AccueilGroupesDiscussionsPlusTendances
Site de recherche
Ce site utilise des cookies pour fournir nos services, optimiser les performances, pour les analyses, et (si vous n'êtes pas connecté) pour les publicités. En utilisant Librarything, vous reconnaissez avoir lu et compris nos conditions générales d'utilisation et de services. Votre utilisation du site et de ses services vaut acceptation de ces conditions et termes.

Résultats trouvés sur Google Books

Cliquer sur une vignette pour aller sur Google Books.

Chargement...

Cryptographie appliquée (1996)

par Bruce Schneier

MembresCritiquesPopularitéÉvaluation moyenneMentions
529445,483 (4.23)5
From the world's most renowned security technologist, Bruce Schneier, this 20th Anniversary Edition is the most definitive reference on cryptography ever published and is the seminal work on cryptography. Cryptographic techniques have applications far beyond the obvious uses of encoding and decoding information. For developers who need to know about capabilities, such as digital signatures, that depend on cryptographic techniques, there's no better overview than Applied Cryptography , the definitive book on the subject. Bruce Schneier covers general classes of cryptographic protocols and then specific techniques, detailing the inner workings of real-world cryptographic algorithms including the Data Encryption Standard and RSA public-key cryptosystems. The book includes source-code listings and extensive advice on the practical aspects of cryptography implementation, such as the importance of generating truly random numbers and of keeping keys secure. ". . .the best introduction to cryptography I've ever seen. . . .The book the National Security Agency wanted never to be published. . . ." -Wired Magazine ". . .monumental . . . fascinating . . . comprehensive . . . the definitive work on cryptography for computer programmers . . ." -Dr. Dobb's Journal ". . .easily ranks as one of the most authoritative in its field." -PC Magazine The book details how programmers and electronic communications professionals can use cryptography-the technique of enciphering and deciphering messages-to maintain the privacy of computer data. It describes dozens of cryptography algorithms, gives practical advice on how to implement them into cryptographic software, and shows how they can be used to solve security problems. The book shows programmers who design computer applications, networks, and storage systems how they can build security into their software and systems. With a new Introduction by the author, this premium edition will be a keepsake for all those committed to computer and cyber security.… (plus d'informations)
Chargement...

Inscrivez-vous à LibraryThing pour découvrir si vous aimerez ce livre

Actuellement, il n'y a pas de discussions au sujet de ce livre.

» Voir aussi les 5 mentions

I wonder how many people remember the first release of Applied Cryptography, and all the hoops you had to jump through (to prove US Citizenship and residency) just to get the floppy disk with the source code. It was so amazing to watch the efforts to scan the pages to retrieve the source code, and share it, outside the US. In some cases, copies of the floppy disk may have found their way to others unable to see either the digital scans, or to acquire their own floppy.

Bruce graduated to the rarefied company occupied by others such as Phil Zimmerman, risking professional ruin, and imprisonment, by publishing this. I have the second edition as well, but this copy is one of my most prized possessions.

I should also point out that (assuming some basic math background, without which you aren't going to understand crypto anyway) this is an excellent resource on most of the popular algorithms of the day, and still useful to understand how it all works. ( )
  Lyndatrue | Jan 15, 2018 |
Indeholder "Foreword", "Preface", " How to Read This Book", " Acknowledgments", "Chapter 1. Foundations", " 1.1 Terminology", " 1.2 Classical Cryptography", " 1.3 Large Numbers", "Part One: Cryptographic Protocols", "Chapter 2. Protocol Building Blocks", " 2.1 Introduction to Protocols", " 2.2 Communications Using Secret-Key Cryptography", " 2.3 One-Way Functions", " 2.4 One-Way Hash Functions", " 2.5 Communications Using Public-Key Cryptography", " 2.6 Digital Signatures", " 2.7 Digital Signatures with Encryption", " 2.8 Random and Pseudo-Random Sequence Generation", "Chapter 3. Basic Protocols", " 3.1 Key Exchange", " 3.2 Authentication", " 3.3 Authentication and Key Exchange", " 3.4 Multiple-Key Public-Key Cryptography", " 3.5 Secret Splitting", " 3.6 Secret Sharing", " 3.7 Cryptographic Protection of Databases", " 3.8 Timestamping Services", "Chapter 4. Intermediate Protocols", " 4.1 Subliminal Channel", " 4.2 Undeniable Digital Signatures", " 4.3 Fail-Stop Digital Signatures", " 4.4 Group Signatures", " 4.5 Computing with Encrypted Data", " 4.6 Bit Commitment", " 4.7 Fair Coin Tosses", " 4.8 Mental Poker", "Chapter 5. Advanced Protocols", " 5.1 Fair Cryptosystems", " 5.2 All-or-Nothing Disclosure of Secrets", " 5.3 Zero-Knowledge Proofs of Knowledge", " 5.4 Zero-Knowledge Proofs of Identity", " 5.5 Blind Signatures", "Chapter 6. Esoteric Protocols", " 6.1 Oblivious Transfer", " 6.2 Simultaneous Contract Signing", " 6.3 Digital Certified Mail", " 6.4 Simultaneous Exchange of Secrets", " 6.5 Secure Elections", " 6.6 Secure Multiparty Computation", " 6.7 Digital Cash", " 6.8 Anonymous Message Broadcast", "Part Two: Cryptographic Techniques", "Chapter 7. Keys", " 7.1 Key Length", " 7.2 Key Management", " 7.3 Public-Key Key Management", "Chapter 8. Using Algorithms", " 8.1 Block Cipher Modes", " 8.2 Multiple Encryption", " 8.3 Stream Ciphers", " 8.4 Stream Ciphers vs. Block Ciphers", " 8.5 Public-Key Cryptography vs. Symmetric Cryptography", " 8.6 Encrypting Communications Networks", " 8.7 Encrypting Data for Storage", " 8.8 Hardware Encryption vs. Software Encryption", " 8.9 File Erasure", " 8.10 Choosing an Algorithm", "Part Three: Cryptographic Algorithms", "Chapter 9. Mathematical Background", " 9.1 Information Theory", " 9.2 Complexity Theory", " 9.3 Number Theory", " 9.4 Prime Numbers", " 9.5 Discrete Logarithms in a Finite Field", "Chapter 10. Data Encryption Standard (DES)", " 10.1 Data Encryption Standard (DES)", " 10.2 DES Variants", "Chapter 11. Other Block Algorithms", " 11.1 Lucifer", " 11.2 Madryga", " 11.3 NewDES", " 11.4 FEAL N", " 11.5 REDOC", " 11.6 LOKI", " 11.7 Khufu and Khafre", " 11.8 RC2 and RC4", " 11.9 IDEA", " 11.10 MMB", " 11.11 CA-1.1", " 11.12 Skipjack", " 11.13 Using One-Way Hash Functions", " 11.14 Other Block Algorithms", " 11.15 Which Block Algorithm is Best?", "Chapter 12. Public-Key Algorithms", " 12.1 Background", " 12.2 Diffie-Hellman", " 12.3 Knapsack Algorithms", " 12.4 RSA", " 12.5 Pohig-Hellman", " 12.6 Rabin", " 12.7 Feige-Fiat-Shamir", "Chapter 13. More Public-Key Algorithms", " 13.1 Guillou-Quisquater", " 13.2 Ong-Schnoor-Shamir", " 13.3 ElGamal", " 13.4 Schnoor", " 13.5 Digital Signature Algorithm (DSA)", " 13.6 ENSIGN", " 13.7 McEliece", " 13.8 Okamoto 92", " 13.9 Cellular Automata", " 13.10 Elliptic Curve Cryptosystems", " 13.11 Other Public-Key Algorithms", " 13.12 Which Public-Key Algorithm is Best?", "Chapter 14. One-Way Hash Functions", " 14.1 Background", " 14.2 Snefru", " 14.3 N-Hash", " 14.4 MD4", " 14.5 MD5", " 14.6 MD2", " 14.7 Secure Hash Algorithm (SHA)", " 14.8 Ripe-MD", " 14.9 HAVAL", " 14.10 Other One-Way Hash Functions", " 14.11 Using Symmetric Block Algorithms", " 14.12 Using Public-Key Algorithms", " 14.13 Which One-Way Hash Function is Best?", " 14.14 Key-Dependent One-Way Hash Functions", "Chapter 15. Random Sequence Generators and Stream Ciphers", " 15.1 Pseudo-Random Sequence Generators", " 15.2 Stream Ciphers", " 15.3 Real Random Sequence Generators", " 15.4 Generating Numbers and Non-Uniform Distributions", " 15.5 Generating Random Permutations", "Chapter 16: Special Algorithms for Protocols", " 16.1 Key Exchange", " 16.2 Encrypted Key Exchange", " 16.3 Multiple-Key Public-Key Cryptography", " 16.4 Secret Broadcasting", " 16.5 Secret Sharing Algorithms", " 16.6 Subliminal Channel", " 16.7 Undeniable Digital Signatures", " 16.8 Computing with Encrypted Data", " 16.9 Fair Coin Flips", " 16.10 Fair Cryptosystems", " 16.11 All-or-Nothing Disclosure of Secrets", " 16.12 Zero-Knowledge Proofs of Knowledge", " 16.13 Blind Signatures", " 16.14 Oblivious Transfer", " 16.15 Secure Multiparty Computation", " 16.16 Probabilistic Encryption", " 16.17 Quantum Cryptography", "Part Four: The Real World", "Chapter 17. Example Implementations", " 17.1 IBM Secret-Key Management Protocol", " 17.2 Mitrenet", " 17.3 ISDN", " 17.4 Kerberos", " 17.5 KryptoKnight", " 17.6 ISO Authentication Framework", " 17.7 Privacy Enhanced Mail (PEM)", " 17.8 Message Security Protocol (MSP)", " 17.9 Pretty Good Privacy (PGP)", " 17.10 Clipper", " 17.11 Capstone", "Chapter 18. Politics", " 18.1 National Security Agency (NSA)", " 18.2 National Computer Security Center (NCSC)", " 18.3 National Institute of Standards and Technology (NIST)", " 18.4 RSA Data Security, Inc.", " 18.5 International Association of Cryptographic Research (IACR)", " 18.6 sci.crypt", " 18.7 Cypherpunks", " 18.8 Research and Development in Advanced Communication Technologies in Europe (RACE)", " 18.9 Electronic Frontier Foundation (EFF)", " 18.10 Computer Professionals for Social Responsibility (CPSR)", " 18.11 Patents", " 18.12 Export Rules", " 18.13 Legal Issues", "Part Five: Source Code", " Vigenere, Beauford, Variant Beauford", " Enigma", " DES", " Lucifer", " NewDES", " FEAL-8", " FEAL-NX", " REDOC III", " LOKI 91", " IDEA", " N-HASH", " MD5", " SHA (Secure Hash Algorithm)", " Secret Sharing", "References", "Index".

Gimrende bog om kryptologi, men der er kommet en nyere udgave. ( )
  bnielsen | Feb 24, 2016 |
Really excellent. On par with any classic manual of computer science. ( )
  wweisser | Jul 6, 2013 |
QA76.9 .A25 S35 (IP)
  Farella | Jan 15, 2013 |
4 sur 4
aucune critique | ajouter une critique
Vous devez vous identifier pour modifier le Partage des connaissances.
Pour plus d'aide, voir la page Aide sur le Partage des connaissances [en anglais].
Titre canonique
Titre original
Titres alternatifs
Date de première publication
Personnes ou personnages
Lieux importants
Évènements importants
Films connexes
Épigraphe
Dédicace
Premiers mots
Informations provenant du Partage des connaissances anglais. Modifiez pour passer à votre langue.
There are two kinds of cryptography in this world: cryptography that will stop your kid sister from
reading your files, and cryptography that will stop major governments from reading your files.
Citations
Derniers mots
Notice de désambigüisation
Informations provenant du Partage des connaissances anglais. Modifiez pour passer à votre langue.
This is the original, 1996 edition of the book. Please do not combine with the Second Edition.
Directeur de publication
Courtes éloges de critiques
Langue d'origine
Informations provenant du Partage des connaissances anglais. Modifiez pour passer à votre langue.
DDC/MDS canonique
LCC canonique
From the world's most renowned security technologist, Bruce Schneier, this 20th Anniversary Edition is the most definitive reference on cryptography ever published and is the seminal work on cryptography. Cryptographic techniques have applications far beyond the obvious uses of encoding and decoding information. For developers who need to know about capabilities, such as digital signatures, that depend on cryptographic techniques, there's no better overview than Applied Cryptography , the definitive book on the subject. Bruce Schneier covers general classes of cryptographic protocols and then specific techniques, detailing the inner workings of real-world cryptographic algorithms including the Data Encryption Standard and RSA public-key cryptosystems. The book includes source-code listings and extensive advice on the practical aspects of cryptography implementation, such as the importance of generating truly random numbers and of keeping keys secure. ". . .the best introduction to cryptography I've ever seen. . . .The book the National Security Agency wanted never to be published. . . ." -Wired Magazine ". . .monumental . . . fascinating . . . comprehensive . . . the definitive work on cryptography for computer programmers . . ." -Dr. Dobb's Journal ". . .easily ranks as one of the most authoritative in its field." -PC Magazine The book details how programmers and electronic communications professionals can use cryptography-the technique of enciphering and deciphering messages-to maintain the privacy of computer data. It describes dozens of cryptography algorithms, gives practical advice on how to implement them into cryptographic software, and shows how they can be used to solve security problems. The book shows programmers who design computer applications, networks, and storage systems how they can build security into their software and systems. With a new Introduction by the author, this premium edition will be a keepsake for all those committed to computer and cyber security.

Aucune description trouvée dans une bibliothèque

Description du livre
Résumé sous forme de haïku

Discussion en cours

Aucun

Couvertures populaires

Vos raccourcis

Évaluation

Moyenne: (4.23)
0.5
1
1.5 1
2
2.5
3 4
3.5 1
4 21
4.5 1
5 17

Est-ce vous ?

Devenez un(e) auteur LibraryThing.

 

À propos | Contact | LibraryThing.com | Respect de la vie privée et règles d'utilisation | Aide/FAQ | Blog | Boutique | APIs | TinyCat | Bibliothèques historiques | Critiques en avant-première | Partage des connaissances | 203,192,270 livres! | Barre supérieure: Toujours visible