Applied Cryptography - Protocols, Algorithms, and Source Code in C (1996)
Front Cover Book Details
Author
Bruce Schneier
Genre Cryptology
Publication Date 1996
Format Paperback (240 x mm)
Publisher John Wiley & Sons
Language English
Plot
Fatbrain Review
One sci.crypt poster called Schneier's book the "de facto standard reference on modern cryptography" and now this 1993 classic is back in an up-to-the-minute second edition tracing the history of cryptography from the first use of computers to break German and Japanese ciphers in WWII to the implications and issues raised with the use of modern algorithms. As well as a historical tome, the book is a comprehensive rundown on the science of cryptography, with basic explanations of cryptographic protocols and techniques followed by a thorough examination of cryptography implementation in the real world. Author Schneier also turns the book into something of a code encyclopedia with descriptions and assessments of just about every cryptography system developed since computers were first applied to code. But what really impresses readers is Schneier's style, which transforms an esoteric topic understood by only techies into a book which anyone can read and understand, regardless of their mathematical background. In fact, Schneier condenses the necessary math background into one user-friendly chapter covering topics like complexity theory, number theory, factoring, and modular arithmetic. The sections dealing with the politics of encryption and real-world crypto implementation are also noted for clear-headed discussions of controversial topics like the U.S. government's interest in encryption. Any reader looking for a better understanding of cryptography will find a treasured read in Applied Cryptography.

Annotation
Updated and expanded, this classic programming guide and reference reviews cryptographic protocols and programming techniques. This is not a historical narrative on the science of cryptography like Dr. Kahn's formidable and definitive opus The Code-Breakers. This is a practical guide in which author Bruce Schneier distills theory, protocols and C algorithms for applications. For best understanding, you should have some familiarity with cryptography, cryptographic algorithms and C code.

Amazon.com
Cryptographic techniques have applications far beyond the obvious uses of encoding and decoding information. For Internet developers who need to know about capabilities, such as digital signatures, that depend on cryptographic techniques, there's no better overview than Applied Cryptography, the definitive book on the subject. Bruce Schneier covers general classes of cryptographic protocols and then specific techniques, detailing the inner workings of real-world cryptographic algorithms including the Data Encryption Standard and RSA public-key cryptosystems. The book includes source-code listings and extensive advice on the practical aspects of cryptography implementation, such as the importance of generating truly random numbers and of keeping keys secure.

From Book News, Inc.
The classic guide to using cryptography to maintain data security, first published in 1994, and an instant best-seller among hackers. It describes dozens of cryptography algorithms, gives practical advice on how to implement them into cryptographic software, and shows how they can be used to solve security problems. This edition covers the latest protocols and algorithms to implement a variety of encryptions. For programmers and electronic communications professionals. Annotation copyright Book News, Inc. Portland, Or.

Book Description
". . .the best introduction to cryptography I've ever seen. . . .The book the National Security Agency wanted never to be published. . . ." -Wired Magazine

". . .monumental . . . fascinating . . . comprehensive . . . the definitive work on cryptography for computer programmers . . ." -Dr. Dobb's Journal

". . .easily ranks as one of the most authoritative in its field." -PC Magazine

". . .the bible of code hackers." -The Millennium Whole Earth Catalog

This new edition of the cryptography classic provides you with a comprehensive survey of modern cryptography. The book details how programmers and electronic communications professionals can use cryptography-the technique of enciphering and deciphering messages-to maintain the privacy of computer data. It describes dozens of cryptography algorithms, gives practical advice on how to implement them into cryptographic software, and shows how they can be used to solve security problems. Covering the latest developments in practical cryptographic techniques, this new edition shows programmers who design computer applications, networks, and storage systems how they can build security into their software and systems.

What's new in the Second Edition? * New information on the Clipper Chip, including ways to defeat the key escrow mechanism * New encryption algorithms, including algorithms from the former Soviet Union and South Africa, and the RC4 stream cipher * The latest protocols for digital signatures, authentication, secure elections, digital cash, and more * More detailed information on key management and cryptographic implementations

Ingram
Provides a comprehensive, up-to-date survey of modern cryptographic terms and techniques, along with practical advice on how to implement a wide variety of impenetrable encryptions, including algorithms and source code. (Advanced).

Back Cover Copy
". . .the best introduction to cryptography I've ever seen. . . .The book the National Security Agency wanted never to be published. . . ." —Wired Magazine

". . .monumental . . . fascinating . . . comprehensive . . . the definitive work on cryptography for computer programmers . . ." —Dr. Dobb's Journal

". . .easily ranks as one of the most authoritative in its field." —PC Magazine

". . .the bible of code hackers." —The Millennium Whole Earth Catalog

This new edition of the cryptography classic provides you with a comprehensive survey of modern cryptography. The book details how programmers and electronic communications professionals can use cryptography—the technique of enciphering and deciphering messages—to maintain the privacy of computer data. It describes dozens of cryptography algorithms, gives practical advice on how to implement them into cryptographic software, and shows how they can be used to solve security problems. Covering the latest developments in practical cryptographic techniques, this new edition shows programmers who design computer applications, networks, and storage systems how they can build security into their software and systems.

What's new in the Second Edition?

New information on the Clipper Chip, including ways to defeat the key escrow mechanism
New encryption algorithms, including algorithms from the former Soviet Union and South Africa, and the RC4 stream cipher
The latest protocols for digital signatures, authentication, secure elections, digital cash, and more
More detailed information on key management and cryptographic implementations


About the Author
BRUCE SCHNEIER is President of Counter-pane Systems, a consulting firm specializing in cryptography and computer security. He is a contributing editor to Dr. Dobb's Journal, serves on the board of directors of the International Association of Cryptologic Research, and is a member of the Advisory Board for the Electronic Privacy Information Center. He is the author of E-Mail Security (Wiley) and is a frequent lecturer on cryptography, computer security, and privacy.
Personal Details
Collection Status Not In Collection
Store Waldenbooks
Location quarto
Purchase Price $49.95
Purchase Date 1997
Condition Very Good
Index 382
Owner Paulo Mendes
Read It No
Links URL
Collection # 00325
Main Subject Cryptology
Product Details
LoC Classification QA76.9.A25 S35 1996
Dewey 005.8/2 20
ISBN 0471117099
Edition 02
Printing 2
Paper Type acid-free
Country USA
Cover Price $60.00
Nr of Pages 758
First Edition Yes
Rare No
Notes
Includes bibliographical references (p. 675-741) and index.