|
|
Showing 1 - 2 of
2 matches in All Departments
Implementing cryptography requires integers of significant
magnitude to resist cryptanalytic attacks. Modern programming
languages only provide support for integers which are relatively
small and single precision. The purpose of this text is to instruct
the reader regarding how to implement efficient multiple precision
algorithms.
Bignum math is the backbone of modern computer security algorithms.
It is the ability to work with hundred-digit numbers efficiently
using techniques that are both elegant and occasionally bizarre.
This book introduces the reader to the concept of bignum algorithms
and proceeds to build an entire library of functionality from the
ground up. Through the use of theory, pseudo-code and actual
fielded C source code the book explains each and every algorithm
that goes into a modern bignum library. Excellent for the student
as a learning tool and practitioner as a reference alike BigNum
Math is for anyone with a background in computer science who has
taken introductory level mathematic courses. The text is for
students learning mathematics and cryptography as well as the
practioner who needs a reference for any of the algorithms
documented within.
* Complete coverage of Karatsuba Multiplication, the Barrett
Algorithm, Toom-Cook 3-Way Multiplication, and More
* Tom St Denis is the developer of the industry standard
cryptographic suite of tools called LibTom.
* This book provides step-by-step exercises to enforce concepts
The only guide for software developers who must learn and implement
cryptography safely and cost effectively.
The book begins with a chapter that introduces the subject of
cryptography to the reader. The second chapter discusses how to
implement large integer arithmetic as required by RSA and ECC
public key algorithms The subsequent chapters discuss the
implementation of symmetric ciphers, one-way hashes, message
authentication codes, combined authentication and encryption modes,
public key cryptography and finally portable coding practices. Each
chapter includes in-depth discussion on memory/size/speed
performance trade-offs as well as what cryptographic problems are
solved with the specific topics at hand.
* The author is the developer of the industry standard
cryptographic suite of tools called LibTom
* A regular expert speaker at industry conferences and events on
this development
* The book has a companion Web site with over 300-pages of text on
implementing multiple precision arithmetic
|
|
Email address subscribed successfully.
A activation email has been sent to you.
Please click the link in that email to activate your subscription.