• Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint
Share this Page URL
Help

Resources and Further Reading > Chapter 13—Cryptography

Chapter 13—Cryptography

For a comprehensive discussion of cryptographic algorithms and protocols, there is no better reference than Bruce Schneier's Applied Cryptography, 2nd edition (John Wiley & Sons 1997). Richard E. Smith's Internet Cryptography (Addison-Wesley 1997) is an accessible discussion of the uses of cryptography for building secure systems on the Internet. Eric Rescorla's SSL and TLS (Addison-Wesley 2001) goes into exhaustive detail on the design and implementation of the Web's premier secure protocols. David Kahn's The Codebreakers: The Story of Secret Writing, 2nd edition (Macmillan 1997) is a fascinating history of cryptography.

Cracking DES by the Electronic Frontier Foundation (O'Reilly 1998) tells the story of the effort to break the DES cipher by brute force attack.


PREVIEW

                                                                          

Not a subscriber?

Start A Free Trial


  
  • Creative Edge
  • Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint