From: Bruce Schneier <schneier@winternet.com>
To: cypherpunks@toad.com
Message Hash: b44117499ae6e87e2e2363ec59c84d4d43c5e8c808cbc05d996ab4e8e0b8a448
Message ID: <199509151807.NAA10561@subzero>
Reply To: N/A
UTC Datetime: 1995-09-15 18:07:30 UTC
Raw Date: Fri, 15 Sep 95 11:07:30 PDT
From: Bruce Schneier <schneier@winternet.com>
Date: Fri, 15 Sep 95 11:07:30 PDT
To: cypherpunks@toad.com
Subject: Applied Cryptography, Second Edition: Ordering Information
Message-ID: <199509151807.NAA10561@subzero>
MIME-Version: 1.0
Content-Type: text
The SECOND EDITION of APPLIED CRYPTOGRAPHY is coming in November.
This is a major rewrite: 50% more words, 7 more chapters, and
over 1600 references. Not only did I make corrections to the
first edition and add developments since it was published, but I
also included topics left out of the first edition. (See table
of contents--attached.)
The second edition has lots of new algorithms (including GOST,
Blowfish, RC4, and A5), more information on the Clipper Chip and
key escrow, dozens of new protocols, more information on how PGP
works, detailed information on key management and modes of
operation, and new source code.
The second edition will be published in paperback and hardcover.
Right now I am making both available at a 15% discount.
*****************************************************************
ORDER FORM
Applied Cryptography, 2nd Edition (Hardcover): $70 * .85 = $59.00
Applied Cryptography, 2nd Edition (Softcover): $50 * .85 = $42.00
Shipping:
Air (U.S.): $5 per book
Surface (U.S.): $3 per book
Canada/Mexico: $7 per book
Everywhere else: $9 per book
Send to:
Counterpane Systems, 101 E Minnehaha Parkway,
Minneapolis, MN 55419
*****************************************************************
APPLIED CRYPTOGRAPHY, SECOND EDITION
Table of Contents
((Sections in all capitals are either new or substantially
rewritten.))
Forward by Whitfield Diffie
Preface
Chapter 1: Foundations
Terminology; STEGANOGRAPHY; Substitution Ciphers and
Transposition Ciphers; Simple XOR; One-Time Pads; Computer
Algorithms; Large Numbers
Part I: Cryptographic Protocols
Chapter 2: Protocol Building Blocks
Introduction to Protocols; Communications using Symmetric
Cryptography; One-Way Functions; One-Way Hash Functions;
Communications using Public-Key Cryptography; Digital
Signatures; Digital Signatures with Encryption; Random and
Pseudo-Random Sequence Generation
Chapter 3: Basic Protocols
Key Exchange; Authentication; AUTHENTICATION AND KEY
EXCHANGE; FORMAL ANALYSIS OF AUTHENTICATION AND KEY-EXCHANGE
PROTOCOLS; Multiple-Key Public-Key Cryptography; Secret
Splitting; Secret Sharing; Cryptographic Protection of
Databases
Chapter 4: Intermediate Protocols
Timestamping Services; Subliminal Channel; Undeniable
Digital Signatures; DESIGNATED CONFIRMER SIGNATURES; PROXY
SIGNATURES; Group Signatures; Fail-Stop Digital Signatures;
Computing with Encrypted Data; Bit Commitment; Fair Coin
Flips; Mental Poker; ONE-WAY ACCUMULATORS; All-or-Nothing
Disclosure of Secrets; KEY ESCROW
Chapter 5: Advanced Protocols
ZERO-KNOWLEDGE PROOFS; Zero-Knowledge Proofs of Identity;
Blind Signatures; IDENTITY-BASED PUBLIC-KEY CRYPTOGRAPHY;
Oblivious Transfer; OBLIVIOUS SIGNATURES; Simultaneous
Contract Signing; Digital Certified Mail; Simultaneous
Exchange of Secrets
Chapter 6: Esoteric Protocols
SECURE ELECTIONS; Secure Multiparty Computation; Anonymous
Message Broadcast; DIGITAL CASH
Part II: Cryptographic Techniques
Chapter 7: Key Length
SYMMETRIC KEY LENGTH; PUBLIC-KEY KEY LENGTH; COMPARING
SYMMETRIC AND PUBLIC-KEY KEY LENGTH; BIRTHDAY ATTACKS
AGAINST ONE-WAY HASH FUNCTIONS; How Long Should a Key Be?;
Caveat Emptor
Chapter 8: Key Management
Generating Keys; NONLINEAR KEYSPACES; Transferring Keys;
Verifying Keys; Using Keys; UPDATING KEYS; Storing Keys;
Backup Keys; Compromised Keys; Lifetime of Keys; Destroying
Keys; Public-Key Key Management
Chapter 9: Algorithm Types and Modes
Electronic Codebook Mode; Block Replay; Cipher Block
Chaining Mode; Stream Ciphers; Self-Synchronizing Stream
Ciphers; Cipher-Feedback Mode; Synchronous Stream Ciphers;
Output-Feedback Mode; Counter Mode; Other Block-Cipher
Modes; CHOOSING A CIPHER MODE; INTERLEAVING; Block Ciphers
vs. Stream Ciphers
Chapter 10: Using Algorithms
Choosing an Algorithm; Public-Key Cryptography vs. Symmetric
Cryptography; Encrypting Communications Channels; ENCRYPTING
DATA FOR STORAGE; Hardware Encryption vs. Software
Encryption; COMPRESSION, ENCODING, AND ENCRYPTION; DETECTING
ENCRYPTION; HIDING CIPHERTEXT IN CIPHERTEXT; DESTROYING
INFORMATION
Part III: Cryptographic Algorithms
Chapter 11: Mathematical Background
Information Theory; Complexity Theory; NUMBER THEORY;
FACTORING; Prime Number Generation; Discrete Logarithms in a
Finite Field
Chapter 12: Data Encryption Standard
Background; Description of DES; Security of DES;
DIFFERENTIAL AND LINEAR CRYPTANALYSIS; THE REAL DESIGN
CRITERIA; DES VARIANTS; HOW SECURE IS DES TODAY?
Chapter 13: Other Block Algorithms
Lucifer; Madryga; Newdes; Feal-N; Redoc; LOKI; Khufu and
Khafre; RC2; Idea; Mmb; CA-1.1; SKIPJACK
Chapter 14: Still Other Block Algorithms
GOST; CAST; BLOWFISH; SAFER K-64; 3-WAY; CRAB; SXAL8/MBAL;
RC5; OTHER BLOCK ALGORITHMS; THEORY OF BLOCK CIPHER DESIGN;
USING ONE-WAY HASH FUNCTIONS; CHOOSING A BLOCK ALGORITHM
Chapter 15: Combining Block Algorithms
DOUBLE ENCRYPTION; TRIPLE ENCRYPTION; DOUBLING THE BLOCK
LENGTH; OTHER MULTIPLE ENCRYPTION SCHEMES; CDMF KEY
SHORTENING; WHITENING; CASCADING MULTIPLE BLOCK ALGORITHMS;
COMBINING MULTIPLE BLOCK ALGORITHMS
Chapter 16: Pseudo-Random-Sequence Generators and Stream Ciphers
Linear Congruential Generators; Linear Feedback Shift
Registers; LFSRs in Software; DESIGN AND ANALYSIS OF STREAM
CIPHERS; Stream Ciphers using LFSRs; A5; HUGHES XPD/KPD;
NANOTEQ; RAMBUTAN; ADDITIVE GENERATORS; GIFFORD; ALGORITHM
M; PKZIP
Chapter 17: Other Stream Ciphers and Real Random-Sequence Generators
RC4; SEAL; WAKE; FEEDBACK WITH CARRY SHIFT REGISTERS; STREAM
CIPHERS USING FCSRS; NONLINEAR FEEDBACK SHIFT REGISTERS;
Other Stream Ciphers; System-Theoretic Approach to Stream
Cipher Design; Complexity-Theoretic Approach to Stream
Cipher Design; Other Approaches to Stream Cipher Design;
CASCADING MULTIPLE STREAM CIPHERS; CHOOSING A STREAM
CIPHER; GENERATING MULTIPLE STREAMS FROM A SINGLE PSEUDO-
RANDOM SEQUENCE GENERATOR; REAL RANDOM-SEQUENCE GENERATORS
Chapter 18: One-Way Hash Functions
Background; Snefru; N-HASH; MD4; MD5; MD2; Secure Hash
Algorithm (SHA); RIPE-MD; Haval; Other One-Way Hash
Functions; ONE-WAY HASH FUNCTIONS USING SYMMETRIC BLOCK
ALGORITHMS; Using Public-key Algorithms; CHOOSING A ONE-WAY
HASH FUNCTION; MESSAGE AUTHENTICATION CODES
Chapter 19: Public-Key Algorithms
Background; Knapsack Algorithms; RSA; Pohlig-Hellman; Rabin;
ElGamal; McEliece; Elliptic Curve Cryptosystems; LUC; FINITE
AUTOMATON PUBLIC-KEY CRYPTOSYSTEMS
Chapter 20: Public-Key Digital Signature Algorithms
Digital Signature Algorithm (DSA); DSA VARIANTS; GOST
DIGITAL SIGNATURE ALGORITHM; DISCRETE LOGARITHM SIGNATURE
SCHEMES; Ong-Schnorr-Shamir; Esign; Cellular Automata; Other
Public-Key Algorithms
Chapter 21: Identification Schemes
Feige-Fiat-Shamir; Guillou-Quisquater; Schnorr; CONVERTING
IDENTIFICATION SCHEMES TO SIGNATURE SCHEMES
Chapter 22: Key-Exchange Algorithms
DIFFIE-HELLMAN; STATION-TO-STATION PROTOCOL; Shamir's Three-
Pass Protocol; COMSET; Encrypted Key Exchange; FORTIFIED KEY
NEGOTIATION; Conference Key Distribution and Secret
Broadcasting
Chapter 23: Special Algorithms for Protocols
Multiple-Key Public-Key Cryptography; Secret Sharing
Algorithms; Subliminal Channel; Undeniable Digital
Signatures; DESIGNATED CONFIRMER SIGNATURES; Computing with
Encrypted Data; Fair Coin Flips; ONE-WAY ACCUMULATORS; All-
or-Nothing Disclosure of Secrets; FAIR AND FAILSAFE
CRYPTOSYSTEMS; Zero-Knowledge Proofs of Knowledge; Blind
Signatures; Oblivious Transfer; Secure Multiparty
Computation; Probabilistic Encryption; Quantum Cryptography
Part IV: The Real World
Chapter 24: Example Implementations
IBM Secret-Key Management Protocol; Mitrenet; ISDN; STU-III;
Kerberos; KryptoKnight; SESAME; IBM COMMON CRYPTOGRAPHIC
ARCHITECTURE; ISO Authentication Framework; Privacy-Enhanced
Mail (PEM); Message Security Protocol; PRETTY GOOD PRIVACY
(PGP); SMART CARDS; PUBLIC-KEY CRYPTOGRAPHY STANDARDS;
UNIVERSAL ELECTRONIC PAYMENT SYSTEM; CLIPPER; CAPSTONE; AT&T
MODEL 3600 TELEPHONE SECURITY DEVICE
Chapter 25: Politics
NATIONAL SECURITY AGENCY; National Computer Security Center;
National Institute of Standards and Technology; RSA Data
Security, Inc.; PUBLIC KEY PARTNERS; International
Association for Cryptologic Research; RACE Integrity
Primitives Evaluation; CONDITIONAL ACCESS FOR EUROPE;
ISO/IEC 9979; PROFESSIONAL, CIVIL LIBERTIES, AND INDUSTRY
GROUPS; Sci.Crypt; CYPHERPUNKS; Patents; U.S. EXPORT RULES;
FOREIGN IMPORT AND EXPORT OF CRYPTOGRAPHY; Legal Issues
AFTERWARD BY MATT BLAZE
Source Code
DES; LOKI91; IDEA; GOST; BLOWFISH; 3-WAY; RC5; A5; SEAL;
WAKE
References
Return to September 1995
Return to “Bruce Schneier <schneier@winternet.com>”
1995-09-15 (Fri, 15 Sep 95 11:07:30 PDT) - Applied Cryptography, Second Edition: Ordering Information - Bruce Schneier <schneier@winternet.com>