This practical guide to modern encryption breaks down the fundamental mathematical concepts at the heart of cryptography without shying away from meaty discussions of how they work. You'll learn about authenticated encryptio...

Buy Now From Amazon

Product Review

This practical guide to modern encryption breaks down the fundamental mathematical concepts at the heart of cryptography without shying away from meaty discussions of how they work. You'll learn about authenticated encryption, secure randomness, hash functions, block ciphers, and public-key techniques such as RSA and elliptic curve cryptography.

You'll also learn:
- Key concepts in cryptography, such as computational security, attacker models, and forward secrecy
- The strengths and limitations of the TLS protocol behind HTTPS secure websites
- Quantum computation and post-quantum cryptography
- About various vulnerabilities by examining numerous code examples and use cases
- How to choose the best algorithm or protocol and ask vendors the right questions

Each chapter includes a discussion of common implementation mistakes using real-world examples and details what could go wrong and how to avoid these pitfalls. 

Whether you're a seasoned practitioner or a beginner looking to dive into the field, Serious Cryptography will provide a complete survey of modern encryption and its applications.

Similar Products

Practical Binary Analysis: Build Your Own Linux Tools for Binary Instrumentation, Analysis, and DisassemblyAttacking Network Protocols: A Hacker's Guide to Capture, Analysis, and ExploitationUnderstanding Cryptography: A Textbook for Students and PractitionersRootkits and Bootkits: Reversing Modern Malware and Next Generation ThreatsCryptography Engineering: Design Principles and Practical ApplicationsReal-World Bug Hunting: A Field Guide to Web HackingHands-On Cryptography with Python: Leverage the power of Python to encrypt and decrypt dataMalware Data Science: Attack Detection and AttributionCracking Codes with Python: An Introduction to Building and Breaking CiphersPractical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software