Create an Account
username: password:
 
  MemeStreams Logo

RE: Handbook of Applied Cryptography

search


RE: Handbook of Applied Cryptography
by Decius at 5:50 pm EST, Dec 9, 2004

bucy wrote:
] They read AC and then feel empowered to go
] roll their own crypto for some project instead of using
] off-the-shelf standards (PGP, X.509, even RSA PKCS, etc). And
] they get it wrong every time.

I think there is a market for a book on applied applied applied cryptography that talks about how to make effective use of time tested libraries, both open and closed, to implement reliable real world systems.

But I think a lot of people don't even understand the basics of Schneier. They don't get why their hash needs a timestamp, even though its clearly explained. Security is just like Databases or UI, in that you can't just up and do it and expect to get it right. Unfortunately, unlike the other two, security fails silently.

RE: Handbook of Applied Cryptography


 
 
Powered By Industrial Memetics