Cryptography Decrypted Chapters (.pdf)
- Table of Contents, Forward, Preface, Introduction
- 20 year old forward has 30 year old prospective by Motorola security
- Part I: Secret Key Cryptography
- quick fundamentals read→ 1, 2, 5, 7, 8 (7,8 essential to privacy)
- Chapter 1 -- Locks and Keys
- Chapter 2 -- Substitution and Caesar's Cipher
- Chapter 3 -- Transposition Ciphers: Moving Around
- Chapter 4 -- Diffuse and Confuse: How Cryptographers Win the End Game
- Chapter 5 -- DES Isn't Strong Anymore
- Chapter 6 -- Evolution of Cryptography: Going Global
- Chapter 7 -- Secret Key Assurances
- Chapter 8 -- Problems with Secret Key Exchange
- Part II: Public Key Cryptography
- quick fundamentals→ 9, 10, 12, 14
- Chapter 9 -- Pioneering Public Key: Public Exchange of Secret Keys
- Chapter 10 -- Confidentiality Using Public Keys
- Chapter 11 -- Making Public Keys: Math Tricks
- Chapter 12 -- Creating Digital Signatures Using the Private Key
- Chapter 13 -- Hashes: Non-keyed Message Digests
- Chapter 14 -- Message Digest Assurances
- Chapter 15 -- Comparing Secret Key, Public Key, and Message Digests
- Part III: Distribution of Public Keys
- quick fundamentals→ 16, 17
- Chapter 16 -- Digital Certificates
- Chapter 17 -- X.509 Public Key Infrastructure
- Chapter 18 -- Pretty Good Privacy and the Web of Trust
- Part IV: Real World Systems
- quick fundamentals→ 19, 20, 22
- Chapter 19 -- Secure Email
- Chapter 20 -- Secure Socket Layer and Transport Layer Security
- Chapter 21 -- IPsec Overview
- Chapter 22 -- Cryptographic Gotchas
- Chapter 23 -- Protecting Your Keys
Summaries (not in book)
* Cryptography Decrypted 2 appendices -- "Public Key Mathematics (and Some Words on Random Numbers)" and "(A Few) IPsec Details" -- are available only in the printed book.
H.X. Mel
software developer for Docrypt
taught encryption seminars:
JavaOne, USENIX, ACM, MIT, ...
trainer / professor / ed:
Federal, Fortune 500, ...
Carnegie-Mellon U., UBC ...
got Masters: M.I.T. ('88)
HX is pen used by Cary Meltzer
Doris Baker
visual and semantic consultant