Applied Cryptography Table of Contents

Abbreviated Table of Contents

Preface (complete text)

Foreword:by Whitfield Diffie (complete text)

Part I: Cryptographic Protocols
Ch. 1: Foundations
Ch. 2: Protocol Building Blocks
Ch. 3: Basic Protocols
Ch. 4: Intermediate Protocols
Ch. 5: Advanced Protocols
Ch. 6: Esoteric Protocols

Part II: Cryptographic Techniques
Ch. 7: Key Length
Ch. 8: Algorithm Types and Modes
Ch. 10: Using Algorithms

Part III: Cryptographic Algorithms
Ch. 11: Mathematical Background
Ch. 12: Data Encryption Standard
Ch. 13:
Other Block Algorithms
Ch. 14: Still Other Block Algorithms
Ch. 15: Combining Block Algorithms
Ch. 16: Pseudo-Random-Sequence Generators and Stream Ciphers
Ch. 17: Other Stream Ciphers and Real Random-Sequence Generators
Ch. 18: One-Way Hash Functions
Ch. 19: Public-Key Algorithms
Ch. 20: Public-Key Digital Signature Algorithms
Ch. 21: Identification Schemes
Ch. 22: Key-Exchange Algorithms
Ch. 23: Special Algorithms for Protocols

Part IV: The Real World
Ch. 24: Example Implementations
Ch. 25: Politics

Afterword by Matt Blaze (complete text)

Expanded Table of Contents

Sections in ALL CAPITALS are either new or substantially rewritten from the first edition

Preface

Foreword

Chapter 1: Foundations

  • Terminology
  • STEGANOGRAPHY
  • Substitution Ciphers and Transposition Ciphers
  • Simple XOR
  • One-Time Pads
  • Computer Algorithms
  • Large Numbers

Part I: Cryptographic Protocols

Chapter 2: Protocol Building Blocks

  • Introduction to Protocols
  • Communications using Symmetric Cryptography
  • One-Way Functions
  • One-Way Hash Functions
  • Communications using Public-Key Cryptography
  • Digital Signatures
  • Digital Signatures with Encryption
  • Random and Pseudo-Random Sequence Generation

Chapter 3: Basic Protocols

  • Key Exchange
  • Authentication
  • AUTHENTICATION AND KEY EXCHANGE
  • FORMAL ANALYSIS OF AUTHENTICATION AND KEY-EXCHANGE PROTOCOLS
  • Multiple-Key Public-Key Cryptography
  • Secret Splitting
  • Secret Sharing
  • Cryptographic Protection of Databases

Chapter 4: Intermediate Protocols

  • Timestamping Services
  • Subliminal Channel
  • Undeniable Digital Signatures
  • DESIGNATED CONFIRMER SIGNATURES
  • PROXY SIGNATURES
  • Group Signatures
  • Fail-Stop Digital Signatures
  • Computing with Encrypted Data
  • Bit Commitment
  • Fair Coin Flips
  • Mental Poker
  • ONE-WAY ACCUMULATORS
  • All-or-Nothing Disclosure of Secrets
  • KEY ESCROW

Chapter 5: Advanced Protocols

  • ZERO-KNOWLEDGE PROOFS
  • Zero-Knowledge Proofs of Identity
  • Blind Signatures
  • IDENTITY-BASED PUBLIC-KEY CRYPTOGRAPHY
  • Oblivious Transfer
  • OBLIVIOUS SIGNATURES
  • Simultaneous Contract Signing
  • Digital Certified Mail
  • Simultaneous Exchange of Secrets

Chapter 6: Esoteric Protocols

  • SECURE ELECTIONS
  • Secure Multiparty Computation
  • Anonymous Message Broadcast
  • DIGITAL CASH

Part II: Cryptographic Techniques

Chapter 7: Key Length

  • SYMMETRIC KEY LENGTH
  • PUBLIC-KEY KEY LENGTH
  • COMPARING SYMMETRIC AND PUBLIC-KEY KEY LENGTH
  • BIRTHDAY ATTACKS AGAINST ONE-WAY HASH FUNCTIONS
  • How Long Should a Key Be?
  • Caveat Emptor

Chapter 8: Key Management

  • Generating Keys
  • NONLINEAR KEYSPACES
  • Transferring Keys
  • Verifying Keys
  • Using Keys
  • UPDATING KEYS
  • Storing Keys
  • Backup Keys
  • Compromised Keys
  • Lifetime of Keys
  • Destroying Keys
  • Public-Key Key Management

Chapter 9: Algorithm Types and Modes

  • Electronic Codebook Mode
  • Block Replay
  • Cipher Block Chaining Mode
  • Stream Ciphers
  • Self-Synchronizing Stream Ciphers
  • Cipher-Feedback Mode
  • Synchronous Stream Ciphers
  • Output-Feedback Mode
  • Counter Mode
  • Other Block-Cipher Modes
  • CHOOSING A CIPHER MODE
  • INTERLEAVING
  • Block Ciphers vs. Stream Ciphers

Chapter 10: Using Algorithms

  • Choosing an Algorithm
  • Public-Key Cryptography vs. Symmetric Cryptography
  • Encrypting Communications Channels
  • ENCRYPTING DATA FOR STORAGE
  • Hardware Encryption vs. Software Encryption
  • COMPRESSION, ENCODING, AND ENCRYPTION
  • DETECTING ENCRYPTION
  • HIDING CIPHERTEXT IN CIPHERTEXT
  • DESTROYING INFORMATION

Part III: Cryptographic Algorithms

Chapter 11: Mathematical Background

  • Information Theory
  • Complexity Theory
  • NUMBER THEORY
  • FACTORING
  • Prime Number Generation
  • Discrete Logarithms in a Finite Field

Chapter 12: Data Encryption Standard

  • Background
  • Description of DES
  • Security of DES
  • DIFFERENTIAL AND LINEAR CRYPTANALYSIS
  • THE REAL DESIGN CRITERIA
  • DES VARIANTS
  • HOW SECURE IS DES TODAY?

Chapter 13: Other Block Algorithms

  • Lucifer
  • Madryga
  • Newdes
  • Feal-N
  • Redoc
  • LOKI
  • Khufu and Khafre
  • RC2
  • Idea
  • Mmb
  • CA-1.1
  • SKIPJACK

Chapter 14: Still Other Block Algorithms

  • GOST
  • CAST
  • BLOWFISH
  • SAFER K-64
  • 3-WAY
  • CRAB
  • SXAL8/MBAL
  • RC5
  • OTHER BLOCK ALGORITHMS
  • THEORY OF BLOCK CIPHER DESIGN
  • USING ONE-WAY HASH FUNCTIONS
  • CHOOSING A BLOCK ALGORITHM

Chapter 15: Combining Block Algorithms

  • DOUBLE ENCRYPTION
  • TRIPLE ENCRYPTION
  • DOUBLING THE BLOCK
  • LENGTH
  • OTHER MULTIPLE ENCRYPTION SCHEMES
  • CDMF KEY
  • SHORTENING
  • WHITENING
  • CASCADING MULTIPLE BLOCK ALGORITHMS
  • COMBINING MULTIPLE BLOCK ALGORITHMS

Chapter 16: Pseudo-Random-Sequence Generators and Stream

  • Linear Congruential Generators
  • Linear Feedback Shift Registers
  • LFSRs in Software
  • DESIGN AND ANALYSIS OF STREAM CIPHERS
  • Stream Ciphers using LFSRs
  • A5
  • HUGHES XPD/KPD
  • NANOTEQ
  • RAMBUTAN
  • ADDITIVE GENERATORS
  • GIFFORD
  • ALGORITHM M
  • PKZIP

Chapter 17: Other Stream Ciphers and Real Random-Sequence Generators

  • RC4
  • SEAL
  • WAKE
  • FEEDBACK WITH CARRY SHIFT REGISTERS
  • STREAM CIPHERS USING FCSRS
  • NONLINEAR FEEDBACK SHIFT REGISTERS
  • Other Stream Ciphers
  • System-Theoretic Approach to Stream Cipher Design
  • Complexity-Theoretic Approach to Stream Cipher Design
  • Other Approaches to Stream Cipher Design
  • CASCADING MULTIPLE STREAM CIPHERS
  • CHOOSING A STREAM CIPHER
  • GENERATING MULTIPLE STREAMS FROM A SINGLE PSEUDO-RANDOM SEQUENCE GENERATOR
  • REAL RANDOM-SEQUENCE GENERATORS

Chapter 18: One-Way Hash Functions

  • Background
  • Snefru
  • N-HASH
  • MD4
  • MD5
  • MD2
  • Secure Hash Algorithm (SHA)
  • RIPE-MD
  • Haval
  • Other One-Way Hash Functions
  • ONE-WAY HASH FUNCTIONS USING SYMMETRIC BLOCK ALGORITHMS
  • Using Public-key Algorithms
  • CHOOSING A ONE-WAY HASH FUNCTION
  • MESSAGE AUTHENTICATION CODES

Chapter 19: Public-Key Algorithms

  • Background
  • Knapsack Algorithms
  • RSA
  • Pohlig-Hellman
  • Rabin
  • ElGamal
  • McEliece
  • Elliptic Curve Cryptosystems
  • LUC
  • FINITE AUTOMATON PUBLIC-KEY CRYPTOSYSTEMS

Chapter 20: Public-Key Digital Signature Algorithms

  • Digital Signature Algorithm (DSA)
  • DSA VARIANTS
  • GOST
  • DIGITAL SIGNATURE ALGORITHM
  • DISCRETE LOGARITHM SIGNATURE SCHEMES
  • Ong-Schnorr-Shamir
  • Esign
  • Cellular Automata
  • Other Public-Key Algorithms

Chapter 21: Identification Schemes

  • Feige-Fiat-Shamir
  • Guillou-Quisquater
  • Schnorr
  • CONVERTING IDENTIFICATION SCHEMES TO SIGNATURE SCHEMES

Chapter 22: Key-Exchange Algorithms

  • DIFFIE-HELLMAN
  • STATION-TO-STATION PROTOCOL
  • Shamir's Three-Pass Protocol
  • COMSET
  • Encrypted Key Exchange
  • FORTIFIED KEY NEGOTIATION
  • Conference Key Distribution and Secret Broadcasting

Chapter 23: Special Algorithms for Protocols

  • Multiple-Key Public-Key Cryptography
  • Secret Sharing Algorithms
  • Subliminal Channel
  • Undeniable Digital Signatures
  • DESIGNATED CONFIRMER SIGNATURES
  • Computing with Encrypted Data
  • Fair Coin Flips
  • ONE-WAY ACCUMULATORS
  • All-or-Nothing Disclosure of Secrets
  • FAIR AND FAILSAFE CRYPTOSYSTEMS
  • Zero-Knowledge Proofs of Knowledge
  • Blind Signatures
  • Oblivious Transfer
  • Secure Multiparty Computation
  • Probabilistic Encryption
  • Quantum Cryptography

Part IV: The Real World

Chapter 24: Example Implementations

  • BM Secret-Key Management Protocol
  • Mitrenet
  • ISDN
  • STU-III
  • Kerberos
  • KryptoKnight
  • SESAME
  • IBM COMMON CRYPTOGRAPHIC ARCHITECTURE
  • ISO Authentication Framework
  • Privacy-Enhanced Mail (PEM)
  • Message Security Protocol
  • PRETTY GOOD PRIVACY (PGP)
  • SMART CARDS
  • PUBLIC-KEY CRYPTOGRAPHY STANDARDS
  • UNIVERSAL ELECTRONIC PAYMENT SYSTEM CLIPPER
  • CAPSTONE
  • AT&T MODEL 3600 TELEPHONE SECURITY DEVICE

Chapter 25: Politics

  • NATIONAL SECURITY AGENCY
  • National Computer Security Center
  • National Institute of Standards and Technology
  • RSA Data Security, Inc.
  • PUBLIC KEY PARTNERS
  • International Association for Cryptologic Research
  • RACE Integrity Primitives Evaluation
  • CONDITIONAL ACCESS FOR EUROPE
  • ISO/IEC 9979
  • PROFESSIONAL, CIVIL LIBERTIES, AND INDUSTRY GROUPS
  • Sci.Crypt
  • CYPHERPUNKS
  • Patents
  • U.S. EXPORT RULES
  • FOREIGN IMPORT AND EXPORT OF CRYPTOGRAPHY
  • Legal Issues

Afterword By MATT BLAZE

Source Code

  • DES
  • LOKI91
  • IDEA
  • GOST
  • BLOWFISH
  • 3-WAY
  • RC5
  • A5
  • SEAL
  • WAKE

References

Preface - Foreword - Afterword - Source Code - Errata - Homepage

Photo of Bruce Schneier by Per Ervland.

Schneier on Security is a personal website. Opinions expressed are not necessarily those of Co3 Systems, Inc..