Cryptography for developers
The only guide for software developers who must learn and implement cryptography safely and cost effectively.Cryptography for Developers begins with a chapter that introduces the subject of cryptography to the reader. The second chapter discusses how to implement large integer arithmetic as required...
Saved in:
Main Authors | , |
---|---|
Format | eBook Book |
Language | English |
Published |
Rockland, Mass
Syngress
2007
Elsevier Science & Technology Books Syngress Publishers |
Edition | 1 |
Subjects | |
Online Access | Get full text |
ISBN | 1597491047 9781597491044 |
DOI | 10.1016/B978-1-59749-104-4.X5000-6 |
Cover
Loading…
Abstract | The only guide for software developers who must learn and implement cryptography safely and cost effectively.Cryptography for Developers begins with a chapter that introduces the subject of cryptography to the reader. The second chapter discusses how to implement large integer arithmetic as required by RSA and ECC public key algorithms The subsequent chapters discuss the implementation of symmetric ciphers, one-way hashes, message authentication codes, combined authentication and encryption modes, public key cryptography and finally portable coding practices. Each chapter includes in-depth discussion on memory/size/speed performance trade-offs as well as what cryptographic problems are solved with the specific topics at hand.The author is the developer of the industry standard cryptographic suite of tools called LibTomA regular expert speaker at industry conferences and events on this development |
---|---|
AbstractList | The only guide for software developers who must learn and implement cryptography safely and cost effectively.Cryptography for Developers begins with a chapter that introduces the subject of cryptography to the reader. The second chapter discusses how to implement large integer arithmetic as required by RSA and ECC public key algorithms The subsequent chapters discuss the implementation of symmetric ciphers, one-way hashes, message authentication codes, combined authentication and encryption modes, public key cryptography and finally portable coding practices. Each chapter includes in-depth discussion on memory/size/speed performance trade-offs as well as what cryptographic problems are solved with the specific topics at hand.The author is the developer of the industry standard cryptographic suite of tools called LibTomA regular expert speaker at industry conferences and events on this development The only guide for software developers who must learn and implement cryptography safely and cost effectively.The book begins with a chapter that introduces the subject of cryptography to the reader. The second chapter discusses how to implement large integer arithmetic as required by RSA and ECC public key algorithms The subsequent chapters discuss the implementation of symmetric ciphers, one-way hashes, message authentication codes, combined authentication and encryption modes, public key cryptography and finally portable coding practices. Each chapter includes in-depth discussion on memory/size/speed performance trade-offs as well as what cryptographic problems are solved with the specific topics at hand. * The author is the developer of the industry standard cryptographic suite of tools called LibTom* A regular expert speaker at industry conferences and events on this development* The book has a companion Web site with over 300-pages of text on implementing multiple precision arithmetic |
Author | Johnson, Simon St. Denis, Tom |
Author_xml | – sequence: 1 fullname: St. Denis, Tom – sequence: 2 fullname: Johnson, Simon |
BackLink | https://cir.nii.ac.jp/crid/1130282272498304512$$DView record in CiNii |
BookMark | eNpVkEtLw0AQgFd8YFv7C7xUEcFD6sw-stmjLfUBBS8i3pZNsmtjQzZmY7X_3vQB4hxmGObjm2H65KjylSXkEmGMgPHtRMkkwkgoyVWEwCM-fhMAEMUHZNjNABIQwLgQh6SPW6yj5AnpYUy7VsRwSoYhfMAmJGcce-R82qzr1r83pl6sR843o9yubOlr24QzcuxMGexwXwfk9X72Mn2M5s8PT9O7eWQSioxHqDg6nmdMSOcsOsWVBZUZJqhNs4zSVCVJmrGUAjPKsFg6GudSWTRg8zxmA3K9E4dlUZbBu1an3i8D5T9Sp8vQnYsxMtaBNzvQhKX9DgtftkGvSrul9b8fdOzFXmqcaYqdUa-o_nvN3-K68Z9fNrR6q8ps1Tam1LPJlKFCpTrwagdWRaGzYpMRGdCEUkm5ShhwgZT9AhZ5dXo |
ContentType | eBook Book |
DBID | RYH OHILO OODEK |
DEWEY | 005.82 |
DOI | 10.1016/B978-1-59749-104-4.X5000-6 |
DatabaseName | CiNii Complete O'Reilly Online Learning: Corporate Edition O'Reilly Online Learning: Academic/Public Library Edition |
DatabaseTitleList | |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Computer Science |
EISBN | 9780080503455 0080503454 |
Edition | 1 |
ExternalDocumentID | bks00016133 9780080503455 1597491047 EBC319199 BA84380484 |
Genre | Electronic books |
GroupedDBID | -VQ -VX 089 20A 35M 38. A4I A4J AAAAS AABBV AAFKH AAFQY AAKGN AALIM AALRI AANYM AAORS AAVWF AAXUO AAYWO AAZNM ABARN ABGKT ABGWT ABIAV ABIKZ ABIWA ABLXK ABMAC ABMRC ABQNV ABQPQ ABQQC ABRSK ABWNX ACHHS ACHUA ACLGV ACXMD ADBND ADCEY ADHWY ADVEM ADWOK ADXSK AECLD AEHEP AERYV AEZAQ AFOJC AFQEX AFTHB AFXKH AGAMA AHFFV AHJNT AHPGB AHQWO AHWGJ AIXPE AJFER AKHYG ALMA_UNASSIGNED_HOLDINGS ALTAS AMYDA APVFW ASVZH ATDNW AVWMD AZZ BBABE BSWCA CDLGT CETPU CZZ DUGUG EBSCA ECOWB GCSUU GEOUK HF4 HGY INM IQF JJU JXC L7C MYL O7H OHILO OODEK PQQKQ RYH SDK SRW UE6 UO7 XI1 6XM AADAM AJLYV BJTYN DRU IVK WZT AAJDW BFMIH PLCCB PQEST PQUKI P~0 YSPEL |
ID | FETCH-LOGICAL-a82134-1941f4dc357ffe1f949e09ca352ebcc22b988bc3b203a9a367f26d79e1a0edd63 |
ISBN | 1597491047 9781597491044 |
IngestDate | Fri Sep 23 13:48:33 EDT 2022 Thu Feb 27 10:14:46 EST 2025 Fri Aug 29 15:42:25 EDT 2025 Wed Aug 20 01:36:10 EDT 2025 Fri Jun 27 00:22:32 EDT 2025 |
IsPeerReviewed | false |
IsScholarly | false |
LCCallNum | QA76.9.A25 .S256 2007eb |
LCCallNum_Ident | QA76.76.D47S84 2007 |
Language | English |
LinkModel | OpenURL |
MergedId | FETCHMERGED-LOGICAL-a82134-1941f4dc357ffe1f949e09ca352ebcc22b988bc3b203a9a367f26d79e1a0edd63 |
Notes | Includes index Includes index. Available also in a print ed. Mode of access: Internet via World Wide Web. Title from title screen. |
OCLC | 162597560 |
PQID | EBC319199 |
PageCount | 449 |
ParticipantIDs | skillsoft_books24x7_bks00016133 askewsholts_vlebooks_9780080503455 safari_books_v2_1597491047 proquest_ebookcentral_EBC319199 nii_cinii_1130282272498304512 |
PublicationCentury | 2000 |
PublicationDate | 2007 2006 2006-12-01T00:00:00 2006-12-01 c2007 |
PublicationDateYYYYMMDD | 2007-01-01 2006-01-01 2006-12-01 |
PublicationDate_xml | – year: 2007 text: 2007 |
PublicationDecade | 2000 |
PublicationPlace | Rockland, Mass |
PublicationPlace_xml | – name: Rockland, Mass – name: Chantilly |
PublicationYear | 2007 2006 |
Publisher | Syngress Elsevier Science & Technology Books Syngress Publishers |
Publisher_xml | – name: Syngress – name: Elsevier Science & Technology Books – name: Syngress Publishers |
SSID | ssj0000074341 |
Score | 1.9282938 |
Snippet | The only guide for software developers who must learn and implement cryptography safely and cost effectively.Cryptography for Developers begins with a chapter... The only guide for software developers who must learn and implement cryptography safely and cost effectively.The book begins with a chapter that introduces the... |
SourceID | skillsoft askewsholts safari proquest nii |
SourceType | Aggregation Database Publisher |
SubjectTerms | Computer software Cryptography Data encryption (Computer science) Development |
SubjectTermsDisplay | Computer software -- Development. Cryptography. Data encryption (Computer science) Electronic books. |
TableOfContents | Front Cover -- Cryptography for Developers -- Copyright Page -- Contents -- Preface -- Chapter 1. Introduction -- Introduction -- Threat Models -- What Is Cryptography? -- Asset Management -- Common Wisdom -- Developer Tools -- Summary -- Organization -- Frequently Asked Questions -- Chapter 2. ASN.1 Encoding -- Overview of ASN.1 -- ASN.1 Syntax -- ASN.1 Data Types -- ASN.1 Length Encodings -- ASN. 1 Boolean Type -- ASN.1 Integer Type -- ASN.1 BIT STRING Type -- ASN.1 OCTET STRING Type -- ASN.1 NULL Type -- ASN.1 OBJECT IDENTIFIER Type -- ASN.1 SEQUENCE and SET Types -- ASN.1 PrintableString and IA5STRING Types -- ASN.1 UTCTIME Type -- Iniplementation -- ASN.1 Length Routines -- ASN.1 Primitive Encoders -- Putting It All Together -- Frequently Asked Questions -- Chapter 3. Random Number Generation -- Introduction -- Measuring Entropy -- How Bad Can It Be? -- RNG Design -- PRNG Algorithms -- Putting It All Together -- Frequently Asked Questions -- Chapter 4. Advanced Encryption Standard -- Introduction -- Implementation -- Practical Attacks -- Chaining Modes -- Putting It All Together -- Frequently Asked Questions -- Chapter 5. Hash Functions -- Introduction -- Designs of SHS and Implementation -- PKCS # 5 Key Derivation -- Putting It All Together -- Frequently Asked Questions -- Chapter 6. Message-Authentication Code Algorithms -- Introduction -- Security Guidelines -- Standards -- Cipher Message Authentication Code -- Hash Message Authentication Code -- Putting It All Together -- Frequently Asked Questions -- Chapter 7. Encrypt and Authenticate Modes -- Introduction -- Design and Implementation -- Putting It All Together -- Frequently Asked Questions -- Chapter 8. Large Integer Arithmetic -- Introduction -- What Are BigNums? -- The Algorithms -- Putting It All Together -- Frequently Asked Questions -- Chapter 9. Public Key Algorithms Introduction -- Goals of Public Key Cryptography -- RSA Public Key Cryptography -- Elliptic Curve Cryptography -- Putting It All Together -- Frequently Asked Questions -- Index |
Title | Cryptography for developers |
URI | https://cir.nii.ac.jp/crid/1130282272498304512 https://ebookcentral.proquest.com/lib/[SITE_ID]/detail.action?docID=319199 https://learning.oreilly.com/library/view/~/1597491047/?ar https://www.vlebooks.com/vleweb/product/openreader?id=none&isbn=9780080503455&uid=none http://www.books24x7.com/marc.asp?bookid=16133 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3Pb9MwFLZYOcAu_BbdGFSIq0v8I3F8bKdNEwcuLaO3yHYcFLULqAnTtr-e59hJSgEhuFipm8SpP_f5e_F7nxF6J3PueDTHMFwizG1Csc5Fjhkj2vFlcKLbANmPycUn_mEVr4Zdy9rskkZPzd1v80r-B1WoA1xdluw_INvfFCrgGPCFEhCGco_89h-DpsD29lsTxKbbQMGQ-2SHtZlFMwVjUnkJgaVvvAuVCVlWi_IqgNK5_WLP7V_cVl92YjS8O0icdwDzv1dU_MU4ej997v3G9lQwwhzz6crtioD3FKnbOW4-S50kPU_5AToQAszG_dns8vN5_xqrpSCcuJS5rnERlLT6h-m0Xkny_s-NH6JDVa_BsIPRb2qY6auy_Jn116pQW6h7UK_LzaaGWWqHCSwfo5HLDnmC7tnqKXrU7YkxCSbyGTrehWYC0EwGaJ6jy_Oz5ekFDhtQYJU6pTtMJCcFzw2LRVFYUkgubSSNAtZqtTGUapmm2jBNI6akYokoaJILaYmKbJ4n7AUaVV8r-xJNtNKFEMC_U2t4nmjFk8jC30QYG1FpzRi93fn92fWmXSyvM6cQBaw-jhiP4zE6gW7JTOlK4tacgd8J8KBTt-BN6Bi96Tosa68PEb7Z2fwUbC2RcoyOfD9m_vbXNBuAg8v7vvXfU34jMr2uvWvA2NFfHuAYPRwG6ys0arbf7Qmwtka_DiPnB-uDMHo |
linkProvider | Library Specific Holdings |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.title=Cryptography+for+developers&rft.au=St.+Denis%2C+Tom&rft.au=Johnson%2C+Simon&rft.date=2007-01-01&rft.pub=Syngress&rft.isbn=9781597491044&rft_id=info:doi/10.1016%2FB978-1-59749-104-4.X5000-6&rft.externalDocID=BA84380484 |
thumbnail_m | http://utb.summon.serialssolutions.com/2.0.0/image/custom?url=https%3A%2F%2Fwww.safaribooksonline.com%2Flibrary%2Fcover%2F1597491047 http://utb.summon.serialssolutions.com/2.0.0/image/custom?url=https%3A%2F%2Fvle.dmmserver.com%2Fmedia%2F640%2F97800805%2F9780080503455.jpg |