Book description
Cryptography, the science of encoding and decoding information, allows people to do online banking, online trading, and make online purchases, without worrying that their personal information is being compromised. The dramatic increase of information transmitted electronically has led to an increased reliance on cryptography. This book discusses the theories and concepts behind modern cryptography and demonstrates how to develop and implement cryptographic algorithms using C++ programming language.
Written for programmers and engineers, Practical Cryptography explains how you can use cryptography to maintain the privacy of computer data. It describes dozens of cryptography algorithms, gives practical advice on how to implement them into cryptographic software, and shows how they can be used to solve security problems.
Covering the latest developments in practical cryptographic techniques, this book shows you how to build security into your computer applications, networks, and storage. Suitable for undergraduate and postgraduate students in cryptography, network security, and other security-related courses, this book will also help anyone involved in computer and network security who wants to learn the nuts and bolts of practical cryptography.
Table of contents
- Cover Page
- Title Page
- Copyright Page
- Preface
- Acknowledgments
- About the Editors
- Contributors
- Chapter 1: Basics of Security and Cryptography
- Chapter 2: Classical Cryptographic Algorithms
- Chapter 3: Rotor Machine
- Chapter 4: Block Cipher
-
Chapter 5: Data Encryption Standard
- 5.1 Primitive Operations
- 5.2 Basic Structure
- 5.3 DES Encryption Algorithm
- 5.4 DES Decryption Algorithm
-
5.5 Implementation
- 5.5.1 C++ Library Headers
- 5.5.2 The DES Class
- 5.5.3 Introducing the Member Variables of DES Class
- 5.5.4 Introducing the Member Functions of DES Class
- 5.5.5 The Keygen() Function
- 5.5.6 The PermChoice1() Function
- 5.5.7 The Split_Key() Function
- 5.5.8 The PermChoice2() Function
- 5.5.9 The Encrypt(char *) Function
- 5.5.10 The IP() Function
- 5.5.11 The Expansion() Function
- 5.5.12 The xor_oneE(int round) Function
- 5.5.13 The Substitution() Function
- 5.5.14 The Permutation() Function
- 5.5.15 The xor_two() Function
- 5.5.16 The Decrypt(char *) Function
- 5.5.17 The Main() Function
- Chapter 6: Advanced Encryption Standard
- Chapter 7: Asymmetric Key Algorithms
- Chapter 8: The RSA Algorithm
- Chapter 9: Elliptic Curve Cryptography
- Chapter 10: Message Digest Algorithm 5
- Chapter 11: Secure Hash Algorithm
-
Chapter 12: Fundamentals of Identity Based Cryptography
- 12.1 Introduction to Cryptography
- 12.2 ID-Based Cryptography
- 12.3 Conclusion
- References
- Chapter 13: Symmetric Key Encryption Acceleration on Heterogeneous Many Core Architectures
- Chapter 14: Methods and Algorithms for Fast Hashing in Data Streaming
- Footnotes
Product information
- Title: Practical Cryptography
- Author(s):
- Release date: November 2014
- Publisher(s): Auerbach Publications
- ISBN: 9781482228908
You might also like
book
Cryptography Algorithms
Build your real-world cryptography knowledge, from understanding the fundamentals to implementing the most popular modern-day algorithms …
book
Real-World Cryptography
An all-practical guide to the cryptography behind common tools and protocols that will help you make …
book
Cryptography for Developers
The only guide for software developers who must learn and implement cryptography safely and cost effectively. …
book
Serious Cryptography
"This practical guide to modern encryption breaks down the fundamental mathematical concepts at the heart of …