[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

*To*: [email protected]*Subject*: How to order Applied Crypto direct from Bruce Schneier*From*: "Perry E. Metzger" <[email protected]>*Date*: Thu, 23 Nov 1995 14:37:33 -0500*Reply-To*: [email protected]*Sender*: [email protected]

Several people have asked for this. You might want to email him to ask if the offer is still open, since this was a while back. From: Bruce Schneier <[email protected]> Subject: Applied Cryptography, 2nd Edition: Ordering Information Date: Sun, 17 Sep 1995 18:09:34 -0500 (CDT) The SECOND EDITION of APPLIED CRYPTOGRAPHY is coming in November. This is a major rewrite: 50% more words, 7 more chapters, and over 1600 references. Not only did I make corrections to the first edition and add developments since it was published, but I also included topics left out of the first edition. (See table of contents--attached.) The second edition has lots of new algorithms (including GOST, Blowfish, RC4, and A5), more information on the Clipper Chip and key escrow, dozens of new protocols, more information on how PGP works, detailed information on key management and modes of operation, and new source code. The second edition will be published in paperback and hardcover. Right now I am making both available at a 15% discount. ***************************************************************** ORDER FORM Applied Cryptography, 2nd Edition (Hardcover): $70 * .85 = $59.00 Applied Cryptography, 2nd Edition (Softcover): $50 * .85 = $42.00 Shipping: Air (U.S.): $5 per book Surface (U.S.): $3 per book Canada/Mexico: $7 per book Everywhere else: $9 per book Send to: Counterpane Systems, 101 E Minnehaha Parkway, Minneapolis, MN 55419 I need payment by check, in U.S. funds drawn on a U.S. bank. Or a postal money order. Sorry, no credit cards. ***************************************************************** APPLIED CRYPTOGRAPHY, SECOND EDITION Table of Contents ((Sections in all capitals are either new or substantially rewritten.)) Forward by Whitfield Diffie Preface Chapter 1: Foundations Terminology; STEGANOGRAPHY; Substitution Ciphers and Transposition Ciphers; Simple XOR; One-Time Pads; Computer Algorithms; Large Numbers Part I: Cryptographic Protocols Chapter 2: Protocol Building Blocks Introduction to Protocols; Communications using Symmetric Cryptography; One-Way Functions; One-Way Hash Functions; Communications using Public-Key Cryptography; Digital Signatures; Digital Signatures with Encryption; Random and Pseudo-Random Sequence Generation Chapter 3: Basic Protocols Key Exchange; Authentication; AUTHENTICATION AND KEY EXCHANGE; FORMAL ANALYSIS OF AUTHENTICATION AND KEY-EXCHANGE PROTOCOLS; Multiple-Key Public-Key Cryptography; Secret Splitting; Secret Sharing; Cryptographic Protection of Databases Chapter 4: Intermediate Protocols Timestamping Services; Subliminal Channel; Undeniable Digital Signatures; DESIGNATED CONFIRMER SIGNATURES; PROXY SIGNATURES; Group Signatures; Fail-Stop Digital Signatures; Computing with Encrypted Data; Bit Commitment; Fair Coin Flips; Mental Poker; ONE-WAY ACCUMULATORS; All-or-Nothing Disclosure of Secrets; KEY ESCROW Chapter 5: Advanced Protocols ZERO-KNOWLEDGE PROOFS; Zero-Knowledge Proofs of Identity; Blind Signatures; IDENTITY-BASED PUBLIC-KEY CRYPTOGRAPHY; Oblivious Transfer; OBLIVIOUS SIGNATURES; Simultaneous Contract Signing; Digital Certified Mail; Simultaneous Exchange of Secrets Chapter 6: Esoteric Protocols SECURE ELECTIONS; Secure Multiparty Computation; Anonymous Message Broadcast; DIGITAL CASH Part II: Cryptographic Techniques Chapter 7: Key Length SYMMETRIC KEY LENGTH; PUBLIC-KEY KEY LENGTH; COMPARING SYMMETRIC AND PUBLIC-KEY KEY LENGTH; BIRTHDAY ATTACKS AGAINST ONE-WAY HASH FUNCTIONS; How Long Should a Key Be?; Caveat Emptor Chapter 8: Key Management Generating Keys; NONLINEAR KEYSPACES; Transferring Keys; Verifying Keys; Using Keys; UPDATING KEYS; Storing Keys; Backup Keys; Compromised Keys; Lifetime of Keys; Destroying Keys; Public-Key Key Management Chapter 9: Algorithm Types and Modes Electronic Codebook Mode; Block Replay; Cipher Block Chaining Mode; Stream Ciphers; Self-Synchronizing Stream Ciphers; Cipher-Feedback Mode; Synchronous Stream Ciphers; Output-Feedback Mode; Counter Mode; Other Block-Cipher Modes; CHOOSING A CIPHER MODE; INTERLEAVING; Block Ciphers vs. Stream Ciphers Chapter 10: Using Algorithms Choosing an Algorithm; Public-Key Cryptography vs. Symmetric Cryptography; Encrypting Communications Channels; ENCRYPTING DATA FOR STORAGE; Hardware Encryption vs. Software Encryption; COMPRESSION, ENCODING, AND ENCRYPTION; DETECTING ENCRYPTION; HIDING CIPHERTEXT IN CIPHERTEXT; DESTROYING INFORMATION Part III: Cryptographic Algorithms Chapter 11: Mathematical Background Information Theory; Complexity Theory; NUMBER THEORY; FACTORING; Prime Number Generation; Discrete Logarithms in a Finite Field Chapter 12: Data Encryption Standard Background; Description of DES; Security of DES; DIFFERENTIAL AND LINEAR CRYPTANALYSIS; THE REAL DESIGN CRITERIA; DES VARIANTS; HOW SECURE IS DES TODAY? Chapter 13: Other Block Algorithms Lucifer; Madryga; Newdes; Feal-N; Redoc; LOKI; Khufu and Khafre; RC2; Idea; Mmb; CA-1.1; SKIPJACK Chapter 14: Still Other Block Algorithms GOST; CAST; BLOWFISH; SAFER K-64; 3-WAY; CRAB; SXAL8/MBAL; RC5; OTHER BLOCK ALGORITHMS; THEORY OF BLOCK CIPHER DESIGN; USING ONE-WAY HASH FUNCTIONS; CHOOSING A BLOCK ALGORITHM Chapter 15: Combining Block Algorithms DOUBLE ENCRYPTION; TRIPLE ENCRYPTION; DOUBLING THE BLOCK LENGTH; OTHER MULTIPLE ENCRYPTION SCHEMES; CDMF KEY SHORTENING; WHITENING; CASCADING MULTIPLE BLOCK ALGORITHMS; COMBINING MULTIPLE BLOCK ALGORITHMS Chapter 16: Pseudo-Random-Sequence Generators and Stream Ciphers Linear Congruential Generators; Linear Feedback Shift Registers; LFSRs in Software; DESIGN AND ANALYSIS OF STREAM CIPHERS; Stream Ciphers using LFSRs; A5; HUGHES XPD/KPD; NANOTEQ; RAMBUTAN; ADDITIVE GENERATORS; GIFFORD; ALGORITHM M; PKZIP Chapter 17: Other Stream Ciphers and Real Random-Sequence Generators RC4; SEAL; WAKE; FEEDBACK WITH CARRY SHIFT REGISTERS; STREAM CIPHERS USING FCSRS; NONLINEAR FEEDBACK SHIFT REGISTERS; Other Stream Ciphers; System-Theoretic Approach to Stream Cipher Design; Complexity-Theoretic Approach to Stream Cipher Design; Other Approaches to Stream Cipher Design; CASCADING MULTIPLE STREAM CIPHERS; CHOOSING A STREAM CIPHER; GENERATING MULTIPLE STREAMS FROM A SINGLE PSEUDO- RANDOM SEQUENCE GENERATOR; REAL RANDOM-SEQUENCE GENERATORS Chapter 18: One-Way Hash Functions Background; Snefru; N-HASH; MD4; MD5; MD2; Secure Hash Algorithm (SHA); RIPE-MD; Haval; Other One-Way Hash Functions; ONE-WAY HASH FUNCTIONS USING SYMMETRIC BLOCK ALGORITHMS; Using Public-key Algorithms; CHOOSING A ONE-WAY HASH FUNCTION; MESSAGE AUTHENTICATION CODES Chapter 19: Public-Key Algorithms Background; Knapsack Algorithms; RSA; Pohlig-Hellman; Rabin; ElGamal; McEliece; Elliptic Curve Cryptosystems; LUC; FINITE AUTOMATON PUBLIC-KEY CRYPTOSYSTEMS Chapter 20: Public-Key Digital Signature Algorithms Digital Signature Algorithm (DSA); DSA VARIANTS; GOST DIGITAL SIGNATURE ALGORITHM; DISCRETE LOGARITHM SIGNATURE SCHEMES; Ong-Schnorr-Shamir; Esign; Cellular Automata; Other Public-Key Algorithms Chapter 21: Identification Schemes Feige-Fiat-Shamir; Guillou-Quisquater; Schnorr; CONVERTING IDENTIFICATION SCHEMES TO SIGNATURE SCHEMES Chapter 22: Key-Exchange Algorithms DIFFIE-HELLMAN; STATION-TO-STATION PROTOCOL; Shamir's Three- Pass Protocol; COMSET; Encrypted Key Exchange; FORTIFIED KEY NEGOTIATION; Conference Key Distribution and Secret Broadcasting Chapter 23: Special Algorithms for Protocols Multiple-Key Public-Key Cryptography; Secret Sharing Algorithms; Subliminal Channel; Undeniable Digital Signatures; DESIGNATED CONFIRMER SIGNATURES; Computing with Encrypted Data; Fair Coin Flips; ONE-WAY ACCUMULATORS; All- or-Nothing Disclosure of Secrets; FAIR AND FAILSAFE CRYPTOSYSTEMS; Zero-Knowledge Proofs of Knowledge; Blind Signatures; Oblivious Transfer; Secure Multiparty Computation; Probabilistic Encryption; Quantum Cryptography Part IV: The Real World Chapter 24: Example Implementations IBM Secret-Key Management Protocol; Mitrenet; ISDN; STU-III; Kerberos; KryptoKnight; SESAME; IBM COMMON CRYPTOGRAPHIC ARCHITECTURE; ISO Authentication Framework; Privacy-Enhanced Mail (PEM); Message Security Protocol; PRETTY GOOD PRIVACY (PGP); SMART CARDS; PUBLIC-KEY CRYPTOGRAPHY STANDARDS; UNIVERSAL ELECTRONIC PAYMENT SYSTEM; CLIPPER; CAPSTONE; AT&T MODEL 3600 TELEPHONE SECURITY DEVICE Chapter 25: Politics NATIONAL SECURITY AGENCY; National Computer Security Center; National Institute of Standards and Technology; RSA Data Security, Inc.; PUBLIC KEY PARTNERS; International Association for Cryptologic Research; RACE Integrity Primitives Evaluation; CONDITIONAL ACCESS FOR EUROPE; ISO/IEC 9979; PROFESSIONAL, CIVIL LIBERTIES, AND INDUSTRY GROUPS; Sci.Crypt; CYPHERPUNKS; Patents; U.S. EXPORT RULES; FOREIGN IMPORT AND EXPORT OF CRYPTOGRAPHY; Legal Issues AFTERWARD BY MATT BLAZE Source Code DES; LOKI91; IDEA; GOST; BLOWFISH; 3-WAY; RC5; A5; SEAL; WAKE References

- Prev by Date:
**Re: Java & Netscape security [NOISE]** - Next by Date:
**Re: crypto for porno users** - Prev by thread:
**Two 'punky court hearings: Dec 6th, SF and San Jose** - Next by thread:
**Re: How to order Applied Crypto direct from Bruce Schneier** - Index(es):