Skip to main content

Getting Started in Cryptography and Cryptanalysis

  • Chapter
  • First Online:
Pro Cryptography and Cryptanalysis with C++23

Abstract

Cryptography and cryptanalysis are two fascinating and highly technical disciplines that have played a critical role in modern communication and security. Cryptography is the practice of protecting data using encryption algorithms, while cryptanalysis is trying to break those algorithms. Whether you have just become interested in these topics or have been studying them for some time, this step-by-step guide helps you get started in the world of cryptography and cryptanalysis. From understanding the basics of cryptography to exploring advanced techniques, this guide provides you with all the necessary information to become an expert in the field. Along the way, you learn about the history of cryptography, common algorithms and techniques used in encryption, and the tools and resources available to help you grow your knowledge. Therefore, let’s get started!

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 54.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 69.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    See https://www.bsi.bund.de/SharedDocs/Downloads/EN/BSI/Publications/TechGuidelines/TG02102/BSI-TR-02102-1.pdf?__blob=publicationFile&v=6

  2. 2.

    See https://www.bsi.bund.de/SharedDocs/Downloads/EN/BSI/Publications/TechGuidelines/TG02102/BSI-TR-02102-2.pdf?__blob=publicationFile&v=5

  3. 3.

    See https://www.bsi.bund.de/SharedDocs/Downloads/EN/BSI/Publications/TechGuidelines/TG02102/BSI-TR-02102-3.pdf?__blob=publicationFile&v=5

  4. 4.

    See https://www.bsi.bund.de/SharedDocs/Downloads/EN/BSI/Publications/TechGuidelines/TG02102/BSI-TR-02102-4.pdf?__blob=publicationFile&v=5

References

  1. Alkim, E., Ducas, L., Pöppelmann, T., and Schwabe, P. (2016). Postquantum key exchange—a new hope. In 25th {USENIX} Security Symposium ({USENIX} Security 16) (pp. 327–343).

    Google Scholar 

  2. Peikert, C. (2014, October). Lattice cryptography for the Internet. In international workshop on postquantum cryptography (pp. 197–219). Springer, Cham.

    Google Scholar 

  3. Brakerski, Z., Gentry, C., and Vaikuntanathan V. (2011). Fully Homomorphic Encryption without Bootstrapping Cryptology ePrint Archive, Paper 2011/277, https://eprint.iacr.org/2011/277.

  4. Stallings, W., Cryptography and Network Security - Principles and Practice. 5 ed. 2010: Pearson. 744.

    Google Scholar 

  5. Reddit. Cryptography News and Discussions. Available from: https://www.reddit.com/r/crypto/.

  6. Forums, Security.; Available from: http://www.security-forums.com/index.php?sid=acc302c71bb3ea3a7d631a357223e261.

  7. TechGenix, Security. Available from: http://techgenix.com/security/.

  8. Wilders Security Forums. Available from: https://www.wilderssecurity.com/.

  9. Security Focus. Available from: https://www.securityfocus.com/.

  10. Security InfoWatch. Available from: https://forums.securityinfowatch.com/ .

  11. TechRepublic – Security. Available from: https://www.techrepublic.com/forums/security/.

  12. Information Security Forum. Available from: https://www.securityforum.org/.

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to APress Media, LLC, part of Springer Nature

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Mihailescu, M.I., Nita, S.L. (2023). Getting Started in Cryptography and Cryptanalysis. In: Pro Cryptography and Cryptanalysis with C++23. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4842-9450-5_1

Download citation

Publish with us

Policies and ethics