- Notifications
You must be signed in to change notification settings - Fork451
Practical Cryptography for Developers: Hashes, MAC, Key Derivation, DHKE, Symmetric and Asymmetric Ciphers, Public Key Cryptosystems, RSA, Elliptic Curves, ECC, secp256k1, ECDH, ECIES, Digital Signatures, ECDSA, EdDSA
License
nakov/Practical-Cryptography-for-Developers-Book
Folders and files
Name | Name | Last commit message | Last commit date | |
---|---|---|---|---|
Repository files navigation
Warning: this book isnot finished! I am still working on some of the chapters. Once it is completed, I will publish it as PDF and EPUB. Be patient.
A modernpractical book aboutcryptography for developers with code examples, covering core concepts like:hashes (like SHA-3 and BLAKE2),MAC codes (like HMAC and GMAC),key derivation functions (like Scrypt, Argon2),key agreement protocols (like DHKE, ECDH),symmetric ciphers (like AES and ChaCha20, cipher block modes, authenticated encryption, AEAD, AES-GCM, ChaCha20-Poly1305),asymmetric ciphers andpublic-key cryptosystems (RSA, ECC, ECIES),elliptic curve cryptography (ECC, secp256k1, curve25519),digital signatures (ECDSA and EdDSA),secure random numbers (PRNG, CSRNG) andquantum-safe cryptography, along with cryptolibraries and developer tools, with a lots ofcode examples in Python and other languages.
Author:Svetlin Nakov, PhD -https://nakov.com
Contributors: Milen Stefanov, Marina Shideroff
Sponsor:SoftUni (Software University) -https://softuni.org
ISBN:978-619-00-0870-5 (9786190008705)
This book is free and open-source, published under theMIT license.
Official Web site:https://cryptobook.nakov.com
OfficialGitHub repo:https://github.com/nakov/practical-cryptography-for-developers-book.
Sofia, November 2018
Tags: cryptography, free, book, Nakov, Svetlin Nakov, hashes, hash function, SHA-256, SHA3, BLAKE2, RIPEMD, MAC, message authentication code, HMAC, KDF, key derivation, key derivation function, PBKDF2, Scrypt, Bcrypt, Argon2, password hashing, random generator, pseudo-random numbers, CSPRNG, secure random generator, key exchange, key agreement, Diffie-Hellman, DHKE, ECDH, symmetric ciphers, asymmetric ciphers, public key cryptosystems, symmetric cryptography, AES, Rijndael, cipher block mode, AES-CTR, AES-GCM, ChaCha20-Poly1305, authenticated encryption, encryption scheme, public key cryptography, RSA, ECC, elliptic curves, secp256k1, curve25519, EC points, EC domain parameters, ECDH key agreement, asymmetric encryption scheme, hybrid encryption, ECIES, digital signature, RSA signature, DSA, ECDSA, EdDSA, ElGammal signature, Schnorr signature, quantum-safe cryptography, digital certificates, TLS, OAuth, multi-factor authentication, crypto libraries, Python cryptography, JavaScript cryptography, C# cryptography, Java cryptography, C++ cryptography, PHP cryptography.
About
Practical Cryptography for Developers: Hashes, MAC, Key Derivation, DHKE, Symmetric and Asymmetric Ciphers, Public Key Cryptosystems, RSA, Elliptic Curves, ECC, secp256k1, ECDH, ECIES, Digital Signatures, ECDSA, EdDSA
Topics
Resources
License
Uh oh!
There was an error while loading.Please reload this page.
Stars
Watchers
Forks
Contributors4
Uh oh!
There was an error while loading.Please reload this page.