. 155
  176. 156
  177. 157
  178. 158
  179. 159
  180. 160
  181. 161
  182. 162
  183. 163
  184. 164
  185. 165
  186. 166
  187. 167
  188. 168
  189. 169
  190. 170
  191. 171
  192. 172
  193. 173
  194. 174
  195. 175
  196. 176
  197. 177
  198. 178
  199. 179
  200. 180
  201. 181
  202. 182
  203. 183
  204. 184
  205. 185
  206. 186
  207. 187
  208. 188
  209. 189
  210. 190
  211. 191
  212. 192
  213. 193
  214. 194
  215. 195
  216. 196
  217. 197
  218. 198
  219. 199
  220. 200
  221. 201
  222. 202
  223. 203
  224. 204
  225. 205
  226. 206
  227. 207
  228. 208
  229. 209
  230. 210
  231. 211
  232. 212
  233. 213
  234. 214
  235. 215
  236. 216
  237. 217
  238. 218
  239. 219
  240. 220
  241. 221
  242. 222
  243. 223
  244. 224
  245. 225
  246. 226
  247. 227
  248. 228
  249. 229
  250. 230
  251. 231
  252. 232
  253. 233
  254. 234
  255. 235
  256. 236
  257. 237
  258. 238
  259. 239
  260. 240
  261. 241
  262. 242
  263. 243
  264. 244
  265. 245
  266. 246
  267. 247
  268. 248
  269. 249
  270. 250
  271. 251
  272. 252
  273. 253
  274. 254
  275. 255
  276. 256
  277. 257
  278. 258
  279. 259
  280. 260
  281. 261
  282. 262
  283. 263
  284. 264
  285. 265
  286. 266
  287. 267
  288. 268
  289. 269
  290. 270
  291. 271
  292. 272
  293. 273
  294. 274
  295. 275
  296. 276
  297. 277
  298. 278
  299. 279
  300. 280
  301. 281
  302. 282
  303. 283
  304. 284
  305. 285
  306. 286
  307. 287
  308. 288
  309. 289
  310. 290
  311. 291
  312. 292
Back to top