Practical-Cryptography-for-Developers-Book
Practical-Cryptography-for-Developers-Book copied to clipboard
Practical Cryptography for Developers: Hashes, MAC, Key Derivation, DHKE, Symmetric and Asymmetric Ciphers, Public Key Cryptosystems, RSA, Elliptic Curves, ECC, secp256k1, ECDH, ECIES, Digital Signatu...
in [cipher block modes: iv](https://cryptobook.nakov.com/symmetric-key-ciphers/cipher-block-modes#the-initialization-vector-iv) > The **size of the IV** should be the same as the cipher block size, e.g. 128-bits for AES, Serpent and Camellia. not every block...
Saying something like 128-bit security requires approximately 2128 operations to crack would make it a very very inefficient security tool. I could only assume it means 2^128 operations which is...
in the **RSA key exchange** the client encrypts a random session key by server's public key and sends it to the server, where it is decrypted using the server's private...
Hi @nakov! Your book is really nice work! What do you think about translations it to the other languages?
MD5 and SHA-1 are affected by collisions. Probably modify this sentence. You do cover this under "Secure Hash Algorithms", so the above statement somehow contradicts. Reference: https://en.wikipedia.org/wiki/MD5#Collision_vulnerabilities https://security.googleblog.com/2017/02/announcing-first-sha1-collision.html