Practical Cryptography for Developers
Svetlin Nakov
Computers & Technology
Practical Cryptography for Developers
Free
Description
Contents
Reviews

Practical Cryptography for Developers: Hashes, MAC, Key Derivation, DHKE, Symmetric and Asymmetric Ciphers, Elliptic Curves, Digital Signatures - nakov/practical-cryptography-for-developers-book

Language
English
ISBN
1597491047
Welcome
Preface
Cryptography - Overview
Hash Functions
Crypto Hashes and Collisions
Hash Functions: Applications
Secure Hash Algorithms
Hash Functions - Examples
Exercises: Calculate Hashes
Proof-of-Work Hash Functions
MAC and Key Derivation
HMAC and Key Derivation
HMAC Calculation - Examples
Exercises: Calculate HMAC
KDF: Deriving Key from Password
PBKDF2
Modern Key Derivation Functions
Scrypt
Bcrypt
Linux crypt()
Argon2
Password Encryption
Exercises: Password Encryption
Secure Random Generators
Pseudo-Random Numbers - Examples
Secure Random Generators (CSPRNG)
Exercises: Pseudo-Random Generator
Key Exchange and DHKE
Diffie–Hellman Key Exchange
DHKE - Examples
Exercises: DHKE Key Exchange
Encryption: Symmetric and Asymmetric
Symmetric Key Ciphers
Cipher Block Modes
Popular Symmetric Algorithms
The AES Cipher - Concepts
AES Encrypt / Decrypt - Examples
Ethereum Wallet Encryption
Exercises: AES Encrypt / Decrypt
ChaCha20-Poly1305
Exercises: ChaCha20-Poly1305
Asymmetric Key Ciphers
The RSA Cryptosystem - Concepts
RSA Encrypt / Decrypt - Examples
Exercises: RSA Encrypt / Decrypt
Elliptic Curve Cryptography (ECC)
ECDH Key Exchange
ECDH Key Exchange - Examples
Exercises: ECDH Key Exchange
ECC Encryption / Decryption
ECIES Hybrid Encryption Scheme
ECIES Encryption - Example
Exercises: ECIES Encrypt / Decrypt
Digital Signatures
RSA Signatures
RSA: Sign / Verify - Examples
Exercises: RSA Sign and Verify
ECDSA: Elliptic Curve Signatures
ECDSA: Sign / Verify - Examples
Exercises: ECDSA Sign and Verify
EdDSA and Ed25519
EdDSA: Sign / Verify - Examples
Exercises: EdDSA Sign and Verify
Quantum-Safe Cryptography
Quantum-Safe Signatures - Example
More Cryptographic Concepts
Digital Certificates - Example
TLS - Example
One-Time Passwords (OTP) - Example
Crypto Libraries for Developers
JavaScript Crypto Libraries
Python Crypto Libraries
C# Crypto Libraries
Java Crypto Libraries
Conclusion
The book hasn't received reviews yet.