1995-11-23 - How to order Applied Crypto direct from Bruce Schneier

Header Data

From: “Perry E. Metzger” <perry@piermont.com>
To: cypherpunks@toad.com
Message Hash: fc5d9a6824033dfd85816c9953331c955b4b6aff08aba616eb480a2fd653e7a2
Message ID: <199511231937.OAA24938@jekyll.piermont.com>
Reply To: N/A
UTC Datetime: 1995-11-23 19:56:44 UTC
Raw Date: Fri, 24 Nov 1995 03:56:44 +0800

Raw message

From: "Perry E. Metzger" <perry@piermont.com>
Date: Fri, 24 Nov 1995 03:56:44 +0800
To: cypherpunks@toad.com
Subject: How to order Applied Crypto direct from Bruce Schneier
Message-ID: <199511231937.OAA24938@jekyll.piermont.com>
MIME-Version: 1.0
Content-Type: text/plain



Several people have asked for this. You might want to email him to ask
if the offer is still open, since this was a while back.

From: Bruce Schneier <schneier@winternet.com>
Subject: Applied Cryptography, 2nd Edition: Ordering Information
Date: Sun, 17 Sep 1995 18:09:34 -0500 (CDT)

The SECOND EDITION of APPLIED CRYPTOGRAPHY is coming in November. 
This is a major rewrite: 50% more words, 7 more chapters, and
over 1600 references.  Not only did I make corrections to the
first edition and add developments since it was published, but I
also included topics left out of the first edition.  (See table
of contents--attached.)

The second edition has lots of new algorithms (including GOST,
Blowfish, RC4, and A5), more information on the Clipper Chip and
key escrow, dozens of new protocols, more information on how PGP
works, detailed information on key management and modes of
operation, and new source code.

The second edition will be published in paperback and hardcover. 
Right now I am making both available at a 15% discount.

*****************************************************************
                          ORDER FORM

Applied Cryptography, 2nd Edition (Hardcover): $70 * .85 = $59.00
Applied Cryptography, 2nd Edition (Softcover): $50 * .85 = $42.00

          Shipping:
                    Air (U.S.):       $5 per book
                    Surface (U.S.):   $3 per book
                    Canada/Mexico:    $7 per book
                    Everywhere else:  $9 per book

Send to:

          Counterpane Systems, 101 E Minnehaha Parkway,
                    Minneapolis, MN  55419

I need payment by check, in U.S. funds drawn on a U.S. bank.  Or a
postal money order.  Sorry, no credit cards.
*****************************************************************

              APPLIED CRYPTOGRAPHY, SECOND EDITION
                       Table of Contents

((Sections in all capitals are either new or substantially
rewritten.))

Forward by Whitfield Diffie

Preface

Chapter 1:  Foundations
          Terminology; STEGANOGRAPHY; Substitution Ciphers and
          Transposition Ciphers; Simple XOR; One-Time Pads; Computer
          Algorithms; Large Numbers

Part I:  Cryptographic Protocols

Chapter 2:  Protocol Building Blocks
          Introduction to Protocols; Communications using Symmetric
          Cryptography; One-Way Functions; One-Way Hash Functions;
          Communications using Public-Key Cryptography; Digital
          Signatures; Digital Signatures with Encryption; Random and
          Pseudo-Random Sequence Generation

Chapter 3:  Basic Protocols
          Key Exchange; Authentication; AUTHENTICATION AND KEY
          EXCHANGE; FORMAL ANALYSIS OF AUTHENTICATION AND KEY-EXCHANGE
          PROTOCOLS; Multiple-Key Public-Key Cryptography; Secret
          Splitting; Secret Sharing; Cryptographic Protection of
          Databases

Chapter 4:  Intermediate Protocols
          Timestamping Services; Subliminal Channel; Undeniable
          Digital Signatures; DESIGNATED CONFIRMER SIGNATURES; PROXY
          SIGNATURES; Group Signatures; Fail-Stop Digital Signatures;
          Computing with Encrypted Data; Bit Commitment; Fair Coin
          Flips; Mental Poker; ONE-WAY ACCUMULATORS; All-or-Nothing
          Disclosure of Secrets; KEY ESCROW

Chapter 5:  Advanced Protocols
          ZERO-KNOWLEDGE PROOFS; Zero-Knowledge Proofs of Identity;
          Blind Signatures; IDENTITY-BASED PUBLIC-KEY CRYPTOGRAPHY;
          Oblivious Transfer; OBLIVIOUS SIGNATURES; Simultaneous
          Contract Signing; Digital Certified Mail; Simultaneous
          Exchange of Secrets

Chapter 6:  Esoteric Protocols
          SECURE ELECTIONS; Secure Multiparty Computation; Anonymous
          Message Broadcast; DIGITAL CASH

Part II:  Cryptographic Techniques

Chapter 7:  Key Length
          SYMMETRIC KEY LENGTH; PUBLIC-KEY KEY LENGTH; COMPARING
          SYMMETRIC AND PUBLIC-KEY KEY LENGTH; BIRTHDAY ATTACKS
          AGAINST ONE-WAY HASH FUNCTIONS; How Long Should a Key Be?;
          Caveat Emptor

Chapter 8:  Key Management
          Generating Keys; NONLINEAR KEYSPACES; Transferring Keys;
          Verifying Keys; Using Keys; UPDATING KEYS; Storing Keys;
          Backup Keys; Compromised Keys; Lifetime of Keys; Destroying
          Keys; Public-Key Key Management

Chapter 9:  Algorithm Types and Modes
          Electronic Codebook Mode; Block Replay; Cipher Block
          Chaining Mode; Stream Ciphers; Self-Synchronizing Stream
          Ciphers; Cipher-Feedback Mode; Synchronous Stream Ciphers;
          Output-Feedback Mode; Counter Mode; Other Block-Cipher
          Modes; CHOOSING A CIPHER MODE; INTERLEAVING; Block Ciphers
          vs. Stream Ciphers

Chapter 10:  Using Algorithms
          Choosing an Algorithm; Public-Key Cryptography vs. Symmetric
          Cryptography; Encrypting Communications Channels; ENCRYPTING
          DATA FOR STORAGE; Hardware Encryption vs. Software
          Encryption; COMPRESSION, ENCODING, AND ENCRYPTION; DETECTING
          ENCRYPTION; HIDING CIPHERTEXT IN CIPHERTEXT; DESTROYING
          INFORMATION

Part III:  Cryptographic Algorithms

Chapter 11:  Mathematical Background
          Information Theory; Complexity Theory; NUMBER THEORY;
          FACTORING; Prime Number Generation; Discrete Logarithms in a
          Finite Field

Chapter 12:  Data Encryption Standard
          Background; Description of DES; Security of DES; 
          DIFFERENTIAL AND LINEAR CRYPTANALYSIS; THE REAL DESIGN
          CRITERIA; DES VARIANTS; HOW SECURE IS DES TODAY?

Chapter 13:  Other Block Algorithms
          Lucifer; Madryga; Newdes; Feal-N; Redoc; LOKI; Khufu and
          Khafre; RC2; Idea; Mmb; CA-1.1; SKIPJACK

Chapter 14:  Still Other Block Algorithms
          GOST; CAST; BLOWFISH; SAFER K-64; 3-WAY; CRAB; SXAL8/MBAL;
          RC5; OTHER BLOCK ALGORITHMS; THEORY OF BLOCK CIPHER DESIGN;
          USING ONE-WAY HASH FUNCTIONS; CHOOSING A BLOCK ALGORITHM

Chapter 15:  Combining Block Algorithms
          DOUBLE ENCRYPTION; TRIPLE ENCRYPTION; DOUBLING THE BLOCK
          LENGTH; OTHER MULTIPLE ENCRYPTION SCHEMES; CDMF KEY
          SHORTENING; WHITENING; CASCADING MULTIPLE BLOCK ALGORITHMS;
          COMBINING MULTIPLE BLOCK ALGORITHMS

Chapter 16:  Pseudo-Random-Sequence Generators and Stream Ciphers
          Linear Congruential Generators; Linear Feedback Shift
          Registers; LFSRs in Software; DESIGN AND ANALYSIS OF STREAM
          CIPHERS; Stream Ciphers using LFSRs; A5; HUGHES XPD/KPD;
          NANOTEQ; RAMBUTAN; ADDITIVE GENERATORS; GIFFORD; ALGORITHM
          M; PKZIP

Chapter 17:  Other Stream Ciphers and Real Random-Sequence Generators
          RC4; SEAL; WAKE; FEEDBACK WITH CARRY SHIFT REGISTERS; STREAM
          CIPHERS USING FCSRS; NONLINEAR FEEDBACK SHIFT REGISTERS; 
          Other Stream Ciphers; System-Theoretic Approach to Stream
          Cipher Design; Complexity-Theoretic Approach to Stream
          Cipher Design; Other Approaches to Stream Cipher Design;
          CASCADING MULTIPLE STREAM CIPHERS;  CHOOSING A STREAM
          CIPHER; GENERATING MULTIPLE STREAMS FROM A SINGLE PSEUDO-
          RANDOM SEQUENCE GENERATOR; REAL RANDOM-SEQUENCE GENERATORS

Chapter 18:  One-Way Hash Functions
          Background; Snefru; N-HASH; MD4; MD5; MD2; Secure Hash
          Algorithm (SHA); RIPE-MD; Haval; Other One-Way Hash
          Functions; ONE-WAY HASH FUNCTIONS USING SYMMETRIC BLOCK
          ALGORITHMS; Using Public-key Algorithms; CHOOSING A ONE-WAY
          HASH FUNCTION; MESSAGE AUTHENTICATION CODES

Chapter 19:  Public-Key Algorithms
          Background; Knapsack Algorithms; RSA; Pohlig-Hellman; Rabin;
          ElGamal; McEliece; Elliptic Curve Cryptosystems; LUC; FINITE
          AUTOMATON PUBLIC-KEY CRYPTOSYSTEMS

Chapter 20:  Public-Key Digital Signature Algorithms
          Digital Signature Algorithm (DSA); DSA VARIANTS; GOST
          DIGITAL SIGNATURE ALGORITHM; DISCRETE LOGARITHM SIGNATURE
          SCHEMES; Ong-Schnorr-Shamir; Esign; Cellular Automata; Other
          Public-Key Algorithms

Chapter 21:  Identification Schemes
          Feige-Fiat-Shamir; Guillou-Quisquater; Schnorr; CONVERTING
          IDENTIFICATION SCHEMES TO SIGNATURE SCHEMES

Chapter 22:  Key-Exchange Algorithms
          DIFFIE-HELLMAN; STATION-TO-STATION PROTOCOL; Shamir's Three-
          Pass Protocol; COMSET; Encrypted Key Exchange; FORTIFIED KEY
          NEGOTIATION; Conference Key Distribution and Secret
          Broadcasting

Chapter 23:  Special Algorithms for Protocols
          Multiple-Key Public-Key Cryptography; Secret Sharing
          Algorithms; Subliminal Channel; Undeniable Digital
          Signatures; DESIGNATED CONFIRMER SIGNATURES; Computing with
          Encrypted Data; Fair Coin Flips; ONE-WAY ACCUMULATORS; All-
          or-Nothing Disclosure of Secrets; FAIR AND FAILSAFE
          CRYPTOSYSTEMS; Zero-Knowledge Proofs of Knowledge; Blind
          Signatures; Oblivious Transfer; Secure Multiparty
          Computation; Probabilistic Encryption; Quantum Cryptography

Part IV:  The Real World

Chapter 24:  Example Implementations
          IBM Secret-Key Management Protocol; Mitrenet; ISDN; STU-III;
          Kerberos; KryptoKnight; SESAME; IBM COMMON CRYPTOGRAPHIC
          ARCHITECTURE; ISO Authentication Framework; Privacy-Enhanced
          Mail (PEM); Message Security Protocol; PRETTY GOOD PRIVACY
          (PGP); SMART CARDS; PUBLIC-KEY CRYPTOGRAPHY STANDARDS;
          UNIVERSAL ELECTRONIC PAYMENT SYSTEM; CLIPPER; CAPSTONE; AT&T
          MODEL 3600 TELEPHONE SECURITY DEVICE

Chapter 25:  Politics
          NATIONAL SECURITY AGENCY; National Computer Security Center;
          National Institute of Standards and Technology; RSA Data
          Security, Inc.; PUBLIC KEY PARTNERS; International
          Association for Cryptologic Research; RACE Integrity
          Primitives Evaluation; CONDITIONAL ACCESS FOR EUROPE;
          ISO/IEC 9979; PROFESSIONAL, CIVIL LIBERTIES, AND INDUSTRY
          GROUPS; Sci.Crypt; CYPHERPUNKS; Patents; U.S. EXPORT RULES;
          FOREIGN IMPORT AND EXPORT OF CRYPTOGRAPHY; Legal Issues

AFTERWARD BY MATT BLAZE

Source Code
          DES; LOKI91; IDEA; GOST; BLOWFISH; 3-WAY; RC5; A5; SEAL;
          WAKE

References






Thread