Cryptography for Developers released by Syngress Publishing
[Posted December 6, 2006 by cook]
From: |
| "Kathryn Barrett" <syngresspr-AT-oreilly.com> |
To: |
| lwn-AT-lwn.net |
Subject: |
| Cryptography for Developers released by Syngress Publishing |
Date: |
| Wed, 06 Dec 2006 07:30:00 -0800 |
Syngress Publishing(r) Announces Publication of
"Cryptography for Developers"
Book Is the Only Cryptography Guide Written for Software Developers
Contact: Amy Pedersen
781-681-5151 x12
amy@syngress.com
Rockland, MA December 5, 2006 - Syngress Publishing, Inc., today announced
the publication of "Cryptography for Developers" (ISBN: 1597491047), by
Tom St Denis of Elliptic Semiconductor, and edited by Simon Johnson.
According to Tom St Denis, "Developers tasked with security problems are
often not cryptographers themselves. They are bright people who, with
careful guidance, can implement secure cryptosystems. This book will guide
developers in their journey towards solving cryptographic problems. If you
have ever asked yourself "just how do I setup AES?" then this text is for
you."
"Almost all Elliptic customers have asked for help in implementing their
security software design - both to get the project done on time and to be
certain that there aren't any security holes," indicated Rick White,
President and CEO of Elliptic. "We are therefore very pleased that Tom
wrote this book and is now leading the development and release of
Elliptic's middleware cryptography library scheduled for mid-December."
BOOK DETAILS
ISBN: 1597491047
PRICE: $59.95 U.S.
PAGE COUNT: 448 PP
INSIDE THE BOOK
* ASN.1 Encoding
The chapter on ASN.1 encoding delivers a treatment of the Abstract Syntax
Notation One (ASN.1) encoding rules for data elements such as strings,
binary strings, integers, dates and times, and sets and sequences.
* Random Number Generation
This chapter discusses the design and construction of standard random
number generators (RNGs) such as those specified by NIST.
* Advanced Encryption Standard
This chapter discusses the AES block cipher design, implementation
trade-offs, side channel hazards, and modes of use. It concentrates on the
key design elements important to implementers and how to exploit them in
various trade-off conditions.
* Hash Functions
This chapter discusses collision resistance, provides examples of
exploits, and concludes with known incorrect usage patterns.
* Message Authentication Code Algorithms
This chapter discusses the HMAC and CMAC Message Authentication Code (MAC)
algorithms, which are constructed from hash and cipher functions.
* Encrypt and Authenticate Modes
This chapter discusses the IEEE and NIST encrypt and authenticate modes
GCM and CCM. Both modes introduce new concepts to cryptographic functions.
Focus is given to the concept of replay attacks, and initialization
techniques are explored in depth.
* Large Integer Arithmetic
This chapter discusses the techniques behind manipulating large integers
such as those used in public key algorithms.
* Public Key Algorithms
This chapter introduces public key cryptography, including the RSA
algorithm and its related PKCS #1 padding schemes. It also introduces new
math in the form of various elliptic curve point multipliers.
ABOUT THE AUTHOR
Tom St Denis is a software developer known best for his LibTom series of
public domain cryptographic libraries. He has spent the last five years
distributing, developing, and supporting the cause of open source
cryptography, and has championed its safe deployment. Tom currently is
employed for Elliptic Semiconductor Inc. where he designs and develops
software libraries for embedded systems. He works closely with a team of
diverse hardware engineers to create a best of breed hardware and software
combination. Tom is also the author (with Greg Rose) of BigNum Math:
Implementing Cryptographic Multiple Precision Arithmetic (Syngress
Publishing, ISBN: 1597491128), which discusses the deployment of
crypytographic integer mathematics.
Simon Johnson, Technical Editor, is a security engineer for a technology
outfit based in the United Kingdom. Simon became interested in
cryptography during his teenage years, studying all aspects of
conventional software cryptography. He has been an active contributor to
the cryptographic usenet group Sci.Crypt since the age of 17, attends
various security conferences around the world, and continues to openly
promote safe computing practices.
BACKGROUND INFORMATION
Syngress Publishing (www.syngress.com), headquartered in Rockland,
Massachusetts, is an independent publisher of print and electronic
reference materials for Information Technology professionals seeking skill
enhancement and career advancement. Distributed throughout Europe, Asia,
and the U.S. and Canada, Syngress titles have been translated into twenty
languages. The Company's pioneering customer support program,
solutions@syngress.com, extends the value of every Syngress title with
regular information updates and customer-driven author forums. For more
information on Syngress products, contact Amy Pedersen at 781-681-5151 or
email amy@syngress.com. Syngress books are distributed in the United
States and Canada by O'Reilly Media, Inc.
ABOUT ELLIPTIC SEMICONDUCTOR
Elliptic (www.ellipticsemi.com) provides semiconductor intellectual
property (IP) cores and middleware for secure communications ranging from
low power to multi-gigabit per second implementations. Elliptic SIP cores
enable system-on-chip designers to efficiently balance power, performance
and silicon area in complex security-based systems. Ellipsys middleware
offers symmetric and asymmetric algorithms permitting customers to
implement cryptographic designs either completely in software or through
an optimized mix of hardware offload and software in order to meet the
overall system performance goal. Demanding customers in markets such as
wireless, storage, digital rights management (DRM), RFID and high
performance communications trust Elliptic embedded security products.