Table of Contents
Acknowledgments for Cryptography Engineering
Acknowledgments for Practical Cryptography (the 1st Edition)
Preface to Cryptography Engineering
Preface to Practical Cryptography (the 1st Edition)
Chapter 1: The Context of Cryptography
1.6 Cryptography Is Not the Solution
1.7 Cryptography Is Very Difficult
1.8 Cryptography Is the Easy Part
1.10 Security and Other Design Criteria
1.12 Exercises for Professional Paranoia
Chapter 2: Introduction to Cryptography
3.4 Definition of Block Cipher Security
4.6 Combined Encryption and Authentication
5.1 Security of Hash Functions
5.3 Weaknesses of Hash Functions
5.5 Which Hash Function Should I Choose?
Chapter 6: Message Authentication Codes
6.2 The Ideal MAC and MAC Security
7.1 Properties of a Secure Channel
7.2 Order of Authentication and Encryption
7.3 Designing a Secure Channel: Overview
Chapter 8: Implementation Issues (I)
Chapter 9: Generating Randomness
10.3 Computations Modulo a Prime
12.2 The Chinese Remainder Theorem
Chapter 13: Introduction to Cryptographic Protocols
13.4 Trust in Cryptographic Protocols
14.4 An Authentication Convention
14.8 Different Views of the Protocol
14.9 Computational Complexity of the Protocol
14.12 Key Negotiation from a Password
Chapter 15: Implementation Issues (II)
16.2 Using the Real-Time Clock Chip
16.4 Creating a Reliable Clock
18.1 A Very Short PKI Overview
19.9 So What Is a PKI Good For?
Chapter 20: PKI Practicalities