Home arrow Security arrow Page 3 - An Epilogue to Cryptography

Further Reading and References - Security

This is the last part of a three-part series covering encryption and decryption, with a focus on the algorithms used. If you have missed either the first or second part, I encourage you to check them out before reading this part.

TABLE OF CONTENTS:
  1. An Epilogue to Cryptography
  2. Encryption in Our Era
  3. Further Reading and References
  4. Conclusions
By: Barzan "Tony" Antal
Rating: starstarstarstarstar / 9
July 30, 2007

print this article
SEARCH DEV SHED

TOOLS YOU CAN USE

advertisement

Through the years I have gathered some of the most comprehensive and best literature that is available. Here I am sharing my list with you, and I truly believe that you are going to be amazed by these works. Whether you are just a casual cryptography enthusiast, a student or an expert in this field, I am sure that you will enjoy these masterpieces.

As an honorable mention, I'd like to state that Bruce Schneier has written and/or co-authored some of the absolute best books and manuals about cryptography. Some of his books are used as textbooks and considered to be bibles of cryptography. Anyway, I'd express my respect toward all of these authors that appear in this list below. All of them have amazing expertise and vast amounts of knowledge.

"RSA Laboratories' Frequently Asked Questions About Today's Cryptography," Version 4.1.

CryptographyWorld website.

"Practical Cryptography" - Neil Ferguson, Bruce Schneier.

"Applied Cryptography" - Bruce Schneier (First Edition, Chapter 1.2.3.).

"Why Cryptography Is Harder Than It Looks" (essay) - Bruce Schneier.

"Computer Encryption, an overview and programming" - Kias Henry.

"Cryptography Decrypted" - H. X. Mel, Doris M. Backer, Steve Burnett.

"Obfuscation of The Standard XOR Encryption Algorithm" - Zachary A. Kissel

"One Way Hash Functions" - Bruce Schneier (Dr. Dobbs Journal: Volume 16, Issue 9 (September 1991); Pages: 148 - 151.

"Hacks, Spooks and Data Encryption" - A. Stevens (Dr. Dobbs Journal, Vol 15, No. 9, Sept 1990, pp 147-149.)

"The Index of Coincidence and Its Applications in Cryptography" - William F. Friedman (Riverbank Publication)

"Announcing the AES" - Federal Information Processing Standards; Nov, 2001.

I might have left out some of the most obvious literature, and as much as I regret it, more than likely it is because I couldn't get my hands on it yet. But this should be enough for now. If you still want to research more, then I challenge you to do so.

I would also appreciate your recommendations if you come across some outstanding work.



 
 
>>> More Security Articles          >>> More By Barzan "Tony" Antal
 

blog comments powered by Disqus
escort Bursa Bursa escort Antalya eskort
   

SECURITY ARTICLES

- Secure Your Business for Data Privacy Day
- Google Testing Security Fob Password Alterna...
- Security News Highlights Concerns
- Going to Extremes for Data Security
- Skipfish Website Vulnerability Scanner
- Critical Microsoft Visual Studio Security Pa...
- US Faces Tech Security Expert Deficit
- LAN Reconnaissance
- An Epilogue to Cryptography
- A Sequel to Cryptography
- An Introduction to Cryptography
- Security Overview
- Network Security Assessment
- Firewalls
- What’s behind the curtain? Part II

Developer Shed Affiliates

 


Dev Shed Tutorial Topics: