Download the free Kindle app and start reading Kindle books instantly on your smartphone, tablet, or computer - no Kindle device required.
Read instantly on your browser with Kindle for Web.
Using your mobile phone camera - scan the code below and download the Kindle app.
Applied Cryptography: Protocols, Algorithms, and Source Code in C 2nd Edition
". . .monumental . . . fascinating . . . comprehensive . . . the definitive work on cryptography for computer programmers . . ." -Dr. Dobb's Journal
". . .easily ranks as one of the most authoritative in its field." -PC Magazine
". . .the bible of code hackers." -The Millennium Whole Earth Catalog
This new edition of the cryptography classic provides you with a comprehensive survey of modern cryptography. The book details how programmers and electronic communications professionals can use cryptography-the technique of enciphering and deciphering messages-to maintain the privacy of computer data. It describes dozens of cryptography algorithms, gives practical advice on how to implement them into cryptographic software, and shows how they can be used to solve security problems. Covering the latest developments in practical cryptographic techniques, this new edition shows programmers who design computer applications, networks, and storage systems how they can build security into their software and systems.
What's new in the Second Edition?
* New information on the Clipper Chip, including ways to defeat the key escrow mechanism
* New encryption algorithms, including algorithms from the former Soviet Union and South Africa, and the RC4 stream cipher
* The latest protocols for digital signatures, authentication, secure elections, digital cash, and more
* More detailed information on key management and cryptographic implementations
- ISBN-109780471117094
- ISBN-13978-0471117094
- Edition2nd
- PublisherJohn Wiley & Sons Inc
- Publication dateOctober 18, 1996
- LanguageEnglish
- Dimensions7.5 x 1.5 x 9.25 inches
- Print length758 pages
Customers who bought this item also bought
- Cryptography Engineering: Design Principles and Practical ApplicationsPaperback$6.99 shippingGet it as soon as Friday, Jan 31
- Serious Cryptography: A Practical Introduction to Modern EncryptionPaperback$6.99 shippingGet it as soon as Friday, Jan 31
- Data and Goliath: The Hidden Battles to Collect Your Data and Control Your WorldPaperback$6.99 shippingGet it as soon as Friday, Jan 31
Customer reviews
Customer Reviews, including Product Star Ratings help customers to learn more about the product and decide whether it is the right product for them.
To calculate the overall star rating and percentage breakdown by star, we don’t use a simple average. Instead, our system considers things like how recent a review is and if the reviewer bought the item on Amazon. It also analyzed reviews to verify trustworthiness.
Learn more how customers reviews work on AmazonCustomers say
Customers find the book provides a practical insight into cryptography and cryptanalysis. They appreciate the clear explanations and references that make complex concepts easy to understand. The book is described as a thorough introduction for those wishing to traverse the trials of security. However, opinions differ on whether the material is up-to-date or outdated.
AI-generated from the text of customer reviews
Customers find the book provides practical insights into cryptography and cryptanalysis. They describe it as informative, a great reference, and a primer for cryptography. The book describes variations of encryption algorithms in text along with examples, making it a good read for an introduction to the topic.
"...my poor attempt at summarizing a protocol - it's wonderful and thought provoking to an almost dizzying extent." Read more
"...The real value of Applied Cryptography is the fundamental understanding (and interest, in my case) it helps to build...." Read more
"...Applied Cryptography is fun to read, and makes the subject interesting...." Read more
"Applied Cryptography is a classic book on how and why cryptography works...." Read more
Customers find the encyclopedia content clear and easy to understand. It provides a thorough introduction to computer cryptography, making complex concepts accessible. The references are discussed in an engaging manner, providing a comprehensive overview of methodology and uses for computer cryptography.
"...section alone is worth the purchase and much of it is written in story form - something like: If Alice wants to prove to Bob that she knows a..." Read more
"...Intros to terminology, theory, practical implementations, attack models, and protocol weaknesses are outlined here in great detail...." Read more
"...But either way, this book is very easy to read, and makes some fairly complicated stuff easy to understand...." Read more
"...It is written very clearly and explains in detail how various aspects of cryptography work...." Read more
Customers find the book provides an insightful introduction for those wishing to travel. They describe it as a classic and a nice, thorough introduction to security.
"...Lots of examples. A classic!..." Read more
"A nice, thorough introduction for those wishing to traverse the trials of Cryptography." Read more
"...It is also an eye-opening look at how even the cleverest security algorithms can be compromised...." Read more
Customers have different views on the book. Some find it an update to a classic and a good way to brush up and get up to date. Others mention that the book is outdated, with some of the remarks and material being dated.
"...The book was originally published in 1996 and many of the remarks are noticeably dated (though, perhaps, historically interesting)...." Read more
"This is an update to a classic. I had used the original version for years and just plain wore the old one out...." Read more
"...My only complaint is that some of the material in it is a bit dated (notably the entire section on the Clipper chip)...." Read more
"...Although nowadays this book is a bit outdated but the principles underlying it still hold...." Read more
Top reviews from the United States
There was a problem filtering reviews right now. Please try again later.
- Reviewed in the United States on September 15, 2018Wonderful book. Very approachable yet comprehensive. No need to be afraid of the mathematics or symbolic logic; the protocols section alone is worth the purchase and much of it is written in story form - something like: If Alice wants to prove to Bob that she knows a secret and there's a cave that splits in two halfway down and Bob yells down which path she should emerge from and they do this ten times...however now that Bob knows that Alice knows the secret, he can't prove that to anyone and he doesn't know the secret - a zero knowledge proof. That was just my poor attempt at summarizing a protocol - it's wonderful and thought provoking to an almost dizzying extent.
- Reviewed in the United States on October 10, 2010Of course Bruce's book (even the second edition) is very dated in terms of the specific ciphers and hash functions that are prominently featured. But those will continue to evolve as time passes; no book is going to capture the modern developments for long.
The real value of Applied Cryptography is the fundamental understanding (and interest, in my case) it helps to build. Intros to terminology, theory, practical implementations, attack models, and protocol weaknesses are outlined here in great detail. I can honestly say that this book - along with lots of openssl / gnupg tinkering - have put a functional (for my sysadmin purposes) cryptography foundation within my grasp.
NB: this book is old enough that it pays to shop around for a used copy in good condition.
- Reviewed in the United States on November 3, 2001When I read this just after it came out, it was arguably the best, most comprehensive book on the subject. It may still be, but I haven't surveyed the field in the last year. But either way, this book is very easy to read, and makes some fairly complicated stuff easy to understand. This is a subject area that makes it real easy to be dry, boring, and all of that, but this book is none of those things. Applied Cryptography is fun to read, and makes the subject interesting. About 1/2 of the book is stuff anyone interested in the subject, or anyone that needs to implement some form of encryption or digital signatures will find very useful. The other half is the underlying algorithms and mathematics behind it, which to be honest I didn't read and didn't need to know to do my job. But this is a great book, and has both sides of the story.
- Reviewed in the United States on January 9, 2008Applied Cryptography is a classic book on how and why cryptography works. It is written very clearly and explains in detail how various aspects of cryptography work.
Some math-based sections are included, but overall math knowledge is assumed to be minimal. Overall, the book is very consitent in how much it expects the reader to know, few sections are much more advanced than others.
While not up-to-date with the latest algorithms and available computing specifications, it focuses as much as possible on the timeless aspects of cryptography. A recommended read to all aspiring cryptographers.
- Reviewed in the United States on October 2, 2001This book is readable introduction to real cryptography. It covers a wide range of topics (block and stream cyphers and hashing and random number generation algorithms) in enough depth, and with sufficient theoretical foundation, to give the reader an honest overview of the field. The last section contains code for many of the algorithms and electronic versions are available through Schneier's web site.
Throughout the book Schneier manages to include current references to the inevitable political and legal issues. These references are discussed in an engaging manner and without letting them hog the spotlight. On the other hand, in a fast-moving field like cryptography, they are beginning to get a bit long in the tooth. The book was originally published in 1996 and many of the remarks are noticeably dated (though, perhaps, historically interesting).
Printings before the fifth are also riddled with errors. Fortunately, good errata are available at Schneier's website. They are essential: if you find yourself thinking "That can't be right", it probably isn't.
Read this book first. Without some college level mathematics you may have to skim some of the chapters; still, you can probably curl up on your couch and read it cover to cover. If, afterwards, you get hooked into following up with Stinson's "Cryptograpy", or Menezes "Handbook of Applied Cryptography", don't say I didn't warn you!
- Reviewed in the United States on November 19, 2014Much praise has already been heaped on Bruce Schneier and this seminal book. I can add that I bought a copy of this book when it was first published. It became a key reference book over my career and finally just fell apart and was discarded. Technology has changed in ways I never dreamed. The new, imaginative and sophisticated cyber threats of today are more challenging than ever. That being said, the principles of this science are as relevant today as they were then. To have them presented as Mr. Schneier has in this book means that new generations will find it as exciting and fresh as if it were a 21st century marvel. It never occurred to me that I could re-read the book for the pure pleasure of it. How remarkable.
- Reviewed in the United States on July 21, 2005I've never seen so many pages devoted to pure text. Man oh man, is there a lot of talk--yak yak yak. All technical issues are detoured, inviting the reader to check out the references listed at the end of the book (all I have to buy is 1,643 references--gee, thanks). I find it disheartening that a 700 page book on cryptography doesn't give out a lick of information on the actual subject. If you like a bunch of talk and some hand waving explanations, then this book is definitely for you. Engineers and computer programmers may not be satisfied.
Top reviews from other countries
- bigbeanReviewed in Canada on May 30, 2020
5.0 out of 5 stars Great!
Book in perfect condition. Thanks!
-
Cliente da AmazonReviewed in Brazil on November 29, 2019
5.0 out of 5 stars Exige concentração e prática
Apresenta um resumo histórico da criptografia, vantagens e desvantagens de cada algoritmo, e vários exemplos práticos na linguagem C.
Exige concentração e exercícios práticos para de fato ser compreendido.
Não é uma leitura casual.
Cliente da Amazon
Reviewed in Brazil on November 29, 2019
Exige concentração e exercícios práticos para de fato ser compreendido.
Não é uma leitura casual.
Images in this review - steven dunnReviewed in the United Kingdom on January 17, 2020
5.0 out of 5 stars Excellent
Well worth the price a wealth of information
- saszarReviewed in Spain on December 4, 2018
1.0 out of 5 stars Opinion!!
A good book with a lack of examples and structure.
-
BrianReviewed in France on August 24, 2015
5.0 out of 5 stars un classique
Je l'ai re-acheté car j'avais perdu le 1re; tres bon pour expliquer les bases de crypto en detaile.
Pour leur utilisation, je vous recommande le livre "Cryptography Engineering" de Niels Ferguson et al...