Practical Cryptography With Go

Practical Cryptography With Go

Kyle Isom
Buy on Leanpub

Table of Contents

Practical Cryptography With Go

  • Chapter 1: Introduction
  • Chapter 2: Engineering concerns and platform security
    • Basic security
    • Specifications
    • On errors
    • Input sanitisation
    • Memory
    • Randomness
    • Time
    • Side channels
    • Privacy and anonymity
    • Trusted computing
    • Virtual environments
    • Public key infrastructure
    • What cryptography does not provide
    • Data lifetimes
    • Options, knobs, and dials
    • Compatibility
    • Conclusion
    • Further reading
  • Chapter 3: Symmetric Security
    • Indistinguishability
    • Authenticity and integrity
    • NaCl
    • AES-GCM
    • AES-CTR with HMAC
    • AES-CBC
    • Messages v. streams
    • Conclusions
    • Further reading
  • Chapter 4: Secure Channels and Key Exchange
    • Secure channel
    • Password-based key derivation
    • Asymmetric key exchange: ECDH
    • NIST curves
    • Other key exchange methods
    • Practical: File encryptor
    • Further reading
  • Chapter 5: Digital signatures
    • Cryptographic hashing algorithms
    • Forward secrecy
    • Ed25519
    • ECDSA
    • RSA
    • Conclusions
    • Practical: Sessions with identities
    • Further reading
Practical Cryptography With Go/overview

Practical Cryptography With Go

course_overview

count_chapters
begin_reading
download
p_implied_book_part_name

Practical Cryptography With Go5 chapters

Begin ›
  1. Chapter 1: Introduction

  2. Chapter 2: Engineering concerns and platform security

  3. Chapter 3: Symmetric Security

  4. Chapter 4: Secure Channels and Key Exchange

  5. Chapter 5: Digital signatures