Applied Cryptography: Protocols, Algorithms, and Source C... and over 2 million other books are available for Amazon Kindle . Learn more
£24.27
  • RRP: £42.50
  • You Save: £18.23 (43%)
FREE Delivery in the UK.
Only 15 left in stock (more on the way).
Dispatched from and sold by Amazon.
Gift-wrap available.
Quantity:1
Applied Cryptography: Pro... has been added to your Basket
Trade in your item
Get a £4.55
Gift Card.
Have one to sell?
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more
See this image

Applied Cryptography: Protocols, Algorithms and Source Code in C (Computer Science) Paperback – 16 Nov 1995


See all 5 formats and editions Hide other formats and editions
Amazon Price New from Used from
Kindle Edition
"Please retry"
Paperback
"Please retry"
£24.27
£20.99 £12.41
£24.27 FREE Delivery in the UK. Only 15 left in stock (more on the way). Dispatched from and sold by Amazon. Gift-wrap available.

Frequently Bought Together

Applied Cryptography: Protocols, Algorithms and Source Code in C (Computer Science) + Cryptography Engineering: Design Principles and Practical Applications + Cryptography: A Very Short Introduction (Very Short Introductions)
Price For All Three: £54.70

Buy the selected items together



Trade In this Item for up to £4.55
Trade in Applied Cryptography: Protocols, Algorithms and Source Code in C (Computer Science) for an Amazon Gift Card of up to £4.55, which you can then spend on millions of items across the site. Trade-in values may vary (terms apply). Learn more

Product details

  • Paperback: 784 pages
  • Publisher: John Wiley & Sons; 2nd Edition edition (16 Nov 1995)
  • Language: English
  • ISBN-10: 0471117099
  • ISBN-13: 978-0471117094
  • Product Dimensions: 18.8 x 4.4 x 23.6 cm
  • Average Customer Review: 4.7 out of 5 stars  See all reviews (42 customer reviews)
  • Amazon Bestsellers Rank: 38,616 in Books (See Top 100 in Books)
  • See Complete Table of Contents

More About the Author

Bruce Schneier is the go-to security expert for business leaders and policy makers. His breakthrough book Applied Cryptography (1994, 1998) explained how the arcane science of secret codes actually works, and was described by Wired as "the book the National Security Agency wanted never to be published." His business-oriented bestseller Secrets and Lies (2000) was called by Fortune "[a] jewel box of little surprises you can actually use." Best known as a refreshingly candid and lucid security critic and commentator, he has appeared in numerous media outlets, including The New York Times, USA Today, Newsweek, and The Wall Street Journal, as well as on NPR, CNN, and the major networks. He has also testified on security before the United States Congress.

Product Description

Review

"the definitive publicly available text on the theory and practice of cryptography" (Computer Shopper, January 2002)

From the Back Cover

". . .the best introduction to cryptography I′ve ever seen. . . .The book the National Security Agency wanted never to be published. . . ." –Wired Magazine ". . .monumental . . . fascinating . . . comprehensive . . . the definitive work on cryptography for computer programmers . . ." –Dr. Dobb′s Journal ". . .easily ranks as one of the most authoritative in its field." –PC Magazine ". . .the bible of code hackers." –The Millennium Whole Earth Catalog This new edition of the cryptography classic provides you with a comprehensive survey of modern cryptography. The book details how programmers and electronic communications professionals can use cryptography–the technique of enciphering and deciphering messages–to maintain the privacy of computer data. It describes dozens of cryptography algorithms, gives practical advice on how to implement them into cryptographic software, and shows how they can be used to solve security problems. Covering the latest developments in practical cryptographic techniques, this new edition shows programmers who design computer applications, networks, and storage systems how they can build security into their software and systems. What′s new in the Second Edition? ∗ New information on the Clipper Chip, including ways to defeat the key escrow mechanism ∗ New encryption algorithms, including algorithms from the former Soviet Union and South Africa, and the RC4 stream cipher ∗ The latest protocols for digital signatures, authentication, secure elections, digital cash, and more ∗ More detailed information on key management and cryptographic implementations

Inside This Book (Learn More)
First Sentence
Suppose a sender wants to send a message to a receiver. Read the first page
Explore More
Concordance
Browse Sample Pages
Front Cover | Copyright | Table of Contents | Excerpt | Index | Back Cover
Search inside this book:

Customer Reviews

4.7 out of 5 stars
Share your thoughts with other customers

Most Helpful Customer Reviews

27 of 28 people found the following review helpful By A Customer on 21 Jan 1999
Format: Paperback
If you are already a cryppie or other security professional, this book will not add much to your knowledge. But if you are a programmer or other systems person with a desire to familiarize yourself with the field, I can't recommend this book highly enough. A reasonably solid mathematical background is required to fully understand the algorithms, but the book is structured in such a way that you can skip most of the heavily technical stuff and still get a lot out of the read.
Because this is essentially an introductory text, generality is the name of the game. Pretty much everything is covered, but to a low, or medium at best, degree of depth. (Only DES is covered thoroughly.) However, the reference list in the back is huge, and you can use it to easily track down any more detailed information that you're after.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
17 of 18 people found the following review helpful By A Customer on 30 May 2000
Format: Paperback
This is without a doubt the best book to introduce anyone to cryptography on a detailed level, providing readable definitions of protocols, and a valuable mathematical introduction to help you keep your head above the water. If you have a solid mathematical base and crypto knowledge, the Handbook of Applied Cryptography would be a better reference, but for the rest of us, Applied Cryptography is superb.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
5 of 5 people found the following review helpful By Amazon Customer on 21 Feb 2007
Format: Paperback
The book is not for the average reader, you must be proficient with code and have a basic grasp of the math behind public key cryptography. The author is doing an excellent job at tryng to explain and simplify, so for the experienced coder it should be a fairly easy read.

The collection of algorithms is impressive and the analysis of them is thorough. Since quite a few were added between the first edition and second, I cannot but help thinking a third edition should be due soon.

I'd say this is good value for the money and a must have for anyone thinking of doing any coding related to (public key and other) cryptography.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
13 of 14 people found the following review helpful By bigdan246@aol.com on 25 Nov 2000
Format: Paperback
This book supplies information at all levels. I am a computer scientist with a poor mathmatical background- it managed to explain the maths in a simple and methodical way. It also includes brief insights into quantum mechanics. A truly brilliant book for technical people from all disciplines and at all levels.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
3 of 3 people found the following review helpful By dave.mcwilliam@towienet.co.uk on 8 Jun 2000
Format: Paperback
I am an experienced networking guy with a need to understand security. This book has a lot of stuff I didn't actually need but it had a lot more that I did. It's very well written and readable and spends far more time on my desk than my bookshelf. As an essential reference for a networking guy, this book is on a par with that standard, "Internetworking with TCP/IP" by Comer. In a word, "Brilliant".
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
1 of 1 people found the following review helpful By A Customer on 16 Oct 1998
Format: Paperback
An excellent, informative and entertaining introduction to this field.
The first third covers, in reasonably technical detail, the theory and mathematical implementation of cryptosystems. Much of this isn't necessary for the casual reader, but its the clearest explanation of this arcane stuff you're going to find anywhere.
The second third covers real-world applications of cryptosystems - electronic voting, cyber-money, key management and a thousand other inventive uses. Sufficiently non-technical for even a salesman to understand.
The last third covers the politics of modern encryption, and is more intriguing, exciting and informative than any Tom Clancy novel. This last part alone is worth the price of the book.
Schneier's writing style is informal, informative and often humourous. It's hard to believe anyone can write about such a (potentially) dry subject and yet include some genuine jokes!
Buy this book.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
2 of 2 people found the following review helpful By S Foster on 2 Nov 2011
Format: Paperback Verified Purchase
Bruce Schneier is one of the most respected persons in the field of cryptography.
His work provides a good in-depth description of crypto protocols, signature systems, hashing & digests
and some of the well-known cipher systems (at the time of publication).
His presentation of the material is well balanced between concept & mathematical description.
Unfortunately due to both space restrictions & the US embargo on exporting crypto material there is a limit on how much
source code could be included in the book. I would have liked to see source code for
hashing & signatures.
Schneier offers discs with much more source but they can only be legally provided
to residents of the US & Canada thus I have to reduce my overall rating of this fine work to four stars.
Nevertheless as a reference on crypto algorithms & protocols, this remains a fine work.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
5 of 6 people found the following review helpful By "jb-b" on 6 Aug 2004
Format: Paperback
This book is an excellent, in-depth guide to cryptography. It is an excellent starting point for a beginner, and is not stuffed with filler pages like so many technical books these days. It includes especially clear coverage of public-key cryptography, and the source code is a welcome bonus.
The only qualms I had was that despite advertising "Protocols, Algorithms and Source Code in C" the book includes only source code right at the very end, to a handful of encryption algorithms. Also, it does not discuss the AES, which I would have liked.
Nonetheless, an excellent books - a necessity for anyone interested in cryptography.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again


Feedback