Serious Cryptography A Practical Introduction to Modern Encryption.pdf

(5316 KB) Pobierz
SERIOUS CRYPTOGRAPHY
A Practical Introduction to Modern Encryption
Jean-Philippe Aumasson
San Francisco
SERIOUS CRYPTOGRAPHY.
Copyright © 2018 by Jean-Philippe Aumasson.
All rights reserved. No part of this work may be reproduced or transmitted in any
form or by any means, electronic or mechanical, including photocopying, recording,
or by any information storage or retrieval system, without the prior written permission
of the copyright owner and the publisher.
ISBN-10: 1-59327-826-8
ISBN-13: 978-1-59327-826-7
Publisher: William Pollock
Production Editor: Laurel Chun
Cover Illustration: Jonny Thomas Interior Design: Octopod Studios
Developmental Editors: William Pollock, Jan Cash, and Annie Choi
Technical Reviewers: Erik Tews and Samuel Neves
Copyeditor: Barton D. Reed
Compositor: Meg Sneeringer
Proofreader: James Fraleigh
For information on distribution, translations, or bulk sales, please contact No Starch
Press, Inc. directly:
No Starch Press, Inc.
245 8th Street, San Francisco, CA 94103
phone: 1.415.863.9900; sales@nostarch.com www.nostarch.com
Library of Congress Control Number: 2017940486
No Starch Press and the No Starch Press logo are registered trademarks of No Starch
Press, Inc. Other product and company names mentioned herein may be the
trademarks of their respective owners. Rather than use a trademark symbol with every
occurrence of a trademarked name, we are using the names only in an editorial fashion
and to the benefit of the trademark owner, with no intention of infringement of the
trademark.
The information in this book is distributed on an “As Is” basis, without warranty.
While every precaution has been taken in the preparation of this work, neither the
author nor No Starch Press, Inc. shall have any liability to any person or entity with
respect to any loss or damage caused or alleged to be caused directly or indirectly by
the information contained in it.
BRIEF CONTENTS
Foreword by Matthew D. Green
Preface
Abbreviations
Chapter 1: Encryption
Chapter 2: Randomness
Chapter 3: Cryptographic Security
Chapter 4: Block Ciphers
Chapter 5: Stream Ciphers
Chapter 6: Hash Functions
Chapter 7: Keyed Hashing
Chapter 8: Authenticated Encryption
Chapter 9: Hard Problems
Chapter 10: RSA
Chapter 11: Diffie–Hellman
Chapter 12: Elliptic Curves
Chapter 13: TLS
Chapter 14: Quantum and Post-Quantum
Index
CONTENTS IN DETAIL
FOREWORD by Matthew D. Green
PREFACE
This Book’s Approach
Who This Book Is For
How This Book Is Organized
Fundamentals
Symmetric Crypto
Asymmetric Crypto
Applications
Acknowledgments
ABBREVIATIONS
1
ENCRYPTION
The Basics
Classical Ciphers
The Caesar Cipher
The Vigenère Cipher
How Ciphers Work
The Permutation
The Mode of Operation
Why Classical Ciphers Are Insecure
Perfect Encryption: The One-Time Pad
Encrypting with the One-Time Pad
Why Is the One-Time Pad Secure?
Encryption Security
Attack Models
Security Goals
Security Notions
Zgłoś jeśli naruszono regulamin