Applied Cryptography: Protocols, Algorithms, and Source Code in C

Paperback | November 1, 1995

byBruce Schneier

not yet rated|write a review
". . .the best introduction to cryptography I've ever seen. . . . The book the National Security Agency wanted never to be published. . . ." -Wired Magazine

". . .monumental . . . fascinating . . . comprehensive . . . the definitive work on cryptography for computer programmers . . ." -Dr. Dobb's Journal

". . .easily ranks as one of the most authoritative in its field." -PC Magazine

". . .the bible of code hackers." -The Millennium Whole Earth Catalog

This new edition of the cryptography classic provides you with a comprehensive survey of modern cryptography. The book details how programmers and electronic communications professionals can use cryptography-the technique of enciphering and deciphering messages-to maintain the privacy of computer data. It describes dozens of cryptography algorithms, gives practical advice on how to implement them into cryptographic software, and shows how they can be used to solve security problems. Covering the latest developments in practical cryptographic techniques, this new edition shows programmers who design computer applications, networks, and storage systems how they can build security into their software and systems.

What's new in the Second Edition?
* New information on the Clipper Chip, including ways to defeat the key escrow mechanism
* New encryption algorithms, including algorithms from the former Soviet Union and South Africa, and the RC4 stream cipher
* The latest protocols for digital signatures, authentication, secure elections, digital cash, and more
* More detailed information on key management and cryptographic implementations

Pricing and Purchase Info

$45.93 online
$71.99 list price (save 36%)
In stock online
Ships free on orders over $25

From Our Editors

This new edition of this cryptography classic provides readers with the most comprehensive, up-to-date survey of modern cryptographic terms and techniques along with practical advice on how to implement a wide variety of impenetrable encryptions, including powerful algorithms and source code

From the Publisher

". . .the best introduction to cryptography I've ever seen. . . . The book the National Security Agency wanted never to be published. . . ." -Wired Magazine ". . .monumental . . . fascinating . . . comprehensive . . . the definitive work on cryptography for computer programmers . . ." -Dr. Dobb's Journal ". . .easily ranks as one of ...

From the Jacket

". . .the best introduction to cryptography I've ever seen. . . .The book the National Security Agency wanted never to be published. . . ." -Wired Magazine ". . .monumental . . . fascinating . . . comprehensive . . . the definitive work on cryptography for computer programmers . . ." -Dr. Dobb's Journal ". . .easily ranks as one of t...

BRUCE SCHNEIER is President of Counter-pane Systems, a consulting firm specializing in cryptography and computer security. He is a contributing editor to Dr. Dobb's Journal, serves on the board of directors of the International Association of Cryptologic Research, and is a member of the Advisory Board for the Electronic Privacy Informa...

other books by Bruce Schneier

Data And Goliath: The Hidden Battles To Collect Your Data And Control Your World
Data And Goliath: The Hidden Battles To Collect Your Da...

Paperback|Feb 16 2016

$20.82 online$23.50list price(save 11%)
Cryptography Engineering: Design Principles and Practical Applications
Cryptography Engineering: Design Principles and Practic...

Paperback|Mar 15 2010

$39.16 online$66.00list price(save 40%)
Applied Cryptography: Protocols, Algorithms and Source Code in C
Applied Cryptography: Protocols, Algorithms and Source ...

Hardcover|Mar 30 2015

$61.54 online$84.00list price(save 26%)
see all books by Bruce Schneier
Format:PaperbackDimensions:792 pages, 9.25 × 7.4 × 1.42 inPublished:November 1, 1995Publisher:WileyLanguage:English

The following ISBNs are associated with this title:

ISBN - 10:0471117099

ISBN - 13:9780471117094

Customer Reviews of Applied Cryptography: Protocols, Algorithms, and Source Code in C

Reviews

Rated 5 out of 5 by from The only introduction book u need on crypto This book is written in laymens terms and easy to understand.
Date published: 2000-09-11
Rated 5 out of 5 by from The Crypto Bible If you're interested in cryptography and cryptanalysis, then you must buy this book. It serves as both a handy reference and a complete course in cryptography. Bill Schneier lays the bases on the subject, then confidently builds up on them until he has laid down the entire picture of cryptography today, from the mathematical algorithms, the political aspect and an overview of the most important algorithms in use today (such as DES.)The loads of references he gives also provide a complete roadmap for advanced studies on the subject. Whether you're a dilletante, a student, a cracker-wannabe or a security expert, you'll find this surprisingly entertaining book is nothing short of perfection.
Date published: 1999-09-02
Rated 5 out of 5 by from THE Book on Applied Crypto This is an excellent book on cryptography. It serves as both an introduction and an advanced reference. Schneier's familiar tone eases the reader into this mathematical topic. The book is thorough, and Schneier provides references to other sources for those topics he doesn't have room to cover completely. The book includes useful C source code. All in all, if you buy just one book on crypto, make it this one.
Date published: 1999-06-30

Extra Content

Table of Contents

Partial table of contents:

CRYPTOGRAPHIC PROTOCOLS.

Protocol Building Blocks.

Basic Protocols.

Intermediate Protocols.

Advanced Protocols.

Esoteric Protocols.

CRYPTOGRAPHIC TECHNIQUES.

Key Length.

Key Management.

Algorithm Types and Modes.

Using Algorithms.

CRYPTOGRAPHIC ALGORITHMS.

Data Encryption Standard (DES).

Other Block Ciphers.

Other Stream Ciphers and Real Random-Sequence Generators.

Public-Key Algorithms.

Special Algorithms for Protocols.

THE REAL WORLD.

Example Implementations.

Politics.

SOURCE CODE.source Code.

References.

From Our Editors

This new edition of this cryptography classic provides readers with the most comprehensive, up-to-date survey of modern cryptographic terms and techniques along with practical advice on how to implement a wide variety of impenetrable encryptions, including powerful algorithms and source code

Editorial Reviews

"the definitive publicly available text on the theory and practice of cryptography" (Computer Shopper, January 2002)