Develop strong skills for writing cryptographic algorithms and security schemes/modules using C++23 and its new features. This book will teach you the right methods for writing advanced cryptographic algorithms, such as elliptic curve cryptography algorithms, lattice-based cryptography, searchable encryption, and homomorphic encryption. You'll also examine internal cryptographic mechanisms and discover common ways in which the algorithms can be implemented and used correctly in practice. The authors explain the mathematical basis of cryptographic algorithms in terms that a programmer can…mehr
Develop strong skills for writing cryptographic algorithms and security schemes/modules using C++23 and its new features. This book will teach you the right methods for writing advanced cryptographic algorithms, such as elliptic curve cryptography algorithms, lattice-based cryptography, searchable encryption, and homomorphic encryption. You'll also examine internal cryptographic mechanisms and discover common ways in which the algorithms can be implemented and used correctly in practice. The authors explain the mathematical basis of cryptographic algorithms in terms that a programmer can easily understand. They also show how "bad" cryptography can creep in during implementation and what "good" cryptography should look like by comparing advantages and disadvantages based on processing time, execution time, and reliability.
What You Will Learn Discover what modern cryptographic algorithms and methods are used for Design and implement advanced cryptographic mechanisms See how C++23 and its new features are impact the implementation of cryptographic algorithms Practice the basics of public key cryptography, including ECDSA signatures and more See how most of the algorithms can be broken Who This Book Is For
Professional programmers, developers, and software engineers who are developing cryptography algorithms and security schemes/modules in C++. Prior C++ programming and IDE experience and some basic experience of cryptography concepts (symmetric and asymmetric) highly recommended.
Marius Iulian Mihailescu, PhD is CEO at Dapyx Solution Ltd., a company based in Bucharest, Romania and involved in information security- and cryptography-related research projects. He is a lead guest editor for applied cryptography journals and a reviewer for multiple publications with information security and cryptography profiles. He authored and co-authored more than 30 articles in conference proceedings, 25 articles in journals, and three books. For more than six years he has served as a lecturer at well-known national and international universities (University of Bucharest, "Titu Maiorescu" University, Kadir Has University in, Istanbul, Turkey). He has taught courses on programming languages (C#, Java, C++, Haskell), and object-oriented system analysis and design with UML, graphs, databases, cryptography and information security. He served for three years as IT officer at Royal Caribbean Cruises Ltd. where he dealt with IT infrastructure, data security, and satellite communications systems. He received his PhD in 2014 and his thesis was on applied cryptography over biometrics data. He holds two MSc in information security and software engineering. Stefania Loredana Nita, PhD is a software developer at the Institute of Computer Science of the Romanian Academy and a PhD with her thesis on advanced cryptographic schemes using searchable encryption and homomorphic encryption. She has served more than two years as an assistant lecturer at the University of Bucharest where she taught courses on subjects such as advanced programming techniques, simulation methods, and operating systems. She has authored and co-authored more than 15 workpapers at conferences and journals, and has authored two books on he Haskell programming language. She is a lead guest editor for special issues on information security and cryptography such as Advanced Cryptography and Its Future: Searchable and Homomorphic Encryption. She holds an MSc in software engineering and two BSc in computer science and mathematics.
Inhaltsangabe
Part I: Foundations.- 1: Introduction.- 2: Cryptography Fundamentals.- 3: Mathematical Background and Its Applicability.- 4: Large Integer Arithmetic.- 5: Floating Point Arithmetic.- 6: New Features in C++23.- 7: Secure Coding Guidelines.- 8: Cryptography Libraries in C/C++23.- Part II: Pro Cryptography.- 9: Elliptic Curve Cryptography.- 10: Lattice-based Cryptography.- 11: Searchable Encryption.- 12: Homomorphic Encryption.- 13: (Ring) Learning with Errors Cryptography.- 14: Chaos-based Cryptography.- 15: Big Data Cryptography16:Cloud Computing Cryptography.- Part III: Pro Cryptanalysis.- 17: Getting Started with Cryptanalysis.- 18: Cryptanalysis Attacks and Techniques.- 19: Linear and Differential Cryptanalysis.- 20: Integral Cryptanalysis.- 21: Brute Force and Buffer Overflow Attacks.- 22: Text Characterization.- 23: Implementation and Practical Approach of Cryptanalysis Methods.
Part I: Foundations.- 1: Introduction.- 2: Cryptography Fundamentals.- 3: Mathematical Background and Its Applicability.- 4: Large Integer Arithmetic.- 5: Floating Point Arithmetic.- 6: New Features in C++23.- 7: Secure Coding Guidelines.- 8: Cryptography Libraries in C/C++23.- Part II: Pro Cryptography.- 9: Elliptic Curve Cryptography.- 10: Lattice-based Cryptography.- 11: Searchable Encryption.- 12: Homomorphic Encryption.- 13: (Ring) Learning with Errors Cryptography.- 14: Chaos-based Cryptography.- 15: Big Data Cryptography16:Cloud Computing Cryptography.- Part III: Pro Cryptanalysis.- 17: Getting Started with Cryptanalysis.- 18: Cryptanalysis Attacks and Techniques.- 19: Linear and Differential Cryptanalysis.- 20: Integral Cryptanalysis.- 21: Brute Force and Buffer Overflow Attacks.- 22: Text Characterization.- 23: Implementation and Practical Approach of Cryptanalysis Methods.
Part I: Foundations.- 1: Introduction.- 2: Cryptography Fundamentals.- 3: Mathematical Background and Its Applicability.- 4: Large Integer Arithmetic.- 5: Floating Point Arithmetic.- 6: New Features in C++23.- 7: Secure Coding Guidelines.- 8: Cryptography Libraries in C/C++23.- Part II: Pro Cryptography.- 9: Elliptic Curve Cryptography.- 10: Lattice-based Cryptography.- 11: Searchable Encryption.- 12: Homomorphic Encryption.- 13: (Ring) Learning with Errors Cryptography.- 14: Chaos-based Cryptography.- 15: Big Data Cryptography16:Cloud Computing Cryptography.- Part III: Pro Cryptanalysis.- 17: Getting Started with Cryptanalysis.- 18: Cryptanalysis Attacks and Techniques.- 19: Linear and Differential Cryptanalysis.- 20: Integral Cryptanalysis.- 21: Brute Force and Buffer Overflow Attacks.- 22: Text Characterization.- 23: Implementation and Practical Approach of Cryptanalysis Methods.
Part I: Foundations.- 1: Introduction.- 2: Cryptography Fundamentals.- 3: Mathematical Background and Its Applicability.- 4: Large Integer Arithmetic.- 5: Floating Point Arithmetic.- 6: New Features in C++23.- 7: Secure Coding Guidelines.- 8: Cryptography Libraries in C/C++23.- Part II: Pro Cryptography.- 9: Elliptic Curve Cryptography.- 10: Lattice-based Cryptography.- 11: Searchable Encryption.- 12: Homomorphic Encryption.- 13: (Ring) Learning with Errors Cryptography.- 14: Chaos-based Cryptography.- 15: Big Data Cryptography16:Cloud Computing Cryptography.- Part III: Pro Cryptanalysis.- 17: Getting Started with Cryptanalysis.- 18: Cryptanalysis Attacks and Techniques.- 19: Linear and Differential Cryptanalysis.- 20: Integral Cryptanalysis.- 21: Brute Force and Buffer Overflow Attacks.- 22: Text Characterization.- 23: Implementation and Practical Approach of Cryptanalysis Methods.
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497