Programming Books C Java PHP Python Learn more Browse Programming Books
Applied Cryptography and over one million other books are available for Amazon Kindle. Learn more

Sorry, this item is not available in
Image not available for
Color:
Image not available

To view this video download Flash Player

 


or
Sign in to turn on 1-Click ordering
Sell Us Your Item
For a $2.00 Gift Card
Trade in
More Buying Choices
Have one to sell? Sell yours here
Start reading Applied Cryptography on your Kindle in under a minute.

Don't have a Kindle? Get your Kindle here, or download a FREE Kindle Reading App.

Applied Cryptography: Protocols, Algorithms, and Source Code in C [Paperback]

Bruce Schneier
4.6 out of 5 stars  See all reviews (122 customer reviews)

List Price: $60.00
Price: $31.61 & FREE Shipping on orders over $35. Details
You Save: $28.39 (47%)
o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o
Only 12 left in stock (more on the way).
Ships from and sold by Amazon.com. Gift-wrap available.
Want it tomorrow, July 11? Choose One-Day Shipping at checkout. Details
Free Two-Day Shipping for College Students with Amazon Student

Formats

Amazon Price New from Used from
Kindle Edition $30.03  
Hardcover --  
Paperback $31.61  
Unknown Binding --  
Shop the New Digital Design Bookstore
Check out the Digital Design Bookstore, a new hub for photographers, art directors, illustrators, web developers, and other creative individuals to find highly rated and highly relevant career resources. Shop books on web development and graphic design, or check out blog posts by authors and thought-leaders in the design industry. Shop now

Book Description

October 18, 1996 0471117099 978-0471117094 2nd
". . .the best introduction to cryptography I've ever seen. . . . The book the National Security Agency wanted never to be published. . . ." -Wired Magazine

". . .monumental . . . fascinating . . . comprehensive . . . the definitive work on cryptography for computer programmers . . ." -Dr. Dobb's Journal

". . .easily ranks as one of the most authoritative in its field." -PC Magazine

". . .the bible of code hackers." -The Millennium Whole Earth Catalog

This new edition of the cryptography classic provides you with a comprehensive survey of modern cryptography. The book details how programmers and electronic communications professionals can use cryptography-the technique of enciphering and deciphering messages-to maintain the privacy of computer data. It describes dozens of cryptography algorithms, gives practical advice on how to implement them into cryptographic software, and shows how they can be used to solve security problems. Covering the latest developments in practical cryptographic techniques, this new edition shows programmers who design computer applications, networks, and storage systems how they can build security into their software and systems.

What's new in the Second Edition?
* New information on the Clipper Chip, including ways to defeat the key escrow mechanism
* New encryption algorithms, including algorithms from the former Soviet Union and South Africa, and the RC4 stream cipher
* The latest protocols for digital signatures, authentication, secure elections, digital cash, and more
* More detailed information on key management and cryptographic implementations

Frequently Bought Together

Applied Cryptography: Protocols, Algorithms, and Source Code in C + Cryptography Engineering: Design Principles and Practical Applications + Understanding Cryptography: A Textbook for Students and Practitioners
Price for all three: $110.02

Buy the selected items together


Editorial Reviews

Amazon.com Review

Cryptographic techniques have applications far beyond the obvious uses of encoding and decoding information. For Internet developers who need to know about capabilities, such as digital signatures, that depend on cryptographic techniques, there's no better overview than Applied Cryptography, the definitive book on the subject. Bruce Schneier covers general classes of cryptographic protocols and then specific techniques, detailing the inner workings of real-world cryptographic algorithms including the Data Encryption Standard and RSA public-key cryptosystems. The book includes source-code listings and extensive advice on the practical aspects of cryptography implementation, such as the importance of generating truly random numbers and of keeping keys secure.

Review

"the definitive publicly available text on the theory and practice of cryptography" (Computer Shopper, January 2002)

Product Details

  • Paperback: 758 pages
  • Publisher: Wiley; 2nd edition (October 18, 1996)
  • Language: English
  • ISBN-10: 0471117099
  • ISBN-13: 978-0471117094
  • Product Dimensions: 9.2 x 7.3 x 1.7 inches
  • Shipping Weight: 2.6 pounds (View shipping rates and policies)
  • Average Customer Review: 4.6 out of 5 stars  See all reviews (122 customer reviews)
  • Amazon Best Sellers Rank: #42,277 in Books (See Top 100 in Books)

More About the Author

Bruce Schneier is the go-to security expert for business leaders and policy makers. His breakthrough book Applied Cryptography (1994, 1998) explained how the arcane science of secret codes actually works, and was described by Wired as "the book the National Security Agency wanted never to be published." His business-oriented bestseller Secrets and Lies (2000) was called by Fortune "[a] jewel box of little surprises you can actually use." Best known as a refreshingly candid and lucid security critic and commentator, he has appeared in numerous media outlets, including The New York Times, USA Today, Newsweek, and The Wall Street Journal, as well as on NPR, CNN, and the major networks. He has also testified on security before the United States Congress.

Customer Reviews

Most Helpful Customer Reviews
142 of 150 people found the following review helpful
5.0 out of 5 stars A bit out of date, but highly worth reading January 24, 2002
Format:Paperback
Bruce Schneier's APPLIED CRYPTOGRAPHY is an excellent book for anyone interested in cryptology from an amateur level to actually being involved in the development of new encryption mechanisms. Schneier's book begins with a simple discussion of what is cryptography, and then he proceeds through the history of various encryption algorithms and their functioning. The last portion of the book contains C code for several public-domain encryption algorithms.
A caveat: this is not a textbook of cryptography in the sense that it teaches everything necessary to understand the mathematical basis of the science. Schneier does not discuss number theory because he expects those who use the relevant chapters of the book will already have training in higher maths. Nonetheless, the book does contain a wealth of information even for the layman.
One helpful part of Schneier's book is his opinion of which encryption algorithms are already broken by the National Security Agency, thus letting the reader know which encryption programs to avoid. There will always be people who encrypt to 40-bit DES even though it is flimsy and nearly instantly breakable, but the readers of APPLIED CRYPTOGRAPHY can greatly improve the confidentiality of their messages and data with this book. Discussion of public-key web-of-trust is essential reading for anyone confused by how public-key signatures work.
APPLIED CRYPTOGRAPHY was published in 1995 and some parts are already out of date. It is ironic that he hardly mentions PGP, when PGP went on to become the most renowned military-strength encryption program available to the public, although it is being superseded by GnuPG. Another anachronism is Schneier's assurance that quantum computing is decades away.
Read more ›
Comment | 
Was this review helpful to you?
59 of 62 people found the following review helpful
5.0 out of 5 stars The most comprehensive text on computer-era cryptology. December 12, 1996
By A Customer
Format:Paperback
Habitues of sci.crypt will be familiar with Bruce Schneier's
*Applied Cryptography*; if any of them have but one text on crypto
for reference, it will almost certainly be *Applied Cryptography*.
It is the de facto standard reference on modern cryptography as
well as serving as an excellent introduction to the subject.

The art is very old - Julius Caesar was the first recorded user of
cryptography for military purposes - and reached a watershed when
computers were put to work in order to break German and Japanese
ciphers. Indeed, that was the first *real* application of electronic
computers. A natural development was the use of computers for the
development of cryptographic systems.

That is where Bruce Schneier's remarkable book begins. It is notable
for two reasons: the breadth and depth of coverage, and the high
standard of technical communication.

As a reference its scope is encyclopaedic, providing descriptions
and assessments of just about every non-military crypto system
developed since computers were first applied to the purpose. There
are also military-cum-government algorithms amongst the collection,
some from the old Soviet Union and others from South Africa. It is
not just an A-Z procession of algorithms; the author progresses
in a logical manner through the many technical aspects of cryptography.

It is common to find that masters of mysterious technical arts are
poor communicators. Bruce Schneier demonstrates exceptional skill
as a technical communicator. Here is a book about an esoteric
subject - one built on a foundation of theoretical mathematics - that
ordinary folk can read.
Read more ›
Comment | 
Was this review helpful to you?
47 of 51 people found the following review helpful
Format:Hardcover
Applied Cryptography is quite simply the quintessential guidebook for information about cryptography. It also is one of the finest computer security books ever written. Bruce Schneier is a cryptologist who has a passion for cryptography, and it shows in his masterpiece. Instant classic is an often used oxymoron, yet that term is most appropriate to describe Applied Cryptography. If you have any interest with security and encryption, Applied Cryptography is clearly the definitive publication to reference and the most comprehensive text available about security and encryption. It might sound as if via my high praise for this book that I am getting some type of endorsement, that is not the case. It is just that Applied Cryptography is quite simply the most comprehensive, up-to-date work about cryptography.
The vast array of topics covered by the book is truly astounding in is depth and breadth. There is hardly a single cryptological concept, either minor or major, that the book does not cover. It is not possible to detail everything Applied Cryptography covers. But a few of the topics are: Foundations of cryptography, Protocols, Protocol Building Blocks, Key Lengths, key exchange, key management, Algorithms, the mathematical of cryptography, DES, RSA, One-Way Hash Functions, Symmetric vs. Public-Key cryptography, Public-Key Digital Signature Algorithms, Substitution Ciphers and Transposition Ciphers, Digital Signatures, Random and Pseudo-Random Sequence Generation, PGP, Authentication, Advanced security Protocols, Cryptographic Techniques, Identification Schemes, the politics of cryptography and much (much!) more.
Applied Cryptography also includes the source code for DES, IDEA, BLOWFISH, RC5 and other algorithms.
Read more ›
Comment | 
Was this review helpful to you?
Most Recent Customer Reviews
5.0 out of 5 stars Very Good book
Great reference and a best primer for cryptography. The book is well explained and coding examples are well written, I would recommend this to anybody who wants to get a overview... Read more
Published 2 months ago by Hari Ramachandran
5.0 out of 5 stars Exactly what I need
Started reading through it and it's helping out a lot so far with the new security position I have. I highly recommend anyone just starting out in IT security to get this book!
Published 2 months ago by Jon Locke
5.0 out of 5 stars Micro, not macro: a reference for protocols, cryptographic techniques,...
If you've already been introduced to cryptography, Schneier's Applied Cryptography is an excellent reference to all the major protocols, techniques, and algorithms out there. Read more
Published 4 months ago by Vincent Poirier
1.0 out of 5 stars I bought this before I knew what it was. Go with the Handbook of...
This is horribly out of date (I did buy it used, not knowing what it was) and more of a marketing-type overview for cryptography than an explanation of what anything does. Read more
Published 4 months ago by Kelly
5.0 out of 5 stars Great Book
Very good perspective, very detailed and instructional. This is the book I wish I'd read 10 years ago. Overall, thorough treatment of the subject matter.
Published 5 months ago by A
4.0 out of 5 stars Very interesting and fascinating book
I'm starting to work with cryptology in my job and this book is very good for helping to learn more about this subject.
Published 9 months ago by Alessandro Pongolino
5.0 out of 5 stars Very good covering the things to do with crypto
I really respect the author and this book is very good when it comes to covering what crypto is and can do. Highly recommend this book.
Published 10 months ago by Phillip Porch
5.0 out of 5 stars This is a great read for an intro to the topic
The nice thing about this book is that the author lets you know which chapters match which experience levels - so someone like me, who is just looking for an overview to the topic,... Read more
Published 11 months ago by Robert King
4.0 out of 5 stars review of applied cryptography
The book is very good but the source code cd is not included and must be ordered separately and that was a disappointment.
Published 11 months ago by Paul Bruce Coursey
5.0 out of 5 stars Absolutely brilliant
A very deep practical insight in cryptography and cryptanalysis. Although nowadays this book is a bit outdated but the principles underlying it still hold. Read more
Published 11 months ago by Vadim Kotov
Search Customer Reviews
Search these reviews only





Forums

There are no discussions about this product yet.
Be the first to discuss this product with the community.
Start a new discussion
Topic:
First post:
Prompts for sign-in
 



Look for Similar Items by Category