Shop top categories that ship internationally
To share your reaction on this item, open the Amazon app from the App Store or Google Play on your phone.
Buy used:
$11.64
FREE delivery Saturday, February 1 to Hong Kong on eligible orders over $49. Order within 23 hrs 27 mins
Or fastest delivery Tuesday, January 28
Condition: Used: Good
Access codes and supplements are not guaranteed with used items.
Added to

Sorry, there was a problem.

There was an error retrieving your Wish Lists. Please try again.

Sorry, there was a problem.

List unavailable.
Kindle app logo image

Download the free Kindle app and start reading Kindle books instantly on your smartphone, tablet, or computer - no Kindle device required.

Read instantly on your browser with Kindle for Web.

Using your mobile phone camera - scan the code below and download the Kindle app.

QR code to download the Kindle App

Follow the author

Something went wrong. Please try your request again later.

Applied Cryptography: Protocols, Algorithms, and Source Code in C 2nd Edition

4.4 4.4 out of 5 stars 159 ratings

". . .the best introduction to cryptography I've ever seen. . . .The book the National Security Agency wanted never to be published. . . ." -Wired Magazine

". . .monumental . . . fascinating . . . comprehensive . . . the definitive work on cryptography for computer programmers . . ." -Dr. Dobb's Journal

". . .easily ranks as one of the most authoritative in its field." -PC Magazine

". . .the bible of code hackers." -The Millennium Whole Earth Catalog

This new edition of the cryptography classic provides you with a comprehensive survey of modern cryptography. The book details how programmers and electronic communications professionals can use cryptography-the technique of enciphering and deciphering messages-to maintain the privacy of computer data. It describes dozens of cryptography algorithms, gives practical advice on how to implement them into cryptographic software, and shows how they can be used to solve security problems. Covering the latest developments in practical cryptographic techniques, this new edition shows programmers who design computer applications, networks, and storage systems how they can build security into their software and systems.

What's new in the Second Edition?
* New information on the Clipper Chip, including ways to defeat the key escrow mechanism
* New encryption algorithms, including algorithms from the former Soviet Union and South Africa, and the RC4 stream cipher
* The latest protocols for digital signatures, authentication, secure elections, digital cash, and more
* More detailed information on key management and cryptographic implementations

Customer reviews

4.4 out of 5 stars
159 global ratings

Review this product

Share your thoughts with other customers

Customers say

Customers find the book provides a practical insight into cryptography and cryptanalysis. They appreciate the clear explanations and references that make complex concepts easy to understand. The book is described as a thorough introduction for those wishing to traverse the trials of security. However, opinions differ on whether the material is up-to-date or outdated.

AI-generated from the text of customer reviews

24 customers mention "Cryptography content"24 positive0 negative

Customers find the book provides practical insights into cryptography and cryptanalysis. They describe it as informative, a great reference, and a primer for cryptography. The book describes variations of encryption algorithms in text along with examples, making it a good read for an introduction to the topic.

"...my poor attempt at summarizing a protocol - it's wonderful and thought provoking to an almost dizzying extent." Read more

"...The real value of Applied Cryptography is the fundamental understanding (and interest, in my case) it helps to build...." Read more

"...Applied Cryptography is fun to read, and makes the subject interesting...." Read more

"Applied Cryptography is a classic book on how and why cryptography works...." Read more

20 customers mention "Encyclopedia content"20 positive0 negative

Customers find the encyclopedia content clear and easy to understand. It provides a thorough introduction to computer cryptography, making complex concepts accessible. The references are discussed in an engaging manner, providing a comprehensive overview of methodology and uses for computer cryptography.

"...section alone is worth the purchase and much of it is written in story form - something like: If Alice wants to prove to Bob that she knows a..." Read more

"...Intros to terminology, theory, practical implementations, attack models, and protocol weaknesses are outlined here in great detail...." Read more

"...But either way, this book is very easy to read, and makes some fairly complicated stuff easy to understand...." Read more

"...It is written very clearly and explains in detail how various aspects of cryptography work...." Read more

3 customers mention "Bs grade"3 positive0 negative

Customers like the book's condition.

"Perfect condition" Read more

"The item is in great conditions!" Read more

"BS grade...." Read more

3 customers mention "Eye-opening"3 positive0 negative

Customers find the book provides an insightful introduction for those wishing to travel. They describe it as a classic and a nice, thorough introduction to security.

"...Lots of examples. A classic!..." Read more

"A nice, thorough introduction for those wishing to traverse the trials of Cryptography." Read more

"...It is also an eye-opening look at how even the cleverest security algorithms can be compromised...." Read more

6 customers mention "Erasure"2 positive4 negative

Customers have different views on the book. Some find it an update to a classic and a good way to brush up and get up to date. Others mention that the book is outdated, with some of the remarks and material being dated.

"...The book was originally published in 1996 and many of the remarks are noticeably dated (though, perhaps, historically interesting)...." Read more

"This is an update to a classic. I had used the original version for years and just plain wore the old one out...." Read more

"...My only complaint is that some of the material in it is a bit dated (notably the entire section on the Clipper chip)...." Read more

"...Although nowadays this book is a bit outdated but the principles underlying it still hold...." Read more

Top reviews from the United States

  • Reviewed in the United States on September 15, 2018
    Wonderful book. Very approachable yet comprehensive. No need to be afraid of the mathematics or symbolic logic; the protocols section alone is worth the purchase and much of it is written in story form - something like: If Alice wants to prove to Bob that she knows a secret and there's a cave that splits in two halfway down and Bob yells down which path she should emerge from and they do this ten times...however now that Bob knows that Alice knows the secret, he can't prove that to anyone and he doesn't know the secret - a zero knowledge proof. That was just my poor attempt at summarizing a protocol - it's wonderful and thought provoking to an almost dizzying extent.
    One person found this helpful
    Report
  • Reviewed in the United States on October 10, 2010
    Of course Bruce's book (even the second edition) is very dated in terms of the specific ciphers and hash functions that are prominently featured. But those will continue to evolve as time passes; no book is going to capture the modern developments for long.

    The real value of Applied Cryptography is the fundamental understanding (and interest, in my case) it helps to build. Intros to terminology, theory, practical implementations, attack models, and protocol weaknesses are outlined here in great detail. I can honestly say that this book - along with lots of openssl / gnupg tinkering - have put a functional (for my sysadmin purposes) cryptography foundation within my grasp.

    NB: this book is old enough that it pays to shop around for a used copy in good condition.
    5 people found this helpful
    Report
  • Reviewed in the United States on November 3, 2001
    When I read this just after it came out, it was arguably the best, most comprehensive book on the subject. It may still be, but I haven't surveyed the field in the last year. But either way, this book is very easy to read, and makes some fairly complicated stuff easy to understand. This is a subject area that makes it real easy to be dry, boring, and all of that, but this book is none of those things. Applied Cryptography is fun to read, and makes the subject interesting. About 1/2 of the book is stuff anyone interested in the subject, or anyone that needs to implement some form of encryption or digital signatures will find very useful. The other half is the underlying algorithms and mathematics behind it, which to be honest I didn't read and didn't need to know to do my job. But this is a great book, and has both sides of the story.
    One person found this helpful
    Report
  • Reviewed in the United States on January 9, 2008
    Applied Cryptography is a classic book on how and why cryptography works. It is written very clearly and explains in detail how various aspects of cryptography work.

    Some math-based sections are included, but overall math knowledge is assumed to be minimal. Overall, the book is very consitent in how much it expects the reader to know, few sections are much more advanced than others.

    While not up-to-date with the latest algorithms and available computing specifications, it focuses as much as possible on the timeless aspects of cryptography. A recommended read to all aspiring cryptographers.
    2 people found this helpful
    Report
  • Reviewed in the United States on October 2, 2001
    This book is readable introduction to real cryptography. It covers a wide range of topics (block and stream cyphers and hashing and random number generation algorithms) in enough depth, and with sufficient theoretical foundation, to give the reader an honest overview of the field. The last section contains code for many of the algorithms and electronic versions are available through Schneier's web site.
    Throughout the book Schneier manages to include current references to the inevitable political and legal issues. These references are discussed in an engaging manner and without letting them hog the spotlight. On the other hand, in a fast-moving field like cryptography, they are beginning to get a bit long in the tooth. The book was originally published in 1996 and many of the remarks are noticeably dated (though, perhaps, historically interesting).
    Printings before the fifth are also riddled with errors. Fortunately, good errata are available at Schneier's website. They are essential: if you find yourself thinking "That can't be right", it probably isn't.
    Read this book first. Without some college level mathematics you may have to skim some of the chapters; still, you can probably curl up on your couch and read it cover to cover. If, afterwards, you get hooked into following up with Stinson's "Cryptograpy", or Menezes "Handbook of Applied Cryptography", don't say I didn't warn you!
    13 people found this helpful
    Report
  • Reviewed in the United States on November 19, 2014
    Much praise has already been heaped on Bruce Schneier and this seminal book. I can add that I bought a copy of this book when it was first published. It became a key reference book over my career and finally just fell apart and was discarded. Technology has changed in ways I never dreamed. The new, imaginative and sophisticated cyber threats of today are more challenging than ever. That being said, the principles of this science are as relevant today as they were then. To have them presented as Mr. Schneier has in this book means that new generations will find it as exciting and fresh as if it were a 21st century marvel. It never occurred to me that I could re-read the book for the pure pleasure of it. How remarkable.
    3 people found this helpful
    Report
  • Reviewed in the United States on July 21, 2005
    I've never seen so many pages devoted to pure text. Man oh man, is there a lot of talk--yak yak yak. All technical issues are detoured, inviting the reader to check out the references listed at the end of the book (all I have to buy is 1,643 references--gee, thanks). I find it disheartening that a 700 page book on cryptography doesn't give out a lick of information on the actual subject. If you like a bunch of talk and some hand waving explanations, then this book is definitely for you. Engineers and computer programmers may not be satisfied.
    14 people found this helpful
    Report

Top reviews from other countries

Translate all reviews to English
  • bigbean
    5.0 out of 5 stars Great!
    Reviewed in Canada on May 30, 2020
    Book in perfect condition. Thanks!
  • Cliente da Amazon
    5.0 out of 5 stars Exige concentração e prática
    Reviewed in Brazil on November 29, 2019
    Apresenta um resumo histórico da criptografia, vantagens e desvantagens de cada algoritmo, e vários exemplos práticos na linguagem C.
    Exige concentração e exercícios práticos para de fato ser compreendido.
    Não é uma leitura casual.
    Customer image
    Cliente da Amazon
    5.0 out of 5 stars Exige concentração e prática
    Reviewed in Brazil on November 29, 2019
    Apresenta um resumo histórico da criptografia, vantagens e desvantagens de cada algoritmo, e vários exemplos práticos na linguagem C.
    Exige concentração e exercícios práticos para de fato ser compreendido.
    Não é uma leitura casual.
    Images in this review
    Customer image Customer image Customer image
    Customer imageCustomer imageCustomer image
  • steven dunn
    5.0 out of 5 stars Excellent
    Reviewed in the United Kingdom on January 17, 2020
    Well worth the price a wealth of information
  • saszar
    1.0 out of 5 stars Opinion!!
    Reviewed in Spain on December 4, 2018
    A good book with a lack of examples and structure.
  • Brian
    5.0 out of 5 stars un classique
    Reviewed in France on August 24, 2015
    Je l'ai re-acheté car j'avais perdu le 1re; tres bon pour expliquer les bases de crypto en detaile.
    Pour leur utilisation, je vous recommande le livre "Cryptography Engineering" de Niels Ferguson et al...