Table of Contents
Abbreviated Table of Contents
Preface (complete text)
Foreword: by Whitfield Diffie (complete text)
Part I: Cryptographic Protocols
Ch. 1: Foundations
Ch. 2: Protocol Building Blocks
Ch. 3: Basic Protocols
Ch. 4: Intermediate Protocols
Ch. 5: Advanced Protocols
Ch. 6: Esoteric Protocols
Part II: Cryptographic Techniques
Ch. 7: Key Length
Ch. 8: Algorithm Types and Modes
Ch. 10: Using Algorithms
Part III: Cryptographic Algorithms
Ch. 11: Mathematical Background
Ch. 12: Data Encryption Standard
Ch. 13: Other Block Algorithms
Ch. 14: Still Other Block Algorithms
Ch. 15: Combining Block Algorithms
Ch. 16: Pseudo-Random-Sequence Generators and Stream Ciphers
Ch. 17: Other Stream Ciphers and Real Random-Sequence Generators
Ch. 18: One-Way Hash Functions
Ch. 19: Public-Key Algorithms
Ch. 20: Public-Key Digital Signature Algorithms
Ch. 21: Identification Schemes
Ch. 22: Key-Exchange Algorithms
Ch. 23:Special Algorithms for Protocols
Part IV: The Real World
Ch. 24: Example Implementations
Ch. 25: Politics
Afterword by Matt Blaze (complete text)
Expanded Table of Contents
Sections in ALL CAPITALS are either new or substantially rewritten from the first edition
- Terminology
- STEGANOGRAPHY
- Substitution Ciphers and Transposition Ciphers
- Simple XOR
- One-Time Pads
- Computer Algorithms
- Large Numbers
Part I: Cryptographic Protocols
Chapter 2: Protocol Building Blocks
- Introduction to Protocols
- Communications using Symmetric Cryptography
- One-Way Functions
- One-Way Hash Functions
- Communications using Public-Key Cryptography
- Digital Signatures
- Digital Signatures with Encryption
- Random and Pseudo-Random Sequence Generation
- Key Exchange
- Authentication
- AUTHENTICATION AND KEY EXCHANGE
- FORMAL ANALYSIS OF AUTHENTICATION AND KEY-EXCHANGE PROTOCOLS
- Multiple-Key Public-Key Cryptography
- Secret Splitting
- Secret Sharing
- Cryptographic Protection of Databases
Chapter 4: Intermediate Protocols
- Timestamping Services
- Subliminal Channel
- Undeniable Digital Signatures
- DESIGNATED CONFIRMER SIGNATURES
- PROXY SIGNATURES
- Group Signatures
- Fail-Stop Digital Signatures
- Computing with Encrypted Data
- Bit Commitment
- Fair Coin Flips
- Mental Poker
- ONE-WAY ACCUMULATORS
- All-or-Nothing Disclosure of Secrets
- KEY ESCROW
- ZERO-KNOWLEDGE PROOFS
- Zero-Knowledge Proofs of Identity
- Blind Signatures
- IDENTITY-BASED PUBLIC-KEY CRYPTOGRAPHY
- Oblivious Transfer
- OBLIVIOUS SIGNATURES
- Simultaneous Contract Signing
- Digital Certified Mail
- Simultaneous Exchange of Secrets
- SECURE ELECTIONS
- Secure Multiparty Computation
- Anonymous Message Broadcast
- DIGITAL CASH
Part II: Cryptographic Techniques
- SYMMETRIC KEY LENGTH
- PUBLIC-KEY KEY LENGTH
- COMPARING SYMMETRIC AND PUBLIC-KEY KEY LENGTH
- BIRTHDAY ATTACKS AGAINST ONE-WAY HASH FUNCTIONS
- How Long Should a Key Be?
- Caveat Emptor
- Generating Keys
- NONLINEAR KEYSPACES
- Transferring Keys
- Verifying Keys
- Using Keys
- UPDATING KEYS
- Storing Keys
- Backup Keys
- Compromised Keys
- Lifetime of Keys
- Destroying Keys
- Public-Key Key Management
Chapter 9: Algorithm Types and Modes
- Electronic Codebook Mode
- Block Replay
- Cipher Block Chaining Mode
- Stream Ciphers
- Self-Synchronizing Stream Ciphers
- Cipher-Feedback Mode
- Synchronous Stream Ciphers
- Output-Feedback Mode
- Counter Mode
- Other Block-Cipher Modes
- CHOOSING A CIPHER MODE
- INTERLEAVING
- Block Ciphers vs. Stream Ciphers
- Choosing an Algorithm
- Public-Key Cryptography vs. Symmetric Cryptography
- Encrypting Communications Channels
- ENCRYPTING DATA FOR STORAGE
- Hardware Encryption vs. Software Encryption
- COMPRESSION, ENCODING, AND ENCRYPTION
- DETECTING ENCRYPTION
- HIDING CIPHERTEXT IN CIPHERTEXT
- DESTROYING INFORMATION
Part III: Cryptographic Algorithms
Chapter 11: Mathematical Background
- Information Theory
- Complexity Theory
- NUMBER THEORY
- FACTORING
- Prime Number Generation
- Discrete Logarithms in a Finite Field
Chapter 12: Data Encryption Standard
- Background
- Description of DES
- Security of DES
- DIFFERENTIAL AND LINEAR CRYPTANALYSIS
- THE REAL DESIGN CRITERIA
- DES VARIANTS
- HOW SECURE IS DES TODAY?
Chapter 13: Other Block Algorithms
- Lucifer
- Madryga
- Newdes
- Feal-N
- Redoc
- LOKI
- Khufu and Khafre
- RC2
- Idea
- Mmb
- CA-1.1
- SKIPJACK
Chapter 14: Still Other Block Algorithms
- GOST
- CAST
- BLOWFISH
- SAFER K-64
- 3-WAY
- CRAB
- SXAL8/MBAL
- RC5
- OTHER BLOCK ALGORITHMS
- THEORY OF BLOCK CIPHER DESIGN
- USING ONE-WAY HASH FUNCTIONS
- CHOOSING A BLOCK ALGORITHM
Chapter 15: Combining Block Algorithms
- DOUBLE ENCRYPTION
- TRIPLE ENCRYPTION
- DOUBLING THE BLOCK
- LENGTH
- OTHER MULTIPLE ENCRYPTION SCHEMES
- CDMF KEY
- SHORTENING
- WHITENING
- CASCADING MULTIPLE BLOCK ALGORITHMS
- COMBINING MULTIPLE BLOCK ALGORITHMS
Chapter 16: Pseudo-Random-Sequence Generators and Stream
- Linear Congruential Generators
- Linear Feedback Shift Registers
- LFSRs in Software
- DESIGN AND ANALYSIS OF STREAM CIPHERS
- Stream Ciphers using LFSRs
- A5
- HUGHES XPD/KPD
- NANOTEQ
- RAMBUTAN
- ADDITIVE GENERATORS
- GIFFORD
- ALGORITHM M
- PKZIP
Chapter 17: Other Stream Ciphers and Real Random-Sequence Generators
- RC4
- SEAL
- WAKE
- FEEDBACK WITH CARRY SHIFT REGISTERS
- STREAM CIPHERS USING FCSRS
- NONLINEAR FEEDBACK SHIFT REGISTERS
- Other Stream Ciphers
- System-Theoretic Approach to Stream Cipher Design
- Complexity-Theoretic Approach to Stream Cipher Design
- Other Approaches to Stream Cipher Design
- CASCADING MULTIPLE STREAM CIPHERS
- CHOOSING A STREAM CIPHER
- GENERATING MULTIPLE STREAMS FROM A SINGLE PSEUDO-RANDOM SEQUENCE GENERATOR
- REAL RANDOM-SEQUENCE GENERATORS
Chapter 18: One-Way Hash Functions
- Background
- Snefru
- N-HASH
- MD4
- MD5
- MD2
- Secure Hash Algorithm (SHA)
- RIPE-MD
- Haval
- Other One-Way Hash Functions
- ONE-WAY HASH FUNCTIONS USING SYMMETRIC BLOCK ALGORITHMS
- Using Public-key Algorithms
- CHOOSING A ONE-WAY HASH FUNCTION
- MESSAGE AUTHENTICATION CODES
Chapter 19: Public-Key Algorithms
- Background
- Knapsack Algorithms
- RSA
- Pohlig-Hellman
- Rabin
- ElGamal
- McEliece
- Elliptic Curve Cryptosystems
- LUC
- FINITE AUTOMATON PUBLIC-KEY CRYPTOSYSTEMS
Chapter 20: Public-Key Digital Signature Algorithms
- Digital Signature Algorithm (DSA)
- DSA VARIANTS
- GOST
- DIGITAL SIGNATURE ALGORITHM
- DISCRETE LOGARITHM SIGNATURE SCHEMES
- Ong-Schnorr-Shamir
- Esign
- Cellular Automata
- Other Public-Key Algorithms
Chapter 21: Identification Schemes
- Feige-Fiat-Shamir
- Guillou-Quisquater
- Schnorr
- CONVERTING IDENTIFICATION SCHEMES TO SIGNATURE SCHEMES
Chapter 22: Key-Exchange Algorithms
- DIFFIE-HELLMAN
- STATION-TO-STATION PROTOCOL
- Shamir’s Three-Pass Protocol
- COMSET
- Encrypted Key Exchange
- FORTIFIED KEY NEGOTIATION
- Conference Key Distribution and Secret Broadcasting
Chapter 23: Special Algorithms for Protocols
- Multiple-Key Public-Key Cryptography
- Secret Sharing Algorithms
- Subliminal Channel
- Undeniable Digital Signatures
- DESIGNATED CONFIRMER SIGNATURES
- Computing with Encrypted Data
- Fair Coin Flips
- ONE-WAY ACCUMULATORS
- All-or-Nothing Disclosure of Secrets
- FAIR AND FAILSAFE CRYPTOSYSTEMS
- Zero-Knowledge Proofs of Knowledge
- Blind Signatures
- Oblivious Transfer
- Secure Multiparty Computation
- Probabilistic Encryption
- Quantum Cryptography
Part IV: The Real World
Chapter 24: Example Implementations
- BM Secret-Key Management Protocol
- Mitrenet
- ISDN
- STU-III
- Kerberos
- KryptoKnight
- SESAME
- IBM COMMON CRYPTOGRAPHIC ARCHITECTURE
- ISO Authentication Framework
- Privacy-Enhanced Mail (PEM)
- Message Security Protocol
- PRETTY GOOD PRIVACY (PGP)
- SMART CARDS
- PUBLIC-KEY CRYPTOGRAPHY STANDARDS
- UNIVERSAL ELECTRONIC PAYMENT SYSTEM CLIPPER
- CAPSTONE
- AT&T MODEL 3600 TELEPHONE SECURITY DEVICE
- NATIONAL SECURITY AGENCY
- National Computer Security Center
- National Institute of Standards and Technology
- RSA Data Security, Inc.
- PUBLIC KEY PARTNERS
- International Association for Cryptologic Research
- RACE Integrity Primitives Evaluation
- CONDITIONAL ACCESS FOR EUROPE
- ISO/IEC 9979
- PROFESSIONAL, CIVIL LIBERTIES, AND INDUSTRY GROUPS
- Sci.Crypt
- CYPHERPUNKS
- Patents
- U.S. EXPORT RULES
- FOREIGN IMPORT AND EXPORT OF CRYPTOGRAPHY
- Legal Issues
Afterword By MATT BLAZE
Source Code
- DES
- LOKI91
- IDEA
- GOST
- BLOWFISH
- 3-WAY
- RC5
- A5
- SEAL
- WAKE
References
up to Applied Cryptography
Sidebar photo of Bruce Schneier by Joe MacInnis.