Online Public Access Catalogue (OPAC)
Library,Documentation and Information Science Division

“A research journal serves that narrow

borderland which separates the known from the unknown”

-P.C.Mahalanobis


Image from Google Jackets

Cryptography engineering : design principles and practical applications / Niels Ferguson, Bruce Schneier and Tadayoshi Kohno.

By: Contributor(s): Material type: TextTextPublication details: Indianapolis, IN : Wiley Pub., inc., ©2010.Description: xxix, 353 p. : ill. ; 24 cmISBN:
  • 9780470474242 (pbk : alk. paper)
Subject(s): DDC classification:
  • 005.82 23 F353
Contents:
pt. I. Introduction. 1. The context of cryptography -- 2. Introduction to cryptography -- pt. II. Message security. 3. Block ciphers -- 4. Block cipher modes -- 5. Hash functions -- 6. Message authentication codes -- 7. The secure channel -- 8. Implementation issues (I) -- pt. III. Key negotiation. 9. Generating randomness -- 10. Primes -- 11. Diffie-Hellman -- 12. RSA -- 13. Introduction to cryptographic protocols -- 14. Key negotiation -- 15. Implemenation issues (II) -- pt. IV. Key management. 16. The clock -- 17. Key servers -- 18. The dream of PKI -- 19. PKI reality -- 20. PKI practicalities -- 21. Storing secrets -- pt. V. Miscellaneous. 22. Standards and patents -- 23. Involving experts.
Summary: Cryptography is vital to keeping information safe, in an era when the formula to do so becomes more and more challenging. This book shows you how to build cryptography into products from the start.
Tags from this library: No tags from this library for this title. Log in to add tags.
Holdings
Item type Current library Call number Status Date due Barcode Item holds
Books ISI Library, Kolkata 005.82 F353 (Browse shelf(Opens below)) Available 137037
Total holds: 0

Includes bibliographical references and index.

pt. I. Introduction.
1. The context of cryptography --
2. Introduction to cryptography --
pt. II. Message security.
3. Block ciphers --
4. Block cipher modes --
5. Hash functions --
6. Message authentication codes --
7. The secure channel --
8. Implementation issues (I) --
pt. III. Key negotiation.
9. Generating randomness --
10. Primes --
11. Diffie-Hellman --
12. RSA --
13. Introduction to cryptographic protocols --
14. Key negotiation --
15. Implemenation issues (II) --
pt. IV. Key management.
16. The clock --
17. Key servers --
18. The dream of PKI --
19. PKI reality --
20. PKI practicalities --
21. Storing secrets --
pt. V. Miscellaneous.
22. Standards and patents --
23. Involving experts.

Cryptography is vital to keeping information safe, in an era when the formula to do so becomes more and more challenging. This book shows you how to build cryptography into products from the start.

There are no comments on this title.

to post a comment.
Library, Documentation and Information Science Division, Indian Statistical Institute, 203 B T Road, Kolkata 700108, INDIA
Phone no. 91-33-2575 2100, Fax no. 91-33-2578 1412, ksatpathy@isical.ac.in