. . .the best introduction to cryptography I've ever seen. . . . The book the National Security Agency wanted never to be published. . . . -Wired Magazine
". . .monumental . . . fascinating . . . comprehensive . . . the definitive work on cryptography for computer programmers . . ." -Dr. Dobb's Journal
". . .easily ranks as one of the most authoritative in its field." -PC...
. . .the best introduction to cryptography I've ever seen. . . . The book the National Security Agency wanted never to be published. . . . -Wired Magazine
". . .monumental . . . fascinating . . . comprehensive . . . the definitive work on cryptography for computer programmers . . ." -Dr. Dobb's Journal
". . .easily ranks as one of the most authoritative in its field." -PC Magazine
This new edition of the cryptography classic provides you with a comprehensive survey of modern cryptography. The book details how programmers and electronic communications professionals can use cryptography-the technique of enciphering and deciphering messages-to maintain the privacy of computer data. It describes dozens of cryptography algorithms, gives practical advice on how to implement them into cryptographic software, and shows how they can be used to solve security problems. Covering the latest developments in practical cryptographic techniques, this new edition shows programmers who design computer applications, networks, and storage systems how they can build security into their software and systems.
What's new in the Second Edition?
* New information on the Clipper Chip, including ways to defeat the key escrow mechanism
* New encryption algorithms, including algorithms from the former Soviet Union and South Africa, and the RC4 stream cipher
* The latest protocols for digital signatures, authentication, secure elections, digital cash, and more
* More detailed information on key management and cryptographic implementations
如果同一个算法既用做加密又用做数字签名,就有可能受到攻击[506]。在这些情况中,数字签名操作是加密操作的逆过程:VX=EX,并且SX=DX。
假设Mallory是持有自己公开密钥和私人密钥的系统合法用户。让我们看看他怎么读Bob的邮件。首先他将Alice在(1)中发送给Bob的消息记录下来,在以后的某个时间,他将那个消息发送给Bob,声称消息是从Mallory来的。Bob认为是从Mallory来的合法消息,于是就用私人密钥解密,然后用Mallory的公开密钥解密来验证Mallory的签名,那么得到的消息纯粹是乱七八糟的消息:EM(DB(EB(DA(M))))=EM(DA(M))
即使这样,Bob继续执行协议,并且将收据发送给Mallory:
EM(DB(EM(DA(M))))
现在Mallory所要做的就是用他的私人密钥对消息解密,用Bob的公开密钥加密,再用自己的私人密钥解密,并用Alice的公开密钥加密。哇!Mallory就获得了所要的消息M。
506. J.D. Dixon. "Factorizon and Primality Tests." American Mathematical Monthly. v. 91, n. 6 1984, pp. 333-352. (查看原文)
密码学入门经典,对基本问题和逻辑讲述得非常清晰。
"The whole point of cryptography is to solve problems. You can learn all about cryptographic algorithms and techniques,but these are academic unless they can solve a problem."...密码学入门经典,对基本问题和逻辑讲述得非常清晰。
"The whole point of cryptography is to solve problems. You can learn all about cryptographic algorithms and techniques,but these are academic unless they can solve a problem."
大赞!(展开)
2 有用 笨蛋.mk⑨ 2010-08-30 14:01:26
密码学入门经典,对基本问题和逻辑讲述得非常清晰。 "The whole point of cryptography is to solve problems. You can learn all about cryptographic algorithms and techniques,but these are academic unless they can solve a problem."... 密码学入门经典,对基本问题和逻辑讲述得非常清晰。 "The whole point of cryptography is to solve problems. You can learn all about cryptographic algorithms and techniques,but these are academic unless they can solve a problem." 大赞! (展开)
0 有用 么见过黑眼圈啊 2016-08-04 22:24:02
Don't understand most of it and the book is as old as I am
0 有用 ESO 510-G13 2020-08-12 15:21:29
讲道理information science的课都比cs有意思许多
0 有用 freeder 2017-07-04 01:22:19
这本书在当年给个9分不为过,如今是有点过时了,但毕竟20+年了,其中的一些算法已经被替代,一些还在沿用。难能可贵的是书中的一些方法论给初学者一个系统的理论基础。
0 有用 业火淬心 2015-05-17 15:02:49
耐人寻味