Cryptography for developers

The only guide for software developers who must learn and implement cryptography safely and cost effectively.Cryptography for Developers begins with a chapter that introduces the subject of cryptography to the reader. The second chapter discusses how to implement large integer arithmetic as required...

Full description

Saved in:
Bibliographic Details
Main Authors St. Denis, Tom, Johnson, Simon
Format eBook Book
LanguageEnglish
Published Rockland, Mass Syngress 2007
Elsevier Science & Technology Books
Syngress Publishers
Edition1
Subjects
Online AccessGet full text
ISBN1597491047
9781597491044
DOI10.1016/B978-1-59749-104-4.X5000-6

Cover

Loading…
Abstract The only guide for software developers who must learn and implement cryptography safely and cost effectively.Cryptography for Developers begins with a chapter that introduces the subject of cryptography to the reader. The second chapter discusses how to implement large integer arithmetic as required by RSA and ECC public key algorithms The subsequent chapters discuss the implementation of symmetric ciphers, one-way hashes, message authentication codes, combined authentication and encryption modes, public key cryptography and finally portable coding practices. Each chapter includes in-depth discussion on memory/size/speed performance trade-offs as well as what cryptographic problems are solved with the specific topics at hand.The author is the developer of the industry standard cryptographic suite of tools called LibTomA regular expert speaker at industry conferences and events on this development
AbstractList The only guide for software developers who must learn and implement cryptography safely and cost effectively.Cryptography for Developers begins with a chapter that introduces the subject of cryptography to the reader. The second chapter discusses how to implement large integer arithmetic as required by RSA and ECC public key algorithms The subsequent chapters discuss the implementation of symmetric ciphers, one-way hashes, message authentication codes, combined authentication and encryption modes, public key cryptography and finally portable coding practices. Each chapter includes in-depth discussion on memory/size/speed performance trade-offs as well as what cryptographic problems are solved with the specific topics at hand.The author is the developer of the industry standard cryptographic suite of tools called LibTomA regular expert speaker at industry conferences and events on this development
The only guide for software developers who must learn and implement cryptography safely and cost effectively.The book begins with a chapter that introduces the subject of cryptography to the reader. The second chapter discusses how to implement large integer arithmetic as required by RSA and ECC public key algorithms The subsequent chapters discuss the implementation of symmetric ciphers, one-way hashes, message authentication codes, combined authentication and encryption modes, public key cryptography and finally portable coding practices. Each chapter includes in-depth discussion on memory/size/speed performance trade-offs as well as what cryptographic problems are solved with the specific topics at hand. * The author is the developer of the industry standard cryptographic suite of tools called LibTom* A regular expert speaker at industry conferences and events on this development* The book has a companion Web site with over 300-pages of text on implementing multiple precision arithmetic
Author Johnson, Simon
St. Denis, Tom
Author_xml – sequence: 1
  fullname: St. Denis, Tom
– sequence: 2
  fullname: Johnson, Simon
BackLink https://cir.nii.ac.jp/crid/1130282272498304512$$DView record in CiNii
BookMark eNpVkEtLw0AQgFd8YFv7C7xUEcFD6sw-stmjLfUBBS8i3pZNsmtjQzZmY7X_3vQB4hxmGObjm2H65KjylSXkEmGMgPHtRMkkwkgoyVWEwCM-fhMAEMUHZNjNABIQwLgQh6SPW6yj5AnpYUy7VsRwSoYhfMAmJGcce-R82qzr1r83pl6sR843o9yubOlr24QzcuxMGexwXwfk9X72Mn2M5s8PT9O7eWQSioxHqDg6nmdMSOcsOsWVBZUZJqhNs4zSVCVJmrGUAjPKsFg6GudSWTRg8zxmA3K9E4dlUZbBu1an3i8D5T9Sp8vQnYsxMtaBNzvQhKX9DgtftkGvSrul9b8fdOzFXmqcaYqdUa-o_nvN3-K68Z9fNrR6q8ps1Tam1LPJlKFCpTrwagdWRaGzYpMRGdCEUkm5ShhwgZT9AhZ5dXo
ContentType eBook
Book
DBID RYH
OHILO
OODEK
DEWEY 005.82
DOI 10.1016/B978-1-59749-104-4.X5000-6
DatabaseName CiNii Complete
O'Reilly Online Learning: Corporate Edition
O'Reilly Online Learning: Academic/Public Library Edition
DatabaseTitleList

DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISBN 9780080503455
0080503454
Edition 1
ExternalDocumentID bks00016133
9780080503455
1597491047
EBC319199
BA84380484
Genre Electronic books
GroupedDBID -VQ
-VX
089
20A
35M
38.
A4I
A4J
AAAAS
AABBV
AAFKH
AAFQY
AAKGN
AALIM
AALRI
AANYM
AAORS
AAVWF
AAXUO
AAYWO
AAZNM
ABARN
ABGKT
ABGWT
ABIAV
ABIKZ
ABIWA
ABLXK
ABMAC
ABMRC
ABQNV
ABQPQ
ABQQC
ABRSK
ABWNX
ACHHS
ACHUA
ACLGV
ACXMD
ADBND
ADCEY
ADHWY
ADVEM
ADWOK
ADXSK
AECLD
AEHEP
AERYV
AEZAQ
AFOJC
AFQEX
AFTHB
AFXKH
AGAMA
AHFFV
AHJNT
AHPGB
AHQWO
AHWGJ
AIXPE
AJFER
AKHYG
ALMA_UNASSIGNED_HOLDINGS
ALTAS
AMYDA
APVFW
ASVZH
ATDNW
AVWMD
AZZ
BBABE
BSWCA
CDLGT
CETPU
CZZ
DUGUG
EBSCA
ECOWB
GCSUU
GEOUK
HF4
HGY
INM
IQF
JJU
JXC
L7C
MYL
O7H
OHILO
OODEK
PQQKQ
RYH
SDK
SRW
UE6
UO7
XI1
6XM
AADAM
AJLYV
BJTYN
DRU
IVK
WZT
AAJDW
BFMIH
PLCCB
PQEST
PQUKI
P~0
YSPEL
ID FETCH-LOGICAL-a82134-1941f4dc357ffe1f949e09ca352ebcc22b988bc3b203a9a367f26d79e1a0edd63
ISBN 1597491047
9781597491044
IngestDate Fri Sep 23 13:48:33 EDT 2022
Thu Feb 27 10:14:46 EST 2025
Fri Aug 29 15:42:25 EDT 2025
Wed Aug 20 01:36:10 EDT 2025
Fri Jun 27 00:22:32 EDT 2025
IsPeerReviewed false
IsScholarly false
LCCallNum QA76.9.A25 .S256 2007eb
LCCallNum_Ident QA76.76.D47S84 2007
Language English
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-a82134-1941f4dc357ffe1f949e09ca352ebcc22b988bc3b203a9a367f26d79e1a0edd63
Notes Includes index
Includes index.
Available also in a print ed.
Mode of access: Internet via World Wide Web.
Title from title screen.
OCLC 162597560
PQID EBC319199
PageCount 449
ParticipantIDs skillsoft_books24x7_bks00016133
askewsholts_vlebooks_9780080503455
safari_books_v2_1597491047
proquest_ebookcentral_EBC319199
nii_cinii_1130282272498304512
PublicationCentury 2000
PublicationDate 2007
2006
2006-12-01T00:00:00
2006-12-01
c2007
PublicationDateYYYYMMDD 2007-01-01
2006-01-01
2006-12-01
PublicationDate_xml – year: 2007
  text: 2007
PublicationDecade 2000
PublicationPlace Rockland, Mass
PublicationPlace_xml – name: Rockland, Mass
– name: Chantilly
PublicationYear 2007
2006
Publisher Syngress
Elsevier Science & Technology Books
Syngress Publishers
Publisher_xml – name: Syngress
– name: Elsevier Science & Technology Books
– name: Syngress Publishers
SSID ssj0000074341
Score 1.9282938
Snippet The only guide for software developers who must learn and implement cryptography safely and cost effectively.Cryptography for Developers begins with a chapter...
The only guide for software developers who must learn and implement cryptography safely and cost effectively.The book begins with a chapter that introduces the...
SourceID skillsoft
askewsholts
safari
proquest
nii
SourceType Aggregation Database
Publisher
SubjectTerms Computer software
Cryptography
Data encryption (Computer science)
Development
SubjectTermsDisplay Computer software -- Development.
Cryptography.
Data encryption (Computer science)
Electronic books.
TableOfContents Front Cover -- Cryptography for Developers -- Copyright Page -- Contents -- Preface -- Chapter 1. Introduction -- Introduction -- Threat Models -- What Is Cryptography? -- Asset Management -- Common Wisdom -- Developer Tools -- Summary -- Organization -- Frequently Asked Questions -- Chapter 2. ASN.1 Encoding -- Overview of ASN.1 -- ASN.1 Syntax -- ASN.1 Data Types -- ASN.1 Length Encodings -- ASN. 1 Boolean Type -- ASN.1 Integer Type -- ASN.1 BIT STRING Type -- ASN.1 OCTET STRING Type -- ASN.1 NULL Type -- ASN.1 OBJECT IDENTIFIER Type -- ASN.1 SEQUENCE and SET Types -- ASN.1 PrintableString and IA5STRING Types -- ASN.1 UTCTIME Type -- Iniplementation -- ASN.1 Length Routines -- ASN.1 Primitive Encoders -- Putting It All Together -- Frequently Asked Questions -- Chapter 3. Random Number Generation -- Introduction -- Measuring Entropy -- How Bad Can It Be? -- RNG Design -- PRNG Algorithms -- Putting It All Together -- Frequently Asked Questions -- Chapter 4. Advanced Encryption Standard -- Introduction -- Implementation -- Practical Attacks -- Chaining Modes -- Putting It All Together -- Frequently Asked Questions -- Chapter 5. Hash Functions -- Introduction -- Designs of SHS and Implementation -- PKCS # 5 Key Derivation -- Putting It All Together -- Frequently Asked Questions -- Chapter 6. Message-Authentication Code Algorithms -- Introduction -- Security Guidelines -- Standards -- Cipher Message Authentication Code -- Hash Message Authentication Code -- Putting It All Together -- Frequently Asked Questions -- Chapter 7. Encrypt and Authenticate Modes -- Introduction -- Design and Implementation -- Putting It All Together -- Frequently Asked Questions -- Chapter 8. Large Integer Arithmetic -- Introduction -- What Are BigNums? -- The Algorithms -- Putting It All Together -- Frequently Asked Questions -- Chapter 9. Public Key Algorithms
Introduction -- Goals of Public Key Cryptography -- RSA Public Key Cryptography -- Elliptic Curve Cryptography -- Putting It All Together -- Frequently Asked Questions -- Index
Title Cryptography for developers
URI https://cir.nii.ac.jp/crid/1130282272498304512
https://ebookcentral.proquest.com/lib/[SITE_ID]/detail.action?docID=319199
https://learning.oreilly.com/library/view/~/1597491047/?ar
https://www.vlebooks.com/vleweb/product/openreader?id=none&isbn=9780080503455&uid=none
http://www.books24x7.com/marc.asp?bookid=16133
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3Pb9MwFLZYOcAu_BbdGFSIq0v8I3F8bKdNEwcuLaO3yHYcFLULqAnTtr-e59hJSgEhuFipm8SpP_f5e_F7nxF6J3PueDTHMFwizG1Csc5Fjhkj2vFlcKLbANmPycUn_mEVr4Zdy9rskkZPzd1v80r-B1WoA1xdluw_INvfFCrgGPCFEhCGco_89h-DpsD29lsTxKbbQMGQ-2SHtZlFMwVjUnkJgaVvvAuVCVlWi_IqgNK5_WLP7V_cVl92YjS8O0icdwDzv1dU_MU4ej997v3G9lQwwhzz6crtioD3FKnbOW4-S50kPU_5AToQAszG_dns8vN5_xqrpSCcuJS5rnERlLT6h-m0Xkny_s-NH6JDVa_BsIPRb2qY6auy_Jn116pQW6h7UK_LzaaGWWqHCSwfo5HLDnmC7tnqKXrU7YkxCSbyGTrehWYC0EwGaJ6jy_Oz5ekFDhtQYJU6pTtMJCcFzw2LRVFYUkgubSSNAtZqtTGUapmm2jBNI6akYokoaJILaYmKbJ4n7AUaVV8r-xJNtNKFEMC_U2t4nmjFk8jC30QYG1FpzRi93fn92fWmXSyvM6cQBaw-jhiP4zE6gW7JTOlK4tacgd8J8KBTt-BN6Bi96Tosa68PEb7Z2fwUbC2RcoyOfD9m_vbXNBuAg8v7vvXfU34jMr2uvWvA2NFfHuAYPRwG6ys0arbf7Qmwtka_DiPnB-uDMHo
linkProvider Library Specific Holdings
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.title=Cryptography+for+developers&rft.au=St.+Denis%2C+Tom&rft.au=Johnson%2C+Simon&rft.date=2007-01-01&rft.pub=Syngress&rft.isbn=9781597491044&rft_id=info:doi/10.1016%2FB978-1-59749-104-4.X5000-6&rft.externalDocID=BA84380484
thumbnail_m http://utb.summon.serialssolutions.com/2.0.0/image/custom?url=https%3A%2F%2Fwww.safaribooksonline.com%2Flibrary%2Fcover%2F1597491047
http://utb.summon.serialssolutions.com/2.0.0/image/custom?url=https%3A%2F%2Fvle.dmmserver.com%2Fmedia%2F640%2F97800805%2F9780080503455.jpg