
Errata: October 8, 2024
Thank you for purchasing
Real-World Cryptography. Please post errata not listed below in this book's
LiveBook Errata
thread. We'll update this list as necessary. Thank you!
The following correction needs to be made to all formats.
-
Chapter 4, Section Summary, page 86: in bullet point 2,
Symmetric encryption needs to be authenticated (after which we call it authenticated encrption)...
should be Symmetric encryption needs to be authenticated (after which we call it authenticated encryption)...
The following correction was made to all formats with the book's third printing Summer 2023.
-
Chapter 13, Section 13.4.2, page 295: in Paragraph 3, Step 3
To compute Q = P...
should be To compute Q = [d] P...
The following corrections were made to all formats with the book's second printing February 2022.
-
In Front Matter, Section
acknowledgments
, page xx: In Paragraph 2, add the following names Jean-Philippe Aumasson, Fabian Becker, Daniel Li, Jeff Lau, Filipe Casal, Curtis Light, Vincent Herbert, Donald Piret, Dan Cashman, Ricky Han, Tshaka Lekholoane
-
Chapter 2, Section 2.3, only in the livebook: the two instances of "2128" should be read
"2128" (reported by Fabian Becker)
-
Chapter 4, Section 4.2.3, page 69: the sentence "Each round uses a different round key, which
is derived from the main sym- metric key (during what is called a key schedule). This allows the slightest
change in the bits of the symmetric key to give a completely different encryption (a principle called
diffusion)." should read "Each round uses a different round key, which is derived from
the main sym- metric key during what is called a key schedule. The combination of the key schedule and the
rounds ensure that the slightest change in the bits of the key or the message renders a completely different
encryption." (reported by Daniel Li)
-
Chapter 4, Section 4.2.1, only in the livebook: "For example, AES-128 specifies that the best
attack we know of would take around 2128 operations" should read "For example, AES-128 specifies that the best
attack we know of would take around 2128 operations" (reported by
Jeff Lau)
-
Chapter 4, Section 4.5.2, page 80: "it is recommended not to encrypt more than 292/3
≈ 230" should read "it is recommended not to encrypt more than 296/3 ≈ 232"(reported by Filipe
Casal)
-
Chapter 4, Section 4.5.3, page 81: "A 92-bit (12-byte) nonce" should read "A 96-bit (12-byte)
nonce" (reported by Filipe Casal)
-
Chapter 4, Section 4.5.3, page 82: in figure 4.20's caption, "It is formed by 16 words
(represented as squares) of 32 bytes each" should read "It is formed by 16 words (represented as squares) of 32
bits each" (reported by Daniel Li)
-
Chapter 5, Section 5.1, page 88: Figure 5.1 would be more intuitive if you swap both
"private" with the two "public", so that only the public keys cross the dotted line (reported by Curtis
Light)
-
Chapter 5, Section 5.2.1, page 94: "A group that has this property is often called a Galois
group" should read "A group that has this property is often called an Abelian
group" (reported by Daniel Li)
-
Chapter 8, Section 8.6, page 166: Figure 8.7 and figure 8.8 have their captions reversed
(reported by Vincent Herbert, Donald Piret, and Dan Cashman)
-
Chapter 11, Section 11.3.3, page 247: in figure 11.16, the last sentence should read: "That
is, if
hash(public_keyA || public_keyE2) and hash(public_keyE1 ||
public_keyB) match." (reported by Ricky Han)
-
Chapter 12, Summary, page 276: The reference to "Coda" should be read as a reference to "Mina"
(reported by Tshaka Lekholoane)
© 2024 Manning Publications Co. All rights reserved.