LEADER 04486nam 2200769Ia 450 001 9910953971203321 005 20200520144314.0 010 $a9786611071851 010 $a9781281071859 010 $a1281071854 010 $a9780080503455 010 $a0080503454 024 0 $z9781597491044 035 $a(CKB)1000000000298111 035 $a(EBL)319199 035 $a(OCoLC)181421142 035 $a(SSID)ssj0000074341 035 $a(PQKBManifestationID)11171374 035 $a(PQKBTitleCode)TC0000074341 035 $a(PQKBWorkID)10119639 035 $a(PQKB)10455096 035 $a(Au-PeEL)EBL319199 035 $a(CaPaEBR)ebr10151834 035 $a(CaONFJC)MIL107185 035 $a(OCoLC)162597560 035 $a(PPN)170245802 035 $a(OCoLC)123904759 035 $a(OCoLC)ocm123904759 035 $a(FR-PaCSA)88809570 035 $a(CaSebORM)1597491047 035 $a(MiAaPQ)EBC319199 035 $a(FRCYB88809570)88809570 035 $a(EXLCZ)991000000000298111 100 $a20061211d2007 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aCryptography for developers /$fTom St Denis, Simon Johnson 205 $a1st edition 210 $aRockland, MA $cSyngress Publishing, Inc.$dc2007 215 $a1 online resource (449 p.) 300 $aIncludes index. 311 08$a9781597491044 311 08$a1597491047 327 $aFront Cover; Cryptography for Developers; Copyright Page; Contents; Preface; Chapter 1. Introduction; Introduction; Threat Models; What Is Cryptography?; Asset Management; Common Wisdom; Developer Tools; Summary; Organization; Frequently Asked Questions; Chapter 2. ASN.1 Encoding; Overview of ASN.1; ASN.1 Syntax; ASN.1 Data Types; ASN.1 Length Encodings; ASN. 1 Boolean Type; ASN.1 Integer Type; ASN.1 BIT STRING Type; ASN.1 OCTET STRING Type; ASN.1 NULL Type; ASN.1 OBJECT IDENTIFIER Type; ASN.1 SEQUENCE and SET Types; ASN.1 PrintableString and IA5STRING Types; ASN.1 UTCTIME Type 327 $aIniplementationASN.1 Length Routines; ASN.1 Primitive Encoders; Putting It All Together; Frequently Asked Questions; Chapter 3. Random Number Generation; Introduction; Measuring Entropy; How Bad Can It Be?; RNG Design; PRNG Algorithms; Putting It All Together; Frequently Asked Questions; Chapter 4. Advanced Encryption Standard; Introduction; Implementation; Practical Attacks; Chaining Modes; Putting It All Together; Frequently Asked Questions; Chapter 5. Hash Functions; Introduction; Designs of SHS and Implementation; PKCS # 5 Key Derivation; Putting It All Together 327 $aFrequently Asked QuestionsChapter 6. Message-Authentication Code Algorithms; Introduction; Security Guidelines; Standards; Cipher Message Authentication Code; Hash Message Authentication Code; Putting It All Together; Frequently Asked Questions; Chapter 7. Encrypt and Authenticate Modes; Introduction; Design and Implementation; Putting It All Together; Frequently Asked Questions; Chapter 8. Large Integer Arithmetic; Introduction; What Are BigNums?; The Algorithms; Putting It All Together; Frequently Asked Questions; Chapter 9. Public Key Algorithms; Introduction 327 $aGoals of Public Key CryptographyRSA Public Key Cryptography; Elliptic Curve Cryptography; Putting It All Together; Frequently Asked Questions; Index 330 $aThe only guide for software developers who must learn and implement cryptography safely and cost effectively.The book begins with a chapter that introduces the subject of cryptography to the reader. The second chapter discusses how to implement large integer arithmetic as required by RSA and ECC public key algorithms The subsequent chapters discuss the implementation of symmetric ciphers, one-way hashes, message authentication codes, combined authentication and encryption modes, public key cryptography and finally portable coding practices. Each chapter includes in-depth discussion on 606 $aComputer software$xDevelopment 606 $aCryptography 615 0$aComputer software$xDevelopment. 615 0$aCryptography. 676 $a005.8/2 676 $a005.82 676 $a005.82 700 $aSt. Denis$b Tom$0627563 701 $aJohnson$b Simon$0125487 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910953971203321 996 $aCryptography for developers$94337924 997 $aUNINA