Hacking Cryptography cover
welcome to this free extract from
an online version of the Manning book.
to read more
or

about this book

 

Cybersecurity is and will always be an arms race. Cryptography is the bedrock of information security and the best tool we have for ensuring confidentiality and integrity in the modern world. Within the cryptography field, certain constructs pop up everywhere for specific purposes. For example, hash functions are widely used to get one-way “fingerprints” of data like passwords. These ideas are brought to reality through specific algorithms and their implementations. When the bad guys want to break a system, they rarely start with mathematical theory. Most of the time, they target the translation of theory to practice—in other words, they target mistakes in cryptography engineering.

Each of the chapters in this book presents a core cryptographic idea, such as block ciphers, digital signatures, and so on, but with a twist. We look through this lens: How did the bad guys target this idea? How did they succeed? And what mitigations are we relying on at the time of this writing?

Who should read this book?

If you’re going to be working on cryptography, this book will provide a whirlwind tour of how we got where we are today. The examples were painstakingly designed to highlight the important weaknesses in these areas. It is highly recommended that you run the examples from the accompanying repo while reading the relevant sections; readers who have done so have reported a deeper understanding of the book’s content.

How this book is organized: A roadmap

About the code

liveBook discussion forum

sitemap

Unable to load book!

The book could not be loaded.

(try again in a couple of minutes)

manning.com homepage
test yourself with a liveTest