Handbook of Applied Cryptography

This book is intended as a reference for professional cryptographers, presenting the techniques and algorithms of greatest interest to the current practitioner, along with the supporting motivation and background material.

**Tag(s):**
Information Security

**Publication date**: 01 Oct 1996

**ISBN-10**:
0849385237

**ISBN-13**:
n/a

**Paperback**:
n/a

**Views**: 35,090

Handbook of Applied Cryptography

This book is intended as a reference for professional cryptographers, presenting the techniques and algorithms of greatest interest to the current practitioner, along with the supporting motivation and background material.

Terms and Conditions:

Book excerpts:

The goal of this book was to assimilate the existing cryptographic knowledge of industrial interest into one consistent, self-contained volume accessible to engineers in practice, to computer scientists and mathematicians in academia, and to motivated non-specialists with a strong desire to learn cryptography. Such a task is beyond the scope of each of the following: research papers, which by nature focus on narrow topics using very specialized (and often non-standard) terminology; survey papers, which typically address, at most, a small number of major topics at a high level; and (regretably also) most books, due to the fact that many book authors lack either practical experience or familiarity with the research literature or both.

This book provides a detailed presentation of those areas of cryptography which have been found to be of greatest practical utility in industrial experience, while maintaining a sufficiently formal approach to be suitable both as a trustworthy reference for those whose primary interest is further research, and to provide a solid foundation for students and others first learning the subject.

Throughout each chapter, this book emphasizes the relationship between various aspects of cryptography. Background sections commence most chapters, providing a framework and perspective for the techniques which follow. Computer source code (e.g. C code) for algorithms has been intentionally omitted, in favor of algorithms specified in sufficient detail to allow direct implementation without consulting secondary references. This style of presentation allows a better understanding of how algorithms actually work, while at the same time avoiding low-level implementation-specific constructs (which some readers will invariably be unfamiliar with) of various currently-popular programming languages.

In most cases (with some historical exceptions), where algorithms are known to be insecure, this book leaves out specification of their details, since most such techniques are of little practical interest. Essentially all of the algorithms included have been verified for correctness by independent implementation, confirming the test vectors specified.

Intended Audience

This book is intended as a reference for professional cryptographers, presenting the techniques and algorithms of greatest interest to the current practitioner, along with the supporting motivation and background material. It also provides a comprehensive source from which to learn cryptography, serving both students and instructors. In addition, the rigorous treatment, breadth, and extensive bibliographic material should make it an important reference for research professionals.

Reviews:

Slashdot

Amazon.com

The author wrote:Permission is granted to retrieve, print and store a single copy of this chapter for personal use. This permission does not extend to binding multiple chapters of the book, photocopying or producing copies for other than personal use of the person creating the copy, or making electronic copies available for retrieval by others without prior permission in writing from CRC Press. Click here for full Copyright Notice.

Book excerpts:

The goal of this book was to assimilate the existing cryptographic knowledge of industrial interest into one consistent, self-contained volume accessible to engineers in practice, to computer scientists and mathematicians in academia, and to motivated non-specialists with a strong desire to learn cryptography. Such a task is beyond the scope of each of the following: research papers, which by nature focus on narrow topics using very specialized (and often non-standard) terminology; survey papers, which typically address, at most, a small number of major topics at a high level; and (regretably also) most books, due to the fact that many book authors lack either practical experience or familiarity with the research literature or both.

This book provides a detailed presentation of those areas of cryptography which have been found to be of greatest practical utility in industrial experience, while maintaining a sufficiently formal approach to be suitable both as a trustworthy reference for those whose primary interest is further research, and to provide a solid foundation for students and others first learning the subject.

Throughout each chapter, this book emphasizes the relationship between various aspects of cryptography. Background sections commence most chapters, providing a framework and perspective for the techniques which follow. Computer source code (e.g. C code) for algorithms has been intentionally omitted, in favor of algorithms specified in sufficient detail to allow direct implementation without consulting secondary references. This style of presentation allows a better understanding of how algorithms actually work, while at the same time avoiding low-level implementation-specific constructs (which some readers will invariably be unfamiliar with) of various currently-popular programming languages.

In most cases (with some historical exceptions), where algorithms are known to be insecure, this book leaves out specification of their details, since most such techniques are of little practical interest. Essentially all of the algorithms included have been verified for correctness by independent implementation, confirming the test vectors specified.

Intended Audience

This book is intended as a reference for professional cryptographers, presenting the techniques and algorithms of greatest interest to the current practitioner, along with the supporting motivation and background material. It also provides a comprehensive source from which to learn cryptography, serving both students and instructors. In addition, the rigorous treatment, breadth, and extensive bibliographic material should make it an important reference for research professionals.

Reviews:

Slashdot

:) "If you want to learn about cryptography, not the politics but the actual technology, then this is a great book to get before you get over your head. It's very readable and while the math can be a little heavy in places it is accessible and useful. It gives you a good flavor of how more advanced papers and books on the subject are and it avoids the nonacademic discussions surrounding cryptography."

Amazon.com

:) "If you're going to work in the area of Cryptography, you can't afford to neglect this book."

:) "This is a fairly strong book on crypto, with heavy detail on the math involved."

:) "The mathematical background information and explanations are complete and clear. It is very satisfying to be able to read the prose and implement the ideas in a computer program with ease."

Tweet

About The Author(s)

Alfred J. Menezes is a professor in the Department of Combinatorics & Optimization (C&O) at the University of Waterloo, where he is also a member of the Centre for Applied Cryptographic Research. Alfred's interests include all aspects of information security, especially elliptic curve cryptography, protocols, and algorithmic number theory.

Paul C. Van Oorschot is a Professor of Computer Science at Carleton University in Ottawa, where he is Canada Research Chair in Authentication and Computer Security. His current research interests include authentication and identity management, security and usability, smartphone security, software security, and generally computer and Internet security.

Professor Scott Alexander Vanstone (1947-2014) was a cryptographer who co-authored the Handbook of Applied Cryptography. He was on faculty at the University of Waterloo's Faculty of Mathematics and was a member of the school's Centre for Applied Cryptographic Research. Professor Scott Alexander Vanstone passed away on March 2, 2014, at his home in Campbellville, Canada.

Book Categories

Computer Science
40
Introduction to Computer Science
41
Algorithms and Data Structures
19
Object Oriented Programming
21
Theory of Computation
18
Formal Methods
17
Functional Programming
10
Logic Programming
23
Artificial Intelligence
21
Computer Vision
9
Big Data
3
Neural Networks
18
Compiler Design and Construction
16
Computer Organization and Architecture
9
Parallel Computing
3
Concurrent Programming
22
Operating Systems
22
Data Communication and Networks
29
Information Security
6
Information Theory
23
Digital Libraries
14
Information Systems
61
Software Engineering
17
Game Development and Multimedia
9
Data Mining
20
Machine Learning

Mathematics
65
Mathematics
1
Precalculus
9
Algebra
6
Calculus
5
Category Theory
24
Linear Algebra
16
Computer Aided Mathematics
5
Proofs
15
Discrete Mathematics
6
Numerical Methods
3
Number Theory
10
Graph Theory
11
Operations Research
1
Complex Analysis
5
Queueing Theory
29
Statistics
9
Probability

Supporting Fields
Operating System
Programming/Scripting
6
Ada
12
Assembly
33
C / C++
8
Common Lisp
2
Forth
34
Java
8
JavaScript
1
Lua
14
Microsoft .NET
11
Perl
5
PHP
54
Python
1
Rebol
9
Ruby
1
Scheme
3
Tcl/Tk

Miscellaneous