- Also check our best rated Food Supplement reviews
Other Sellers on Amazon
+ £2.80 UK delivery
+ £2.80 UK delivery
Applied Cryptography: Protocols, Algorithms and Source Code in C
|Price:||£26.81 (£26.81 / kg) & FREE Delivery in the UK. Delivery Details|
|You Save:||£23.19 (46%)|
- Choose from over 13,000 locations across the UK
- Prime members get unlimited deliveries at no additional cost
- Find your preferred location and add it to your address book
- Dispatch to this address when you check out
- Douglas Zinc Lozenges contains zinc from zinc glycinate
- Each serving contains 10 mg zinc
- Take 1 - 3 lozenges daily
There is a newer version of this item:
Frequently bought together
Customers who bought this item also bought
Legal DisclaimerUnless expressly indicated in the product description, Amazon.co.uk is not the manufacturer of the products sold on our website. While we work to ensure that product information on our website is correct, manufacturers may alter their product information. Actual product packaging and materials may contain more and/or different information than shown on our website. You should always read the labels, warnings and instructions provided with the product before using or consuming it and not solely rely on the information presented on our website. If you have any specific product queries, please contact the manufacturer. This notice does not affect your legal rights.
". . .the best introduction to cryptography I′ve ever seen. . . . The book the National Security Agency wanted never to be published. . . ." –Wired Magazine
". . .monumental . . . fascinating . . . comprehensive . . . the definitive work on cryptography for computer programmers . . ." –Dr. Dobb′s Journal
". . .easily ranks as one of the most authoritative in its field." –PC Magazine
". . .the bible of code hackers." –The Millennium Whole Earth Catalog
This new edition of the cryptography classic provides you with a comprehensive survey of modern cryptography. The book details how programmers and electronic communications professionals can use cryptography–the technique of enciphering and deciphering messages–to maintain the privacy of computer data. It describes dozens of cryptography algorithms, gives practical advice on how to implement them into cryptographic software, and shows how they can be used to solve security problems. Covering the latest developments in practical cryptographic techniques, this new edition shows programmers who design computer applications, networks, and storage systems how they can build security into their software and systems.
What′s new in the Second Edition?
∗ New information on the Clipper Chip, including ways to defeat the key escrow mechanism
∗ New encryption algorithms, including algorithms from the former Soviet Union and South Africa, and the RC4 stream cipher
∗ The latest protocols for digital signatures, authentication, secure elections, digital cash, and more
∗ More detailed information on key management and cryptographic implementations
"the definitive publicly available text on the theory and practice of cryptography" (Computer Shopper, January 2002)See all Product description
What do customers buy after viewing this item?
Top Customer Reviews
Because this is essentially an introductory text, generality is the name of the game. Pretty much everything is covered, but to a low, or medium at best, degree of depth. (Only DES is covered thoroughly.) However, the reference list in the back is huge, and you can use it to easily track down any more detailed information that you're after.
Most of us should know better than to make our own implementations of crypto algorithms. Today, it makes more sense to use tried-and-true libraries than to reinvent the wheel. I wouldn't use the book for its original purpose, but I still find it quite relevant to understand the basic concepts (and some history).
It is highly dated. In 1996, the world was different. DES was still quite used, and the Clipper Chip was a current threat. Nobody talked about AES/Rijndael, and MD5 was already suspected to be insecure, though not yet as blatantly as today.
This is not a good reference on how to do crypto in 2017. This is a good reference on what crypto is, what the basic concepts are about, and how they work.
Buy this book if you are entering the world of crypto and want to have a holistic view of what it is about (symmetric/public-key cryptography; hashes; MACs; secret sharing, digital certificates, even digital cash.....). Do not buy this book if you need to learn current-day algorithms like AES or SHA-2 (SHA-1 is included, and considered secure back then).
I found the book still worth my time and money. I'm now looking for similar, but updated books, and for the mathematical aspects of cryptography, I recommend Dan Boneh's (incredibly difficult) cryptography course in Coursera. All together, they are hard to beat. Do not focus all your energy on this book - but don't disregard it either.
The collection of algorithms is impressive and the analysis of them is thorough. Since quite a few were added between the first edition and second, I cannot but help thinking a third edition should be due soon.
I'd say this is good value for the money and a must have for anyone thinking of doing any coding related to (public key and other) cryptography.
His work provides a good in-depth description of crypto protocols, signature systems, hashing & digests
and some of the well-known cipher systems (at the time of publication).
His presentation of the material is well balanced between concept & mathematical description.
Unfortunately due to both space restrictions & the US embargo on exporting crypto material there is a limit on how much
source code could be included in the book. I would have liked to see source code for
hashing & signatures.
Schneier offers discs with much more source but they can only be legally provided
to residents of the US & Canada thus I have to reduce my overall rating of this fine work to four stars.
Nevertheless as a reference on crypto algorithms & protocols, this remains a fine work.
The first third covers, in reasonably technical detail, the theory and mathematical implementation of cryptosystems. Much of this isn't necessary for the casual reader, but its the clearest explanation of this arcane stuff you're going to find anywhere.
The second third covers real-world applications of cryptosystems - electronic voting, cyber-money, key management and a thousand other inventive uses. Sufficiently non-technical for even a salesman to understand.
The last third covers the politics of modern encryption, and is more intriguing, exciting and informative than any Tom Clancy novel. This last part alone is worth the price of the book.
Schneier's writing style is informal, informative and often humourous. It's hard to believe anyone can write about such a (potentially) dry subject and yet include some genuine jokes!
Buy this book.
Most Recent Customer Reviews
I think this book might have been great, but today, it shouldn't be considered more than a historical document. Read morePublished 16 months ago by Amazon Customer
A great review of a wide range of techniques expressed in easy to follow language with references to further reading.Published on 15 Mar. 2013 by Velvetytoast
One of the must-have books about cryptography written by one of the best experts in security around the world. Read morePublished on 30 Dec. 2011 by Amazon Customer
Great book, but it's a bit old. I recomend it though. It's good for learning the basics about cryptography and has very good recources if you want to dig in more!Published on 17 May 2011 by Spyrou Mixalis
This book is an excellent, in-depth guide to cryptography. It is an excellent starting point for a beginner, and is not stuffed with filler pages like so many technical books these... Read morePublished on 6 Aug. 2004
I read this book from cover to cover while on holiday. I was astonished at the number of ways ways in which cryptography can be applied. Read morePublished on 28 April 2003 by Britabroad
The book is well structured, but very difficult, you have to have a lot of background maths before you can understand it, i am studying at university, but i am finding it hard to... Read morePublished on 21 Mar. 2002