Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống
1
/ 446 trang
THÔNG TIN TÀI LIỆU
Thông tin cơ bản
Định dạng
Số trang
446
Dung lượng
4,1 MB
Nội dung
[...]... asked yourself, “Just how do I setup AES anyways?” then this text is for you This text is not for people looking at a solid academic track in cryptography. This is not the Handbook of Applied Cryptography, nor is it the Foundations of Cryptography Simply put, if you are not tasked with implementing cryptography, this book may not be for you.This is part of the thinking that went into the design and writing... afford www.syngress.com 404_CRYPTO_Preface.qxd 10/30/06 1:03 PM Page xxi Foreword xxi him as much time to help on this project as he would have liked, but his help was still crucial It is safe to say we can expect a text or two from Simon in the years to come So what is this book about? Cryptography for Developers Sounds authorative and independent: Right and wrong.This text is an essential guide for. .. goal of the end-user product, but merely a requirement for the product to be useful For example, banking hardly requires cryptography to function; you can easily hand someone $10 without first performing an RSA key exchange Similarly, cell phones do not require cryptography to function.The concept of digitizing speech, compressing it, encoding the bits for transmission over a radio and the reverse process... xxii Foreword I would like to thank various people for helping throughout this project Greg Rose helped review a chapter He also provided some inspiration and insightful comments I would like to thank Simon for joining the project and contributing to the quality of the text I would like to thank Microsoft Word for giving me a hard time I would like to thank Andrew, Erin, and the others at Syngress for. .. this book for? I wrote this book for the sort of people who send me support e-mail for my projects.That is not to say this text is about the projects, merely about the problems users seem to have when using them Often, developers tasked with security problems are not cryptographers.They are bright people, who, with careful guidance, can implement secure cryptosystems This text aims to guide developers. .. passion for all things cryptography related In particular, I am a fan of working with specialty hardware and embedded systems My claim to fame and probably how you came to know about this text is through the LibTom series of projects.These are a series of cryptographic and mathematic libraries written to solve various problems that real-life developers have.They were also written to be educational for. .. Decryption Tables 167 Macros 168 Key Schedule 169 Performance 174 x86 Performance 174 ARM Performance 176 Performance of the Small Variant 178 Inverse Key Schedule 180 Practical Attacks ... without one thought toward cryptography www.syngress.com 404_CRYPTO_01.qxd 10/27/06 4:40 PM Page 3 Introduction • Chapter 1 Because security is not a core product value, it is either neglected or relegated to a secondary “desired” goal list.This is rather unfortunate, since cryptography and the deployment of is often a highly manageable task that does not require an advanced degree in cryptography or mathematics... accomplish the intended goal? What Is Cryptography? Cryptography is the automated (or algorithmic) method in which security goals are accomplished.Typically, when we say “crypto algorithm” we are discussing an algorithm meant to be executed on a computer.These algorithms operate on messages in the form of groups of bits More specifically, people often think of cryptography as the study of ciphers; that... produce a fixed sized output called a message tag.The tag would be the information a verifier could use to validate a document Unlike hash functions, the set of MAC functions requires a secret key to prevent anyone from forging tags (Figure 1.5) Figure 1.5 Block Diagram for a MAC Function Secret Key Message MAC Tag The two most common forms of MAC algorithms are the CBC-MAC (now implemented per the OMAC1 . E-BOOKS For readers who can’t wait for hard copy, we offer most of our titles in download- able Adobe PDF form. These e-books are often available weeks before hard copies, and are priced affordably. SYNGRESS. well-established program for site licensing our e-books onto servers in corporations, educational institutions, and large organizations. Contact us at sales@syngress.com for more information. CUSTOM. Syngress books, as well as their own content, into a single volume for their own internal use. Contact us at sales@syngress.com for more information. Visit us at 404_CRYPTO_FM.qxd 10/30/06 2:33 PM Page