Home | Best Seller | FAQ | Contact Us
Browse
Art & Photography
Biographies & Autobiography
Body,Mind & Health
Business & Economics
Children's Book
Computers & Internet
Cooking
Crafts,Hobbies & Gardening
Entertainment
Family & Parenting
History
Horror
Literature & Fiction
Mystery & Detective
Nonfiction
Professional & Technology
Reference
Religion
Romance
Science
Science Fiction & Fantasy
Sports & Outdoors
Travel & Geography
   Book Info

enlarge picture

Practical Cryptography  
Author: Niels Ferguson, Bruce Schneier
ISBN: 0471223573
Format: Handover
Publish Date: June, 2005
 
     
     
   Book Review


Book Description
Security is the number one concern for businesses worldwide. The gold standard for attaining security is cryptography because it provides the most reliable tools for storing or transmitting digital information. Written by Niels Ferguson, lead cryptographer for Counterpane, Bruce Schneier's security company, and Bruce Schneier himself, this is the much anticipated follow-up book to Schneier's seminal encyclopedic reference, Applied Cryptography, Second Edition (0-471-11709-9), which has sold more than 150,000 copies.
Niels Ferguson (Amsterdam, Netherlands) is a cryptographic engineer and consultant at Counterpane Internet Security. He has extensive experience in the creation and design of security algorithms, protocols, and multinational security infrastructures. Previously, Ferguson was a cryptographer for DigiCash and CWI. At CWI he developed the first generation of off-line payment protocols. He has published numerous scientific papers.
Bruce Schneier (Minneapolis, MN) is Founder and Chief Technical Officer at Counterpane Internet Security, a managed-security monitoring company. He is also the author of Secrets and Lies: Digital Security in a Networked World (0-471-25311-1).


Book Info
Text explains the how-to of cryptography, providing practical rules for choosing and using cryptographic primitives; from block ciphers to digital signatures. Discusses implementing cryptographic algorithms and systems in a secure way on today's computers. For network administrators. Includes index and references. Softcover, hardcover available.


From the Back Cover
Two of the world’s top experts in cryptography teach you how to secure your digital future In today’s world, security is a top concern for businesses worldwide. Without a secure computer system, you don’t make money, you don’t expand, and–bottom line–you don’t survive. Cryptography holds great promise as the technology to provide security in cyberspace. Amazingly enough, no literature exists about how to implement cryptography and how to incorporate it into real-world systems. With Practical Cryptography, an author team of international renown provides you with the first hands-on cryptographic product implementation guide, bridging the gap between cryptographic theory and real-world cryptographic applications. This follow-up guide to the bestselling Applied Cryptography dives in and explains the how-to of cryptography. You’ll find discussions on: Practical rules for choosing and using cryptographic primitives, from block ciphers to digital signatures Implementing cryptographic algorithms and systems in a secure way on today’s computers A consistent design philosophy to ensure that every part of the system achieves the required security level Why security affects every part of the system, and why it has to be a primary goal of the project How simple interfaces for cryptographic primitives reduce system complexity and increase system security


About the Author
NIELS FERGUSON is a cryptographic engineer and consultant. He has extensive experience in the design and implementation of cryptographic algorithms, protocols, and large-scale security infrastructures. Previously, Ferguson was a cryptographer for DigiCash and CWI, and he worked closely with Bruce Schneier at Counterpane Internet Security. He has published numerous scientific papers.

BRUCE SCHNEIER is founder and chief technical officer at Counterpane Internet Security, a managed-security monitoring company. A world-renowned scientist, security expert, and lecturer, he is the author of Secrets and Lies: Digital Security in a Networked World and Applied Cryptography (both from Wiley).




Practical Cryptography

FROM OUR EDITORS

The Barnes & Noble Review
Cryptography, as Bruce Schneier keeps pointing out to anyone who￯﾿ᄑll listen, is even harder than it looks. Of course, it doesn￯﾿ᄑt help that many books on the subject are intensely academic. Such books do little for folks who actually have to implement crypto-based security. No wonder so many implementations are so poor.

Schneier, president of Counterpane Internet Security, Inc., is arguably the world￯﾿ᄑs leading crypto expert. His firm￯﾿ᄑs lead cryptographer, Niels Ferguson, isn￯﾿ᄑt far behind. Together, they￯﾿ᄑve written Practical Cryptography to give implementers what they need to do the job right.

As Schneier often notes, excellent algorithms and protocols do exist: The devil￯﾿ᄑs in the implementation details, and plenty of companies get them wrong. Worse, the algorithms and protocols are the ￯﾿ᄑeasy￯﾿ᄑ part. Once you get people into the loop -- as with key management -- things get really tough. Still worse, nonspecialists often treat crypto as an afterthought, to be bolted on once everything else is done. That￯﾿ᄑs a recipe for failure, considering that you have to secure your entire system: Your adversary need only find one weak link.

These are the types of issues Practical Cryptography takes on.

Schneier and Ferguson begin with some serious attitude adjustment. To build secure systems, security must come first, with other priorities (like performance or new features) way down the list. ￯﾿ᄑIf you are ever tempted to cut a security corner in the name of efficiency, just repeat to yourself: ￯﾿ᄑWe already have enough fast, insecure systems. We don￯﾿ᄑt need another one.￯﾿ᄑ ￯﾿ᄑ

They also focus on keeping things simple -- which means lots of modularization. To that end, they present (and in some cases, create) simple interfaces for cryptographic primitives: ￯﾿ᄑNo features, no options, no special cases, no extra things to remember, just the simplest definition we could come up with.￯﾿ᄑ

After introducing cryptography from the implementer￯﾿ᄑs standpoint, they present several key elements of cryptography systems. In two full chapters on block ciphers, they help you compare and choose amongst solutions like AES, Serpent, and Twofish; then cover block cipher modes, and help you limit the risks of information leakage. There￯﾿ᄑs a full chapter on hash functions, their weaknesses, solutions -- and tradeoffs.

Next, the authors move on to solving real-world problems, starting with one of the most common: creating secure connections. There￯﾿ᄑs detailed coverage of secure software development: everything from wiping state to handling swap files and caches -- not to mention buffer overflows, side-channel attacks, and the like.

A section on key negotiation addresses everything from generating randomness to working with primes; using Diffie-Hellman and RSA algorithms to handling crypto protocols. The authors cover key management in comparable depth: implementing reliable clocks; Kerberos and its alternatives; and the practical realities of PKI implementation (for example, why keys ￯﾿ᄑwear out.￯﾿ᄑ)

Practical Cryptography reaches far and wide, from algorithms and protocols to standards and patents -- with plenty of cautions to make sure you never get overconfident. Because, when it comes to security, overconfidence is fatal. Bill Camarda

Bill Camarda is a consultant, writer, and web/multimedia content developer. His 15 books include Special Edition Using Word 2000 and Upgrading & Fixing Networks for Dummies, Second Edition.

FROM THE PUBLISHER

In today's world, security is a top concern for businesses worldwide. Without a secure computer system, you don't make money, you don't expand, and -- bottom line -- you don't survive. Cryptography holds great promise as the technology to provide security in cyberspace. Amazingly enough, no literature exists about how to implement cryptography and how to incorporate it into real-world systems. With Practical Cryptography, an author team of international renown provides you with the first hands-on cryptographic product implementation guide, bridging the gap between cryptographic theory and real-world cryptographic applications.

     



Home | Private Policy | Contact Us
@copyright 2001-2005 ReadingBee.com