Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Applied Cryptography: Protocols, Algorithms, and Source Code in C, Second Edition

Buy

There are two kinds of cryptography in this world: cryptography that will stop your kid sister from reading your files, and cryptography that will stop major governments from reading your files. This book is about the latter.

If I take a letter, lock it in a safe, hide the safe somewhere in New York, then tell you to read the letter, that’s not security. That’s obscurity. On the other hand, if I take a letter and lock it in a safe, and then give you the safe along with the design specifications of the safe and a hundred identical safes with their combinations so that you and the world’s best safecrackers can study the locking mechanism—and you still can’t open the safe and read the letter—that’s security.

For many years, this sort of cryptography was the exclusive domain of the military. The United States’ National Security Agency (NSA), and its counterparts in the former Soviet Union, England, France, Israel, and elsewhere, have spent billions of dollars in the very serious game of securing their own communications while trying to break everyone else’s. Private individuals, with far less expertise and budget, have been powerless to protect their own privacy against these governments.

During the last 20 years, public academic research in cryptography has exploded. While classical cryptography has been long used by ordinary citizens, computer cryptography was the exclusive domain of the world’s militaries since World War II. Today, state–of–the–art computer cryptography is practiced outside the secured walls of the military agencies. The layperson can now employ security practices that can protect against the most powerful of adversaries—security that may protect against military agencies for years to come.

Do average people really need this kind of security? Yes. They may be planning a political campaign, discussing taxes, or having an illicit affair. They may be designing a new product, discussing a marketing strategy, or planning a hostile business takeover. Or they may be living in a country that does not respect the rights of privacy of its citizens. They may be doing something that they feel shouldn’t be illegal, but is. For whatever reason, the data and communications are personal, private, and no one else’s business.

This book is being published in a tumultuous time. In 1994, the Clinton administration approved the Escrowed Encryption Standard (including the Clipper chip and Fortezza card) and signed the Digital Telephony bill into law. Both of these initiatives try to ensure the government’s ability to conduct electronic surveillance.

The lesson here is that it is insufficient to protect ourselves with laws; we need to protect ourselves with mathematics. Encryption is too important to be left solely to governments.

This book gives you the tools you need to protect your own privacy; cryptography products may be declared illegal, but the information will never be.

(HTML tags aren't allowed.)

MCSA/MCSE Self-Paced Training Kit (Exam 70-291): Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure
MCSA/MCSE Self-Paced Training Kit (Exam 70-291): Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure
Welcome to MCSA/MCSE Self-Paced Training Kit (Exam 70-291): Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure. This book prepares you for the 70-291 exam by teaching you how to configure, manage, and troubleshoot various aspects of a Microsoft Windows Server 2003 network infrastructure. Each chapter...
Modern Methods of Valuation
Modern Methods of Valuation

The new and improved eleventh edition of this essential valuation textbook reflects the changes in the property market since 2009, whilst presenting the tried and tested study of the principles governing the valuation of land, houses and buildings of the previous editions.

The eleventh edition is fully up-to-date...

Evolutionary Scheduling (Studies in Computational Intelligence)
Evolutionary Scheduling (Studies in Computational Intelligence)
Evolutionary scheduling is a vital research domain at the interface of two important sciences - artificial intelligence and operational research. Scheduling problems are generally complex, large scale, constrained, and multi-objective in nature, and classical operational research techniques are often inadequate at solving them effectively. With the...

Instant Oracle Database and PowerShell How-to
Instant Oracle Database and PowerShell How-to

PowerShell provides a rich, object-oriented scripting language that can be used to perform a number of Oracle database tasks. It can be harnessed to automate manual tasks in graphical database management systems or go beyond what can be done in Oracle-only command line shells.

Oracle and PowerShell will walk you through scripting a...

Expert Service-Oriented Architecture in C#: Using the Web Services Enhancements 2.0
Expert Service-Oriented Architecture in C#: Using the Web Services Enhancements 2.0

SOA (Service Oriented Architecture) is the next big step in evolution for Web services. This book is the first to educate people about SOA, and to introduce them to the technologies that they can use today, prior to the release of Indigo. It will introduce them to a new architecture and will help them realize why Web services are such a big deal...

Corporate Aftershock: The Public Policy Lessons from the Collapse of Enron and Other Major Corporations
Corporate Aftershock: The Public Policy Lessons from the Collapse of Enron and Other Major Corporations
"In the near future, someone will build a better Enron–a legitimate company with the means and integrity to revolutionize markets. That person will want to use Corporate Aftershock as his business manual and had better hope that government regulators are reading it as well."

–Ross M. Miller, author, Paving Wall...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy