CONTENTS IN DETAIL
- PRAISE FOR SERIOUS CRYPTOGRAPHY
- TITLE PAGE
- COPYRIGHT
- ABOUT THE AUTHOR AND TECHNICAL REVIEWER
- FOREWORD TO THE FIRST EDITION
- ACKNOWLEDGMENTS
- INTRODUCTION
- This Book’s Approach
- Who This Book Is For
- How This Book Is Organized
- On the Second Edition
- LIST OF ABBREVIATIONS
- PART I: FUNDAMENTALS
- 1ENCRYPTION
- The Basics
- Classical Ciphers
- The Caesar Cipher
- The Vigenère Cipher
- How Ciphers Work
- The Permutation
- The Mode of Operation
- Why Classical Ciphers Are Insecure
- The Perfect Cipher: The One-Time Pad
- Encryption and Decryption
- Why Is the One-Time Pad Secure?
- Encryption Security
- Attack Models
- Security Goals
- Security Notions
- Asymmetric Encryption
- When Ciphers Do More Than Encryption
- Authenticated Encryption
- Format-Preserving Encryption ...
Get Serious Cryptography, 2nd Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.