Applied Cryptography: Protocols, Algorithms, and Source C... and over 2 million other books are available for Amazon Kindle . Learn more

Buy New

or
Sign in to turn on 1-Click ordering.
Buy Used
Used - Good See details
Price: 18.77

or
 
   
Trade in Yours
For a 3.75 Gift Card
Trade in
More Buying Choices
Have one to sell? Sell yours here
Sorry, this item is not available in
Image not available for
Colour:
Image not available

 
Start reading Applied Cryptography on your Kindle in under a minute.

Don't have a Kindle? Get your Kindle here, or download a FREE Kindle Reading App.

Applied Cryptography: Protocols, Algorithms and Source Code in C (Computer Science) [Paperback]

Bruce Schneier
4.7 out of 5 stars  See all reviews (41 customer reviews)
RRP: 42.50
Price: 27.63 & FREE Delivery in the UK. Details
You Save: 14.87 (35%)
o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o
Only 5 left in stock (more on the way).
Dispatched from and sold by Amazon. Gift-wrap available.
Want it tomorrow, 15 July? Choose Express delivery at checkout. Details

Formats

Amazon Price New from Used from
Kindle Edition 26.25  
Hardcover --  
Paperback 27.63  
Trade In this Item for up to 3.75
Trade in Applied Cryptography: Protocols, Algorithms and Source Code in C (Computer Science) for an Amazon Gift Card of up to 3.75, which you can then spend on millions of items across the site. Trade-in values may vary (terms apply). Learn more

Book Description

16 Nov 1995 0471117099 978-0471117094 2nd Edition
". . .the best introduction to cryptography I′ve ever seen. . . . The book the National Security Agency wanted never to be published. . . ." –Wired Magazine ". . .monumental . . . fascinating . . . comprehensive . . . the definitive work on cryptography for computer programmers . . ." –Dr. Dobb′s Journal ". . .easily ranks as one of the most authoritative in its field." –PC Magazine ". . .the bible of code hackers." –The Millennium Whole Earth Catalog This new edition of the cryptography classic provides you with a comprehensive survey of modern cryptography. The book details how programmers and electronic communications professionals can use cryptography–the technique of enciphering and deciphering messages–to maintain the privacy of computer data. It describes dozens of cryptography algorithms, gives practical advice on how to implement them into cryptographic software, and shows how they can be used to solve security problems. Covering the latest developments in practical cryptographic techniques, this new edition shows programmers who design computer applications, networks, and storage systems how they can build security into their software and systems. What′s new in the Second Edition? ∗ New information on the Clipper Chip, including ways to defeat the key escrow mechanism ∗ New encryption algorithms, including algorithms from the former Soviet Union and South Africa, and the RC4 stream cipher ∗ The latest protocols for digital signatures, authentication, secure elections, digital cash, and more ∗ More detailed information on key management and cryptographic implementations

Special Offers and Product Promotions

  • Spend 30 and get Norton 360 21.0 - 3 Computers, 1 Year 2014 for 24.99. Here's how (terms and conditions apply)

Frequently Bought Together

Applied Cryptography: Protocols, Algorithms and Source Code in C (Computer Science) + Cryptography Engineering: Design Principles and Practical Applications + Cryptography: A Very Short Introduction (Very Short Introductions)
Price For All Three: 57.26

Buy the selected items together


Product details

  • Paperback: 784 pages
  • Publisher: John Wiley & Sons; 2nd Edition edition (16 Nov 1995)
  • Language: English
  • ISBN-10: 0471117099
  • ISBN-13: 978-0471117094
  • Product Dimensions: 23.5 x 18.6 x 4.2 cm
  • Average Customer Review: 4.7 out of 5 stars  See all reviews (41 customer reviews)
  • Amazon Bestsellers Rank: 131,385 in Books (See Top 100 in Books)
  • See Complete Table of Contents

More About the Author

Bruce Schneier is the go-to security expert for business leaders and policy makers. His breakthrough book Applied Cryptography (1994, 1998) explained how the arcane science of secret codes actually works, and was described by Wired as "the book the National Security Agency wanted never to be published." His business-oriented bestseller Secrets and Lies (2000) was called by Fortune "[a] jewel box of little surprises you can actually use." Best known as a refreshingly candid and lucid security critic and commentator, he has appeared in numerous media outlets, including The New York Times, USA Today, Newsweek, and The Wall Street Journal, as well as on NPR, CNN, and the major networks. He has also testified on security before the United States Congress.

Product Description

Review

"the definitive publicly available text on the theory and practice of cryptography" (Computer Shopper, January 2002)

From the Back Cover

". . .the best introduction to cryptography I′ve ever seen. . . .The book the National Security Agency wanted never to be published. . . ." –Wired Magazine ". . .monumental . . . fascinating . . . comprehensive . . . the definitive work on cryptography for computer programmers . . ." –Dr. Dobb′s Journal ". . .easily ranks as one of the most authoritative in its field." –PC Magazine ". . .the bible of code hackers." –The Millennium Whole Earth Catalog This new edition of the cryptography classic provides you with a comprehensive survey of modern cryptography. The book details how programmers and electronic communications professionals can use cryptography–the technique of enciphering and deciphering messages–to maintain the privacy of computer data. It describes dozens of cryptography algorithms, gives practical advice on how to implement them into cryptographic software, and shows how they can be used to solve security problems. Covering the latest developments in practical cryptographic techniques, this new edition shows programmers who design computer applications, networks, and storage systems how they can build security into their software and systems. What′s new in the Second Edition? ∗ New information on the Clipper Chip, including ways to defeat the key escrow mechanism ∗ New encryption algorithms, including algorithms from the former Soviet Union and South Africa, and the RC4 stream cipher ∗ The latest protocols for digital signatures, authentication, secure elections, digital cash, and more ∗ More detailed information on key management and cryptographic implementations

Inside This Book (Learn More)
First Sentence
Suppose a sender wants to send a message to a receiver. Read the first page
Explore More
Concordance
Browse Sample Pages
Front Cover | Copyright | Table of Contents | Excerpt | Index | Back Cover
Search inside this book:


Customer Reviews

Most Helpful Customer Reviews
27 of 28 people found the following review helpful
By A Customer
Format:Paperback
If you are already a cryppie or other security professional, this book will not add much to your knowledge. But if you are a programmer or other systems person with a desire to familiarize yourself with the field, I can't recommend this book highly enough. A reasonably solid mathematical background is required to fully understand the algorithms, but the book is structured in such a way that you can skip most of the heavily technical stuff and still get a lot out of the read.
Because this is essentially an introductory text, generality is the name of the game. Pretty much everything is covered, but to a low, or medium at best, degree of depth. (Only DES is covered thoroughly.) However, the reference list in the back is huge, and you can use it to easily track down any more detailed information that you're after.
Comment | 
Was this review helpful to you?
17 of 18 people found the following review helpful
5.0 out of 5 stars An excellent introduction 30 May 2000
By A Customer
Format:Paperback
This is without a doubt the best book to introduce anyone to cryptography on a detailed level, providing readable definitions of protocols, and a valuable mathematical introduction to help you keep your head above the water. If you have a solid mathematical base and crypto knowledge, the Handbook of Applied Cryptography would be a better reference, but for the rest of us, Applied Cryptography is superb.
Comment | 
Was this review helpful to you?
5 of 5 people found the following review helpful
5.0 out of 5 stars Soon time for third edition? 21 Feb 2007
Format:Paperback
The book is not for the average reader, you must be proficient with code and have a basic grasp of the math behind public key cryptography. The author is doing an excellent job at tryng to explain and simplify, so for the experienced coder it should be a fairly easy read.

The collection of algorithms is impressive and the analysis of them is thorough. Since quite a few were added between the first edition and second, I cannot but help thinking a third edition should be due soon.

I'd say this is good value for the money and a must have for anyone thinking of doing any coding related to (public key and other) cryptography.
Comment | 
Was this review helpful to you?
13 of 14 people found the following review helpful
5.0 out of 5 stars An true all-rounder. 25 Nov 2000
Format:Paperback
This book supplies information at all levels. I am a computer scientist with a poor mathmatical background- it managed to explain the maths in a simple and methodical way. It also includes brief insights into quantum mechanics. A truly brilliant book for technical people from all disciplines and at all levels.
Comment | 
Was this review helpful to you?
3 of 3 people found the following review helpful
5.0 out of 5 stars Brilliant! 8 Jun 2000
Format:Paperback
I am an experienced networking guy with a need to understand security. This book has a lot of stuff I didn't actually need but it had a lot more that I did. It's very well written and readable and spends far more time on my desk than my bookshelf. As an essential reference for a networking guy, this book is on a par with that standard, "Internetworking with TCP/IP" by Comer. In a word, "Brilliant".
Comment | 
Was this review helpful to you?
2 of 2 people found the following review helpful
4.0 out of 5 stars A little disappointing 2 Nov 2011
Format:Paperback|Verified Purchase
Bruce Schneier is one of the most respected persons in the field of cryptography.
His work provides a good in-depth description of crypto protocols, signature systems, hashing & digests
and some of the well-known cipher systems (at the time of publication).
His presentation of the material is well balanced between concept & mathematical description.
Unfortunately due to both space restrictions & the US embargo on exporting crypto material there is a limit on how much
source code could be included in the book. I would have liked to see source code for
hashing & signatures.
Schneier offers discs with much more source but they can only be legally provided
to residents of the US & Canada thus I have to reduce my overall rating of this fine work to four stars.
Nevertheless as a reference on crypto algorithms & protocols, this remains a fine work.
Comment | 
Was this review helpful to you?
1 of 1 people found the following review helpful
4.0 out of 5 stars Old but must have 17 May 2011
Format:Paperback
Great book, but it's a bit old. I recomend it though. It's good for learning the basics about cryptography and has very good recources if you want to dig in more!
Comment | 
Was this review helpful to you?
5 of 6 people found the following review helpful
4.0 out of 5 stars Best in the field 6 Aug 2004
By "jb-b"
Format:Paperback
This book is an excellent, in-depth guide to cryptography. It is an excellent starting point for a beginner, and is not stuffed with filler pages like so many technical books these days. It includes especially clear coverage of public-key cryptography, and the source code is a welcome bonus.
The only qualms I had was that despite advertising "Protocols, Algorithms and Source Code in C" the book includes only source code right at the very end, to a handful of encryption algorithms. Also, it does not discuss the AES, which I would have liked.
Nonetheless, an excellent books - a necessity for anyone interested in cryptography.
Comment | 
Was this review helpful to you?
Would you like to see more reviews about this item?
Were these reviews helpful?   Let us know
Most Recent Customer Reviews
Search Customer Reviews
Only search this product's reviews

Customer Discussions

This product's forum
Discussion Replies Latest Post
No discussions yet

Ask questions, Share opinions, Gain insight
Start a new discussion
Topic:
First post:
Prompts for sign-in
 

Search Customer Discussions
Search all Amazon discussions
   


Look for similar items by category


Feedback