Applied Cryptography: Pro... has been added to your Basket

Dispatch to:
To see addresses, please
Or
Please enter a valid UK postcode.
Or
FREE Delivery in the UK on orders over £20. Details
Open Box: Very Good | Details
Sold by Big-Market
Condition: Open Box: Very Good
Other Sellers on Amazon
Add to Basket
£26.81 (£26.81 / kg)
Eligible for FREE UK Delivery Details
Sold by: Essjays Enterprises Ltd
Add to Basket
£24.98 (£24.98 / kg)
+ £2.80 UK delivery
Sold by: Book Depository
Add to Basket
£26.53 (£26.53 / kg)
+ £2.80 UK delivery
Sold by: UKPaperbackshop

Applied Cryptography: Protocols, Algorithms and Source Code in C

4.6 out of 5 stars 45 customer reviews

RRP: £50.00
Price: £26.81 (£26.81 / kg) & FREE Delivery in the UK. Delivery Details
You Save: £23.19 (46%)
Only 11 left in stock (more on the way).
Dispatched from and sold by Amazon. Gift-wrap available.
Note: This item is eligible for click and collect. Details
Pick up your parcel at a time and place that suits you.
  • Choose from over 13,000 locations across the UK
  • Prime members get unlimited deliveries at no additional cost
How to order to an Amazon Pickup Location?
  1. Find your preferred location and add it to your address book
  2. Dispatch to this address when you check out
Learn more
20 new from £21.84 11 open box from £14.19
  • Douglas Zinc Lozenges contains zinc from zinc glycinate
  • Each serving contains 10 mg zinc
  • Take 1 - 3 lozenges daily

There is a newer version of this item:

£26.81 (£26.81 / kg) & FREE Delivery in the UK. Delivery Details Only 11 left in stock (more on the way). Dispatched from and sold by Amazon. Gift-wrap available.

Frequently bought together

  • Applied Cryptography: Protocols, Algorithms and Source Code in C
  • +
  • Rtfm: Red Team Field Manual
Total price: £31.75
Buy the selected items together

Special offers and product promotions


Important information

Legal Disclaimer
Unless expressly indicated in the product description, Amazon.co.uk is not the manufacturer of the products sold on our website. While we work to ensure that product information on our website is correct, manufacturers may alter their product information. Actual product packaging and materials may contain more and/or different information than shown on our website. You should always read the labels, warnings and instructions provided with the product before using or consuming it and not solely rely on the information presented on our website. If you have any specific product queries, please contact the manufacturer. This notice does not affect your legal rights.

Product description

Product Description

". . .the best introduction to cryptography I′ve ever seen. . . . The book the National Security Agency wanted never to be published. . . ." –Wired Magazine

". . .monumental . . . fascinating . . . comprehensive . . . the definitive work on cryptography for computer programmers . . ." –Dr. Dobb′s Journal

". . .easily ranks as one of the most authoritative in its field." –PC Magazine

". . .the bible of code hackers." –The Millennium Whole Earth Catalog

This new edition of the cryptography classic provides you with a comprehensive survey of modern cryptography. The book details how programmers and electronic communications professionals can use cryptography–the technique of enciphering and deciphering messages–to maintain the privacy of computer data. It describes dozens of cryptography algorithms, gives practical advice on how to implement them into cryptographic software, and shows how they can be used to solve security problems. Covering the latest developments in practical cryptographic techniques, this new edition shows programmers who design computer applications, networks, and storage systems how they can build security into their software and systems.

What′s new in the Second Edition?
∗ New information on the Clipper Chip, including ways to defeat the key escrow mechanism
∗ New encryption algorithms, including algorithms from the former Soviet Union and South Africa, and the RC4 stream cipher
∗ The latest protocols for digital signatures, authentication, secure elections, digital cash, and more
∗ More detailed information on key management and cryptographic implementations

Review

"the definitive publicly available text on the theory and practice of cryptography" (Computer Shopper, January 2002)

See all Product description

Product information

Product NameHEALTH_PERSONAL_CARE
Weight1 Kilograms
Location Produced InUSA
BrandDouglas Laboratories
  
Additional Information
ASIN0471117099
Best Sellers Rank 96,732 in Health & Personal Care (See top 100)
Shipping Weight1.2 Kg
Delivery Destinations:Visit the Delivery Destinations Help page to see where this item can be delivered.
Date First Available30 Sept. 2006
  
 

What do customers buy after viewing this item?


Customer Questions & Answers

Customer Reviews

Top Customer Reviews

Format: Paperback
If you are already a cryppie or other security professional, this book will not add much to your knowledge. But if you are a programmer or other systems person with a desire to familiarize yourself with the field, I can't recommend this book highly enough. A reasonably solid mathematical background is required to fully understand the algorithms, but the book is structured in such a way that you can skip most of the heavily technical stuff and still get a lot out of the read.
Because this is essentially an introductory text, generality is the name of the game. Pretty much everything is covered, but to a low, or medium at best, degree of depth. (Only DES is covered thoroughly.) However, the reference list in the back is huge, and you can use it to easily track down any more detailed information that you're after.
Comment 27 people found this helpful. Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
Format: Hardcover
This book is directed at people who implement crypto. It's more for engineers than for academics.
Most of us should know better than to make our own implementations of crypto algorithms. Today, it makes more sense to use tried-and-true libraries than to reinvent the wheel. I wouldn't use the book for its original purpose, but I still find it quite relevant to understand the basic concepts (and some history).

It is highly dated. In 1996, the world was different. DES was still quite used, and the Clipper Chip was a current threat. Nobody talked about AES/Rijndael, and MD5 was already suspected to be insecure, though not yet as blatantly as today.

This is not a good reference on how to do crypto in 2017. This is a good reference on what crypto is, what the basic concepts are about, and how they work.

Buy this book if you are entering the world of crypto and want to have a holistic view of what it is about (symmetric/public-key cryptography; hashes; MACs; secret sharing, digital certificates, even digital cash.....). Do not buy this book if you need to learn current-day algorithms like AES or SHA-2 (SHA-1 is included, and considered secure back then).

I found the book still worth my time and money. I'm now looking for similar, but updated books, and for the mathematical aspects of cryptography, I recommend Dan Boneh's (incredibly difficult) cryptography course in Coursera. All together, they are hard to beat. Do not focus all your energy on this book - but don't disregard it either.
Comment One person found this helpful. Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
By A Customer on 30 May 2000
Format: Paperback
This is without a doubt the best book to introduce anyone to cryptography on a detailed level, providing readable definitions of protocols, and a valuable mathematical introduction to help you keep your head above the water. If you have a solid mathematical base and crypto knowledge, the Handbook of Applied Cryptography would be a better reference, but for the rest of us, Applied Cryptography is superb.
Comment 17 people found this helpful. Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
Format: Paperback
The book is not for the average reader, you must be proficient with code and have a basic grasp of the math behind public key cryptography. The author is doing an excellent job at tryng to explain and simplify, so for the experienced coder it should be a fairly easy read.

The collection of algorithms is impressive and the analysis of them is thorough. Since quite a few were added between the first edition and second, I cannot but help thinking a third edition should be due soon.

I'd say this is good value for the money and a must have for anyone thinking of doing any coding related to (public key and other) cryptography.
Comment 5 people found this helpful. Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
Format: Paperback
This book supplies information at all levels. I am a computer scientist with a poor mathmatical background- it managed to explain the maths in a simple and methodical way. It also includes brief insights into quantum mechanics. A truly brilliant book for technical people from all disciplines and at all levels.
Comment 13 people found this helpful. Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
Format: Paperback Verified Purchase
Bruce Schneier is one of the most respected persons in the field of cryptography.
His work provides a good in-depth description of crypto protocols, signature systems, hashing & digests
and some of the well-known cipher systems (at the time of publication).
His presentation of the material is well balanced between concept & mathematical description.
Unfortunately due to both space restrictions & the US embargo on exporting crypto material there is a limit on how much
source code could be included in the book. I would have liked to see source code for
hashing & signatures.
Schneier offers discs with much more source but they can only be legally provided
to residents of the US & Canada thus I have to reduce my overall rating of this fine work to four stars.
Nevertheless as a reference on crypto algorithms & protocols, this remains a fine work.
Comment 2 people found this helpful. Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
Format: Paperback
I am an experienced networking guy with a need to understand security. This book has a lot of stuff I didn't actually need but it had a lot more that I did. It's very well written and readable and spends far more time on my desk than my bookshelf. As an essential reference for a networking guy, this book is on a par with that standard, "Internetworking with TCP/IP" by Comer. In a word, "Brilliant".
Comment 3 people found this helpful. Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
Format: Paperback
An excellent, informative and entertaining introduction to this field.
The first third covers, in reasonably technical detail, the theory and mathematical implementation of cryptosystems. Much of this isn't necessary for the casual reader, but its the clearest explanation of this arcane stuff you're going to find anywhere.
The second third covers real-world applications of cryptosystems - electronic voting, cyber-money, key management and a thousand other inventive uses. Sufficiently non-technical for even a salesman to understand.
The last third covers the politics of modern encryption, and is more intriguing, exciting and informative than any Tom Clancy novel. This last part alone is worth the price of the book.
Schneier's writing style is informal, informative and often humourous. It's hard to believe anyone can write about such a (potentially) dry subject and yet include some genuine jokes!
Buy this book.
Comment One person found this helpful. Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse

Most Recent Customer Reviews



Amazon EU S.a.r.l. is certified organic according to EU Organic Food regulations by the control body LU-BIO-04
Disclaimer: While we work to ensure that product information on our website is correct, on occasion manufacturers may alter their ingredient lists. Actual product packaging and materials may contain more and/or different information than that shown on our website. All information about the products on our website is provided for information purposes only. We recommend that you do not solely rely on the information presented on our website. Please always read the labels, warnings, and directions provided with the product before using or consuming a product. In the event of any safety concerns or for any other information about a product please carefully read any instructions provided on the label or packaging and contact the manufacturer. Content on this site is not intended to substitute for advice given by medical practitioner, pharmacist, or other licensed health-care professional. Contact your health-care provider immediately if you suspect that you have a medical problem. Information and statements about products are not intended to be used to diagnose, treat, cure, or prevent any disease or health condition. Amazon.co.uk accepts no liability for inaccuracies or misstatements about products by manufacturers or other third parties. This does not affect your statutory rights.