Cryptographic Day: A selection of books on the topic

    Homeland hears , Vasya Lozhkin


    Today in Russia is the day of the cryptographer. Long gone are the days when encryption was the destiny of only the military and spies. Now it is widely used in IT. Therefore, in honor of the holiday, we have made a selection of books for you on issues related to encryption.


    Applied cryptography. C protocols, algorithms, and source code


    image


    The book describes how programmers and electronic communications specialists can use cryptography to keep data private. Dozens of algorithms are described, practical advice is given on their implementation in software, and it is shown what problems they can solve.


    Discrete mathematics methods in cryptology


    image


    The book is written by a leading specialist in the field of cryptology, with many years of teaching experience at MEPhI. The properties of functions defined on finite sets that are relevant for the construction and analysis of cryptographic systems are systematically described. In order to consolidate the material, tasks and exercises are given.


    The use of artificial neural networks and the system of residual classes in cryptography


    image


    The monograph presents the ideas of artificial neural networks and systems of residual classes in their application to cryptography, and various types of artificial neural networks are considered. The results of scientific research over the past decade in the field of information security using elements of artificial intelligence and modular arithmetic are presented. The stated results are of significant interest for modern developers of neural network cryptosystems based on a system of residual classes. A bibliography of works on the use of neurocomputers for solving problems of graph theory is given.


    Encoders and radio intelligence. Shield and sword of the information world. Volume 1. Notes of the cryptographer


    image


    The author focuses on things previously hidden from ordinary citizens by a dense cover of secrets: cryptography, encryption, radio intelligence. And who would have thought that not only the fate of states and the greatest rulers of the world, but also the everyday personal lives of ordinary citizens depend on them.


    A few years ago, the scenario of the development of events in the information cyberspace of the future described by the author seemed fantastic, but today, unfortunately, many of Anatoly Klepov’s predictions and warnings become part of our life. And what lies ahead?


    Will a person be able to defend himself independently from the attacks of hackers or criminals in the near future? Will one of the attackers take the opportunity to take control of information and even the consciousness of civilization ?!


    The Code Book: The Secret History of Codes and Code-breaking


    image


    From ancient codes to the fascinating world of quantum computing, the author gives very illustrative examples illustrating the high complexity and difficulty of cryptanalysis. Modern linguistics, mathematics and computer science are involved. This is an endless quest - protecting our privacy from the invasion of governments, corporations, competitors and the curious. In the modern technological world, there are many problems with privacy.


    Mastering Bitcoin: Unlocking Digital Cryptocurrencies


    image


    This book will be useful to anyone interested in the basics of cryptocurrencies, technical operations with bitcoins, as well as developers of the next generation of cryptocurrencies or applications using them. This book will help you work out all aspects of digital money: from using a wallet to buying goods and launching a trading platform with hundreds of thousands of transactions, as well as building new financial innovations that will change our understanding of currency and credit.


    Understanding Cryptography: A Textbook for Students and Practitioners


    image


    After the introduction to cryptography and data security, the author explains the basic technologies in modern cryptography. There are chapters dedicated to:


    • streaming encryption
    • DES (Data Encryption Standard) and 3DES,
    • AES (Advanced Encryption Standard),
    • block ciphers
    • RSA cryptosystem
    • public key cryptosystems based on the discrete logarithm problem,
    • elliptic curve cryptography,
    • digital signatures
    • hash functions
    • Message Authentication Codes (MAC)
    • key enrollment methods, including certificates and public key infrastructure.

    There is a minimum of mathematics, the emphasis is on the connection of technologies and descriptions of practical implementations, including “light” ciphers for RFID and mobile devices.


    Bulletproof SSL and TLS: Understanding and Deploying SSL / TLS and PKI to Secure Servers and Web Applications


    image


    This is a complete guide to using SSL and TLS encryption to deploy secure servers and web applications.


    Cryptography Engineering: Design Principles and Practical Applications


    image


    The book covers topics such as block ciphers, block modes, hash functions, encryption modes, message authentication codes, implementation problems, negotiation protocols, and much more.


    Data Hiding: Exposing Concealed Data in Multimedia, Operating Systems, Mobile Devices and Network Protocols


    image


    The book explores modern and promising tools and techniques used in secret communications, advanced malware methods and data hiding tactics. The hiding methods described include the latest technologies, including mobile devices, multimedia, virtualization, and others. These concepts provide corporate, government, and military personnel with the knowledge to investigate and protect against internal threats, spyware, espionage, advanced malware, and secret messages. Understanding the threats in all their diversity, you will understand how to defend against them through detection, investigation, mitigation and prevention.


    Cryptography & open source


    image


    The book provides a good theoretical basis for encrypting and decrypting messages based on simple mathematical tricks and many other methods, including with respect to Open Source.


    The Mathematics of Secrets: Cryptography from Caesar Ciphers to Digital Encryption


    image


    The author shows which mathematical foundation underlies many codes and ciphers. The book describes both the creation and breaking of ciphers, discusses many ancient and modern ciphers. The story begins with one of the simplest - Caesar's cipher, and it is shown which mathematical idea is at its core, how to increase its flexibility. Then, polyalphabetic wildcard ciphers, wildcard ciphers are examined, the relationship between ciphers and computer encryption is shown, in-line encryption and encryption involving potentiation are discussed. The author explores public key ciphers, and discusses the encryption of the future, the ways of cryptography development.


    Post-quantum cryptography


    image


    Quantum computers will allow breaking the most popular public key ciphers, including RSA, DSA, and ECDSA. The book talks about cryptographic algorithms of a new generation, about systems that can withstand the attacks of quantum computers. In particular, post-quantum encryption systems and public key signatures are considered. It describes the current state of quantum computing, encryption based on hashes, codes, lattices, as well as multidimensional encryption.


    The Mathematics of Ciphers: Number Theory and RSA Cryptography


    image


    This is an introduction to the algorithmic aspects of number theory and their application in cryptography with an emphasis on RSA. A large number of interesting historical facts are also given.


    Number Theory in Science and Communication: With Applications in Cryptography, Physics, Digital Information, Computing, and Self-Similarity


    image


    In this introduction to the field of applied mathematics, which is encryption, emphasis is placed on intuitive understanding, rather than abstract theory. Important ideas such as continued fractions, the golden ratio, the quadratic residue and the Chinese remainder theorem, functions with a secret, pseudo-simple numbers and primitive elements are highlighted. Their application for solving real problems is the main topic of the book.


    Also popular now: