From Long back I wanted to learn cryptography and I wanted to become an expert in that. I wanted to learn most of the cryptography algorithms (hashing, encryption, decryption and cracking). After learning the concepts I wanted to implement some of the algorithms using Java. (Even there is JCE API but I am interested to create a kind of one).
Please provide me list of books in order
Books for learning cryptographic concepts (therotical) books for implementing cryptographic concepts (Practical).
Data Confidentiality, Data Integrity, Authentication and Non-repudiation are core principles of modern-day cryptography.
Symmetric encryption is one of the most basic forms of cryptography and is based on the premise that both the sending and receiving parties are in possession of the key used to encrypt the data (otherwise known as shared secret encryption).
Cryptography can be broken down into three different types: Secret Key Cryptography. Public Key Cryptography. Hash Functions.
Some of my favourites:
Excellent diagrams and explanations of concepts and algorithms
Another book by Schneier which is more about Security than Cryptography. In other words, why cryptography (by itself) cannot guarantee security. In my Top-Ten list.
In his own words (from the book's Preface:)
Seven years ago I wrote another book: Applied Cryptography. In it I described a mathematical utopia: algorithms that would keep your deepest secrets safe for millennia, protocols that could perform the most fantastical electronic interactions-unregulated gambling, undetectable authentication, anonymous cash-safely and securely. In my vision cryptography was the great technological equalizer; anyone with a cheap (and getting cheaper every year) computer could have the same security as the largest government. In the second edition of the same book, written two years later, I went so far as to write: "It is insufficient to protect ourselves with laws; we need to protect ourselves with mathematics."
It's just not true. Cryptography can't do any of that.
What malicious code that uses cryptography techniques can do (and counter-measures).
Well, you've got the classic book by Schneier.
and he appears to have a new one:
If you love us? You can donate to us via Paypal or buy me a coffee so we can maintain and grow! Thank you!
Donate Us With