- The basics of computational security, attacker models, and forward secrecy
- The strengths and limitations of the TLS protocol behind HTTPS secure websites
- Quantum computation and post-quantum cryptography
- How algorithms like AES, ECDSA, Ed25519, Salsa20, and SHA-3 work
- Advanced techniques like multisignatures, threshold signing, and zero-knowledge proofs
Each chapter includes a discussion of common implementation mistakes using real-world examples and details what could go wrong and how to avoid these pitfalls. And, true to form, you'll get just enough math to show you how the algorithms work so that you can understand what makes a particular solution effective--and how they break. NEW TO THIS EDITION: This second edition has been thoroughly updated to reflect the latest developments in cryptography. You'll also find a completely new chapter covering the cryptographic protocols in cryptocurrency and blockchain systems. Whether you're a seasoned practitioner or a beginner looking to dive into the field, Serious Cryptography will demystify this often intimidating topic. You'll grow to understand modern encryption and its applications so that you can make better decisions about what to implement, when, and how.