📜 ⬆️ ⬇️

Day cipher: selection of books on the topic

Motherland hears Vasya Lozhkin


Today in Russia is the day of the cryptographer. Long ago in the past are the days when encryption was only for the military and spies. Now it is universally used in IT. Therefore, in honor of the holiday, we have made for you a selection of books on issues related to encryption.


Applied cryptography. Protocols, algorithms and C source code


image


The book describes how programmers and e-communications specialists can use cryptography to preserve data privacy. Dozens of algorithms are described, practical advice is given on their implementation in software, it is shown what problems they can solve.


Methods of discrete mathematics in cryptology


image


The book is written by a leading expert in the field of cryptology, who has many years of teaching experience at MEPhI. The properties of functions defined on finite sets that are relevant for the construction and analysis of cryptographic systems are described systematically. In order to consolidate the material given tasks and exercises.


The use of artificial neural networks and the system of residual classes in cryptography


image


The monograph presents the ideas of artificial neural networks and the system of residual classes in their application to cryptography, with various types of artificial neural networks being considered. The results of scientific research over the past decade in the field of information security using elements of artificial intelligence and modular arithmetic are presented. The results presented are of considerable interest for modern developers of neural network cryptosystems based on the system of residual classes. A bibliography of works on the use of neurocomputers for solving problems of graph theory is given.


Encoders and radio intelligence. Shield and sword of the information world. Volume 1. Notes cryptographer


image


The author’s focus is on things previously hidden from ordinary citizens by a dense cover of secrecy: cryptography, encryption, and radio intelligence. And who would have thought that not only the destinies of states and the greatest rulers of the world, but also the daily personal lives of ordinary citizens depend on them.


A few years ago, the scenario of the development of information cyberspace of the future, described by the author, seemed fantastic, but today, unfortunately, many of the predictions and warnings of Anatoly Klepov are becoming part of our life. And what awaits us ahead?


Can a person in the near future be able to protect himself from the encroachments of hackers or criminals? Will not one of the attackers take the opportunity to take control of information and even the consciousness of civilization?


The Code Book: The Secret Book of Breaking


image


From ancient codes to the fascinating world of quantum computing, the author gives very clear examples illustrating the high complexity and difficulty of cryptanalysis. Attracted modern linguistics, mathematics and computer science. This is an endless quest - protecting our privacy from the invasion of governments, corporations, competitors and the curious. In the modern technological world there are many problems with privacy.


Mastering Bitcoin: Unlocking Digital Cryptocurrencies


image


This book will be useful to anyone who is interested in the basics of cryptocurrency, technical operations with Bitcoins, as well as the developers of the next generation of cryptocurrencies or applications using them. This book will help you work through all aspects of digital money: from using a wallet to buying goods and launching a trading platform with hundreds of thousands of transactions, as well as building new financial innovations that will change our understanding of currency and credit.


Understanding Cryptography: A Textbook for Students and Practitioners


image


After the introduction of cryptography and data security, the author explains the underlying technologies in modern cryptography. There are chapters dedicated to:



Here, a minimum of mathematics, the emphasis is on the connection of technologies and descriptions of practical implementations, including "light" ciphers for RFID and mobile devices.


Bulletproof SSL and TLS: Understanding and Deploying SSL / TLS and Secure Servers and Web Applications


image


This is a complete guide to using SSL and TLS encryption for deploying secure servers and web applications.


Cryptography Engineering: Design Principles and Practical Applications


image


The book covers topics such as block ciphers, block modes, hash functions, encryption modes, codes that authenticate messages, implementation problems, negotiation protocols, and more.


Data Hiding: Exposing Concealed Data in Multimedia, Operating Systems, Mobile Devices and Network Protocols


image


The book examines modern and promising tools and techniques used in secret communications, advanced methods of malware and data hiding tactics. Described methods of hiding include the latest technologies, including mobile devices, multimedia, virtualization, and others. These concepts provide corporate, government, and military personnel with the knowledge to investigate and protect against internal threats, spyware, espionage, advanced malware, and secret messages. Having understood the threats in all their diversity, you will understand how to defend against them through detection, investigation, mitigation and prevention.


Cryptography & Open Source


image


The book provides a good theoretical basis for encrypting and decrypting messages based on simple mathematical tweaks and many other methods, including in relation to Open Source.


The Mathematics of Secrets: Cryptography from Caesar Ciphers to Digital Encryption


image


The author shows what mathematical foundation underlies many codes and ciphers. The book describes both the creation and the breaking of ciphers; many ancient and modern ciphers are discussed. The story begins with one of the simplest, the Caesar cipher, and shows how it is based on the mathematical idea of ​​how to increase its flexibility. Then polyalphabetical substitution ciphers, permutation ciphers are considered, the connection between ciphers and computer encryption is shown, stream encryption and encryption, implying potentiation, is discussed. The author explores the public key ciphers, and talks about encrypting the future, about the ways of cryptography development.


Post-Quantum Cryptography


image


Quantum computers will allow hacking into modern, most popular public key ciphers, including RSA, DSA and ECDSA. The book describes the new generation of cryptographic algorithms, systems that can withstand the attacks of quantum computers. In particular, postquantum encryption and public key signatures are considered. It describes the current state of quantum computing, encryption based on hashes, codes, lattices (lattice), as well as multidimensional encryption.


The Mathematics of Ciphers: Number Theory and RSA Cryptography


image


This is an introduction to the algorithmic aspects of number theory and their use in cryptography with an emphasis on RSA. Also given a large number of interesting historical facts.


Number Theory in Science and Communication: Physics, Digital Information, Computing, and Self-Similarity


image


In this introduction to the field of applied mathematics, which is encryption, emphasis is placed on an intuitive understanding, not an abstract theory. Such important ideas as continuous fractions, the golden section, a quadratic residue, and the Chinese remainder theorem, functions with a secret, pseudoprime numbers, and primitive elements are highlighted. Their use for solving real problems is the main theme of the book.


')

Source: https://habr.com/ru/post/373363/


All Articles