Handbook of Applied Cryptography

This book is intended as a reference for professional cryptographers, presenting the techniques and algorithms of greatest interest to the current practitioner, along with the supporting motivation and background material.

**Tag(s):**
Cryptography

**Publication date**: 01 Oct 1996

**ISBN-10**:
0849385237

**ISBN-13**:
n/a

**Paperback**:
n/a

**Views**: 35,660

Handbook of Applied Cryptography

This book is intended as a reference for professional cryptographers, presenting the techniques and algorithms of greatest interest to the current practitioner, along with the supporting motivation and background material.

Terms and Conditions:

Book excerpts:

The goal of this book was to assimilate the existing cryptographic knowledge of industrial interest into one consistent, self-contained volume accessible to engineers in practice, to computer scientists and mathematicians in academia, and to motivated non-specialists with a strong desire to learn cryptography. Such a task is beyond the scope of each of the following: research papers, which by nature focus on narrow topics using very specialized (and often non-standard) terminology; survey papers, which typically address, at most, a small number of major topics at a high level; and (regretably also) most books, due to the fact that many book authors lack either practical experience or familiarity with the research literature or both.

This book provides a detailed presentation of those areas of cryptography which have been found to be of greatest practical utility in industrial experience, while maintaining a sufficiently formal approach to be suitable both as a trustworthy reference for those whose primary interest is further research, and to provide a solid foundation for students and others first learning the subject.

Throughout each chapter, this book emphasizes the relationship between various aspects of cryptography. Background sections commence most chapters, providing a framework and perspective for the techniques which follow. Computer source code (e.g. C code) for algorithms has been intentionally omitted, in favor of algorithms specified in sufficient detail to allow direct implementation without consulting secondary references. This style of presentation allows a better understanding of how algorithms actually work, while at the same time avoiding low-level implementation-specific constructs (which some readers will invariably be unfamiliar with) of various currently-popular programming languages.

In most cases (with some historical exceptions), where algorithms are known to be insecure, this book leaves out specification of their details, since most such techniques are of little practical interest. Essentially all of the algorithms included have been verified for correctness by independent implementation, confirming the test vectors specified.

Intended Audience

This book is intended as a reference for professional cryptographers, presenting the techniques and algorithms of greatest interest to the current practitioner, along with the supporting motivation and background material. It also provides a comprehensive source from which to learn cryptography, serving both students and instructors. In addition, the rigorous treatment, breadth, and extensive bibliographic material should make it an important reference for research professionals.

Reviews:

Slashdot

Amazon.com

The author wrote:Permission is granted to retrieve, print and store a single copy of this chapter for personal use. This permission does not extend to binding multiple chapters of the book, photocopying or producing copies for other than personal use of the person creating the copy, or making electronic copies available for retrieval by others without prior permission in writing from CRC Press. Click here for full Copyright Notice.

Book excerpts:

The goal of this book was to assimilate the existing cryptographic knowledge of industrial interest into one consistent, self-contained volume accessible to engineers in practice, to computer scientists and mathematicians in academia, and to motivated non-specialists with a strong desire to learn cryptography. Such a task is beyond the scope of each of the following: research papers, which by nature focus on narrow topics using very specialized (and often non-standard) terminology; survey papers, which typically address, at most, a small number of major topics at a high level; and (regretably also) most books, due to the fact that many book authors lack either practical experience or familiarity with the research literature or both.

This book provides a detailed presentation of those areas of cryptography which have been found to be of greatest practical utility in industrial experience, while maintaining a sufficiently formal approach to be suitable both as a trustworthy reference for those whose primary interest is further research, and to provide a solid foundation for students and others first learning the subject.

Throughout each chapter, this book emphasizes the relationship between various aspects of cryptography. Background sections commence most chapters, providing a framework and perspective for the techniques which follow. Computer source code (e.g. C code) for algorithms has been intentionally omitted, in favor of algorithms specified in sufficient detail to allow direct implementation without consulting secondary references. This style of presentation allows a better understanding of how algorithms actually work, while at the same time avoiding low-level implementation-specific constructs (which some readers will invariably be unfamiliar with) of various currently-popular programming languages.

In most cases (with some historical exceptions), where algorithms are known to be insecure, this book leaves out specification of their details, since most such techniques are of little practical interest. Essentially all of the algorithms included have been verified for correctness by independent implementation, confirming the test vectors specified.

Intended Audience

This book is intended as a reference for professional cryptographers, presenting the techniques and algorithms of greatest interest to the current practitioner, along with the supporting motivation and background material. It also provides a comprehensive source from which to learn cryptography, serving both students and instructors. In addition, the rigorous treatment, breadth, and extensive bibliographic material should make it an important reference for research professionals.

Reviews:

Slashdot

:) "If you want to learn about cryptography, not the politics but the actual technology, then this is a great book to get before you get over your head. It's very readable and while the math can be a little heavy in places it is accessible and useful. It gives you a good flavor of how more advanced papers and books on the subject are and it avoids the nonacademic discussions surrounding cryptography."

Amazon.com

:) "If you're going to work in the area of Cryptography, you can't afford to neglect this book."

:) "This is a fairly strong book on crypto, with heavy detail on the math involved."

:) "The mathematical background information and explanations are complete and clear. It is very satisfying to be able to read the prose and implement the ideas in a computer program with ease."

Tweet

About The Author(s)

Alfred J. Menezes is a professor in the Department of Combinatorics & Optimization (C&O) at the University of Waterloo, where he is also a member of the Centre for Applied Cryptographic Research. Alfred's interests include all aspects of information security, especially elliptic curve cryptography, protocols, and algorithmic number theory.

Paul C. Van Oorschot is a Professor of Computer Science at Carleton University in Ottawa, where he is Canada Research Chair in Authentication and Computer Security. His current research interests include authentication and identity management, security and usability, smartphone security, software security, and generally computer and Internet security.

Professor Scott Alexander Vanstone (1947-2014) was a cryptographer who co-authored the Handbook of Applied Cryptography. He was on faculty at the University of Waterloo's Faculty of Mathematics and was a member of the school's Centre for Applied Cryptographic Research. Professor Scott Alexander Vanstone passed away on March 2, 2014, at his home in Campbellville, Canada.

Book Categories

Computer Science
15
Introduction to Computer Science
31
Introduction to Computer Programming
48
Algorithms and Data Structures
24
Artificial Intelligence
23
Computer Vision
25
Machine Learning
6
Neural Networks
20
Game Development and Multimedia
25
Data Communication and Networks
5
Coding Theory
15
Computer Security
8
Information Security
34
Cryptography
3
Information Theory
18
Computer Organization and Architecture
22
Operating Systems
1
Image Processing
10
Parallel Computing
4
Concurrent Programming
19
Relational Database
3
Document-oriented Database
13
Data Mining
16
Big Data
12
Data Science
23
Digital Libraries
21
Compiler Design and Construction
23
Functional Programming
10
Logic Programming
26
Object Oriented Programming
21
Formal Methods
68
Software Engineering
3
Agile Software Development
6
Information Systems
5
Geographic Information System (GIS)

Mathematics
67
Mathematics
10
Algebra
27
Linear Algebra
3
Number Theory
6
Numerical Methods
2
Precalculus
7
Calculus
5
Category Theory
7
Proofs
18
Discrete Mathematics
24
Theory of Computation
11
Graph Theory
1
Complex Analysis
10
Probability
39
Statistics
4
Game Theory
5
Queueing Theory
12
Operations Research
16
Computer Aided Mathematics

Supporting Fields
18
Web Design and Development
1
Mobile App Design and Development
28
System Administration
2
Cloud Computing
9
Electric Circuits
25
Signal Processing
3
Network Science
2
Project Management

Operating System
Programming/Scripting
6
Ada
13
Assembly
34
C / C++
8
Common Lisp
2
Forth
36
Java
11
JavaScript
1
Lua
15
Microsoft .NET
1
Rexx
12
Perl
6
PHP
65
Python
7
R
1
Rebol
13
Ruby
2
Scheme
3
Tcl/Tk

Miscellaneous