Cryptography/Cryptanalysis



Schneier's Cryptography Classics Library: Applied Cryptography, Secrets and Lies, and Practical Cryptography
Author: Bruce Schneier
Publisher: Wiley
Year: 2007
Pages: 1664
Amazon's book description: Cryptography is the study of message secrecy and is used in fields such as computer science, computer and network security, and even in instances of everyday life, such as ATM cards, computer passwords, and electronic commerce. This seminal encyclopedic reference provides readers with a comprehensive survey of modern cryptography. It describes dozens of cryptography algorithms, offers practical advice on how to implement them into cryptographic software, and shows how they can be used to solve security problems. As the ideal guide for an engineer, systems engineer or technology professional who wants to learn how to actually incorporate cryptography into a product, this book bridges the gap between textbook cryptography and cryptography in the real world.




Applied Cryptanalysis: Breaking Ciphers in the Real World
Author: Mark Stamp, Richard M. Low
Publisher: Wiley-IEEE Press
Year: 2007
Pages: 401
Amazon's book description: The book is designed to be accessible to motivated IT professionals who want to learn more about the specific attacks covered. In particular, every effort has been made to keep the chapters independent, so if someone is interested in has function cryptanalysis or RSA timing attacks, they do not necessarily need to study all of the previous material in the text. This would be particularly valuable to working professionals who might want to use the book as a way to quickly gain some depth on one specific topic.




Cryptography for Developers
Author: Tom St Denis
Publisher: Syngress
Year: 2006
Pages: 400
Amazon's book description: The book begins with a chapter that introduces the subject of cryptography to the reader. The second chapter discusses how to implement large integer arithmetic as required by RSA and ECC public key algorithms The subsequent chapters discuss the implementation of symmetric ciphers, one-way hashes, message authentication codes, combined authentication and encryption modes, public key cryptography and finally portable coding practices. Each chapter includes in-depth discussion on memory/size/speed performance trade-offs as well as what cryptographic problems are solved with the specific topics at hand.




Decrypted Secrets: Methods and Maxims of Cryptology
Author: Friedrich L. Bauer
Publisher: Springer
Year: 2006
Pages: 525
Amazon's book description: It is an outstanding book that assumes only elementary mathematical knowledge and is interspersed with many exciting, amusing, and sometimes personal stories from the history of cryptology.




Cryptography in C and C++
Author: Michael Welschenbach
Publisher: Apress
Year: 2005
Pages: 504
Amazon's book description: This book covers all that is needed to write professional-level cryptographic code. An expanded and improved version of the very well received first edition, it includes approximately 100 pages of new material as well as numerous improvements in the original text.




Cryptography: Theory and Practice
Author: Douglas R. Stinson
Publisher: Chapman & Hall/CRC
Year: 2005
Pages: 616
Amazon's book description: Mathematical background is provided where it is needed. Each chapter finishes with a large number of exercises, varying from elementary to quite challenging. the bibliography, which was already huge in the first edition, now contains 353 references, some of which are quite recent. the book is very well suited for a course in cryptography.




Brute Force: Cracking the Data Encryption Standard
Author: Matt Curtin
Publisher: Springer
Year: 2005
Pages: 291
Amazon's book description: In the 1960s, it became increasingly clear that more and more information was going to be stored on computers, not on pieces of paper. With these changes in technology and the ways it was used came a need to protect both the systems and the information. For the next ten years, encryption systems of varying strengths were developed, but none proved to be rigorous enough. In 1973, the NBS put out an open call for a new, stronger encryption system that would become the new federal standard. Several years later, IBM responded with a system called Lucifer that came to simply be known as DES (data encryption standard).




Introduction to Cryptography with Coding Theory
Author: Wade Trappe, Lawrence C. Washington
Publisher: Prentice Hall
Year: 2005
Pages: 592
Amazon's book description: With its conversational tone and practical focus, this text mixes applied and theoretical aspects for a solid introduction to cryptography and security, including the latest significant advancements in the field. Assumes a minimal background. The level of math sophistication is equivalent to a course in linear algebra. Presents applications and protocols where cryptographic primitives are used in practice, such as SET and SSL. Provides a detailed explanation of AES, which has replaced Feistel-based ciphers (DES) as the standard block cipher algorithm. Includes expanded discussions of block ciphers, hash functions, and multicollisions, plus additional attacks on RSA to make readers aware of the strengths and shortcomings of this popular scheme. For engineers interested in learning more about cryptography.




Cryptographic Libraries for Developers
Author: Ed Moyle, Diana Kelley
Publisher: Charles River Media
Year: 2005
Pages: 512
Amazon's book description: Learn to Use the Right Cryptography Library Everytime! No longer is it an option for software to include cryptography; everyone from office suites to accounting software and eCommerce Web sites use it. So today's developers have to know how to write software that includes cryptographic functionality. Although they are usually familiar with the basics of cryptography, they are not always familiar enough with the available products to select the right API/library and get up and running with it quickly. Cryptographic Libraries for Developers teaches developers about the available APIs and helps them select the right ones for their projects based on platform, language, and regulatory requirements.




Contemporary Cryptography
Author: Rolf Oppliger
Publisher: Artech House Publishers
Year: 2005
Pages: 210
Amazon's book description: Whether you're new to the field or looking to broaden your knowledge of contemporary cryptography, this comprehensive resource puts all aspects of this important topic into perspective. Delivering an accurate introduction to the current state-of-the-art in modern cryptography, the book offers you a practical understanding of essential tools and applications to help you with your daily work. You also find complete coverage of the underpinnings and basic principles of cryptography to help you fully master the material.




Malicious Cryptography: Exposing Cryptovirology
Author: Adam Young, Moti Yung
Publisher: Wiley
Year: 2004
Pages: 416
Amazon's book description: Hackers have uncovered the dark side of cryptography-that device developed to defeat Trojan horses, viruses, password theft, and other cyber-crime. It's called cryptovirology, the art of turning the very methods designed to protect your data into a means of subverting it. In this fascinating, disturbing volume, the experts who first identified cryptovirology show you exactly what you're up against and how to fight back.




Guide to Elliptic Curve Cryptography
Author: Darrel Hankerson, Alfred J. Menezes, Scott Vanstone
Publisher: Springer
Year: 2004
Pages: 311
Amazon's book description: After two decades of research and development, elliptic curve cryptography now has widespread exposure and acceptance. Industry, banking, and government standards are in place to facilitate extensive deployment of this efficient public-key mechanism.




Classical and Contemporary Cryptology
Author: Richard J. Spillman
Publisher: Prentice Hall
Year: 2004
Pages: 304
Amazon's book description: Some people work hard at encoding their secrets; other people work just as hard at deciphering them. Students of cryptology must learn to understand the thinking and techniques of both sides. As Dr. Spillman explores the world of cryptology, he spans introductory to advanced topics, presenting the history and methodology of spies, code breakers, code talkers, and present-day computer hackers and attackers. The cryptographic analysis software included with the book enables students to perform simple hands-on activities that teach them to think like a cryptographer as they learn to fend off attacks or secure software systems.




Algebraic Aspects of Cryptography
Author: Neal Koblitz, A.J. Menezes, Y.-H. Wu, R.J. Zuccherato
Publisher: Springer
Year: 2004
Pages: 206
Amazon's book description: This is a textbook for a course (or self-instruction) in cryptography with emphasis on algebraic methods. The first half of the book is a self-contained informal introduction to areas of algebra, number theory, and computer science that are used in cryptography. Most of the material in the second half - "hidden monomial" systems, combinatorial-algebraic systems, and hyperelliptic systems - has not previously appeared in monograph form. The appendix by Menezes, Wu, and Zuccherato gives an elementary treatment of hyperelliptic curves. This book is intended for graduate students, advanced undergraduates, and scientists working in various fields of data security.




Practical Cryptography
Author: Niels Ferguson, Bruce Schneier
Publisher: Wiley
Year: 2003
Pages: 432
Amazon's book description: Security is the number one concern for businesses worldwide. The gold standard for attaining security is cryptography because it provides the most reliable tools for storing or transmitting digital information.




Modern Cryptography: Theory and Practice
Author: Wenbo Mao
Publisher: Prentice Hall PTR
Year: 2003
Pages: 648
Amazon's book description: This book would be a good addition to any cryptographer's bookshelf. The book is self-contained; it presents all the background material to understand an algorithm and all the development to prove its security. I'm not aware of another book that's as complete as this one.




Cryptanalysis of Number Theoretic Ciphers
Author: Jr., Samuel S. Wagstaff
Publisher: Chapman & Hall/CRC
Year: 2002
Pages: 336
Amazon's book description: This book contains a nice introduction to modern cryptography, with emphasis laid on the ciphers based on computational number theory. The reader learns to deal with large numbers in a computer and to analyze the complexity of the most basic algorithms. [T]he reader is not just confronted with a list of algorithms, but he/she is given the clues to assimilate the ideas behind the results . The book contains more than 200 interesting exercises that test the reader's understanding of the text.




Cryptological Mathematics
Author: Robert Edward Lewand
Publisher: The Mathematical Association of America
Year: 2000
Pages: 214
Amazon's book description: This is an introduction to the mathematics involved in the intriguing field of cryptology, the science of writing and reading secret messages which are designed to be read only by their intended recipients. It is written at an elementary level, suitable for beginning undergraduates, with careful explanations of all the concepts used. The basic branches of mathematics required, including number theory, abstract algebra and probability, are used to show how to encipher and decipher messages, and why this works, giving a practical as well as theoretical basis to the subject. Challenging computer programming exercises are also included.




Elementary Cryptanalysis: A Mathematical Approach
Author: Abraham Sinkov
Publisher: The Mathematical Association of America
Year: 1998
Pages: 232
Amazon's book description: Most people, acquainted with cryptology either through sensational cloak and dagger stories or through newspaper cryptograms, are not aware that many aspects of this art may be treated systematically, by means of some elementary mathematical concepts and methods. In this introduction, Professor Sinkov explains some of the fundamental techniques at the basis of cryptanalytic endeavor from which much more sophisticated techniques have evolved, especially since the advent of computers. The mathematical topics relevant in these discussions include modular arithmetic, a little number theory, some linear algebra of two dimensions with matrices, some combinatorics, and a little statistics.




Applied Cryptography: Protocols, Algorithms, and Source Code in C
Author: Bruce Schneier
Publisher: Wiley
Year: 1996
Pages: 758
Amazon's book description: Cryptographic techniques have applications far beyond the obvious uses of encoding and decoding information. For Internet developers who need to know about capabilities, such as digital signatures, that depend on cryptographic techniques, there's no better overview than Applied Cryptography, the definitive book on the subject. Bruce Schneier covers general classes of cryptographic protocols and then specific techniques, detailing the inner workings of real-world cryptographic algorithms including the Data Encryption Standard and RSA public-key cryptosystems. The book includes source-code listings and extensive advice on the practical aspects of cryptography implementation, such as the importance of generating truly random numbers and of keeping keys secure.




Handbook of Applied Cryptography
Author: Alfred J. Menezes, Paul C. van Oorschot, Scott A. Vanstone
Publisher: CRC
Year: 1996
Pages: 816
Amazon's book description: This book is an incredible achievement. The handbook is complete. If I want to check what problems there were with a proposed system, determine how the variations on a particular algorithm developed, see what research preceded and followed an idea, I go to the Handbook. The Handbook has accurate, clear, and correct information. It is wonderful. If I were limited to only one cryptography text on my shelves, it would be the Handbook of Applied Cryptography.