Cryptography Engineering and over one million other books are available for Amazon Kindle. Learn more
  • List Price: $55.00
  • Save: $38.08 (69%)
Rented from apex_media
To Rent, select Shipping State from options above
Due Date: Aug 13, 2015
FREE return shipping at the end of the semester. Access codes and supplements are not guaranteed with rentals.
Qty:1
  • List Price: $55.00
  • Save: $24.11 (44%)
FREE Shipping on orders over $35.
In Stock.
Ships from and sold by Amazon.com.
Gift-wrap available.
Cryptography Engineering:... has been added to your Cart
Sell yours for a Gift Card
We'll buy it for $9.30
Learn More
Trade in now
Have one to sell? Sell on Amazon
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more
See all 2 images

Cryptography Engineering: Design Principles and Practical Applications Paperback – March 15, 2010

ISBN-13: 978-0470474242 ISBN-10: 0470474246 Edition: 1st

Buy New
Price: $30.89
Rent
Price: $16.92
47 New from $19.98 17 Used from $25.74
Rent from Amazon Price New from Used from
Kindle
"Please retry"
Paperback
"Please retry"
$16.92
$30.89
$19.98 $25.74
Free%20Two-Day%20Shipping%20for%20College%20Students%20with%20Amazon%20Student


Get Up to 80% Back When You Sell Us Your Books
$30.89 FREE Shipping on orders over $35. In Stock. Ships from and sold by Amazon.com. Gift-wrap available.

Frequently Bought Together

Cryptography Engineering: Design Principles and Practical Applications + Applied Cryptography: Protocols, Algorithms, and Source Code in C + Understanding Cryptography: A Textbook for Students and Practitioners
Price for all three: $108.46

Buy the selected items together
NO_CONTENT_IN_FEATURE

Shop the new tech.book(store)
New! Introducing the tech.book(store), a hub for Software Developers and Architects, Networking Administrators, TPMs, and other technology professionals to find highly-rated and highly-relevant career resources. Shop books on programming and big data, or read this week's blog posts by authors and thought-leaders in the tech industry. > Shop now

Product Details

  • Paperback: 384 pages
  • Publisher: Wiley; 1 edition (March 15, 2010)
  • Language: English
  • ISBN-10: 0470474246
  • ISBN-13: 978-0470474242
  • Product Dimensions: 7.4 x 0.8 x 9.3 inches
  • Shipping Weight: 1.2 pounds (View shipping rates and policies)
  • Average Customer Review: 4.5 out of 5 stars  See all reviews (18 customer reviews)
  • Amazon Best Sellers Rank: #62,775 in Books (See Top 100 in Books)

Editorial Reviews

From the Back Cover

Learn to build cryptographic protocols that work in the real world

Knowing how a camera works does not make you a great photographer. Knowing what cryptographic designs are and how existing cryptographic protocols work does not give you proficiency in using cryptography. You must learn to think like a cryptographer.

That is what this book will teach you. Dive deeply into specific, concrete cryptographic protocols and learn why certain decisions were made. Recognize the challenges and how to overcome them. With this book, which is suitable for both classroom and self-study, you will learn to use cryptography effectively in real-world systems.

  • Understand what goes into designing cryptographic protocols

  • Develop an understanding of the interface between cryptography and the surrounding system, including people, economics, hardware, software, ethics, policy, and other aspects of the real world

  • Look beyond the security protocol to see weaknesses in the surrounding system

  • Thwart the adversary by understanding how adversaries think

  • Learn how to build cryptography into new products

About the Author

Niels Ferguson is a cryptographer for Microsoft who has designed and implemented cryptographic algorithms, protocols, and large-scale security infrastructures.

Bruce Schneier is an internationally renowned security technologist whose advice is sought by business, government, and the media. He is the author of Applied Cryptography, Secrets and Lies, and Schneier on Security.

Tadayoshi Kohno is a professor at the University of Washington. He is known for his research and for developing innovative new approaches to cryptography and computer security education.

Customer Reviews

4.5 out of 5 stars
5 star
67%
4 star
17%
3 star
17%
2 star
0%
1 star
0%
See all 18 customer reviews
If you're into the math and algorithms Applied Cryptography is for you.
Dave Mercer
I highly recommend it to anyone writing software, managing a software project, or just wondering what's going on in the cyber-wars.
Robert H. Stine Jr.
This book promises that it utterly will not leave the reader ready to go write good security software, but no book can do that.
Dwarfplanet9

Most Helpful Customer Reviews

58 of 59 people found the following review helpful By Mihailo Despotovic on March 12, 2010
Format: Paperback Verified Purchase
I just got the book, skimmed over it and compared it with the 1st edition (Practical Cryptography).

First of all, if you don't have the 1st edition, this is an excellent buy. It's a "middle ground" book and probably the one you should start with if you are interested in practical cryptography. Then, depending on your interests and needs, you could proceed to a technically and mathematically much deeper (but somewhat obsolete) Applied Cryptography: Protocols, Algorithms, and Source Code in C, Second Edition or to some other direction using the foundation laid down in this book and then getting other book(s) about "hard-core" mathematics of cryptography or about "softer" methods of social engineering and real-life security.

I will now assume you know what the book is all about and that you are considering upgrading it so here are some quick things I hope to help you deciding:

- first of all, obviously, the errata from the 1st edition is incorporated into the text (there is no errata for the 2nd edition yet but keep checking on the book's home page [ [..
Read more ›
3 Comments Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
31 of 34 people found the following review helpful By wiredweird HALL OF FAMETOP 1000 REVIEWER on March 16, 2010
Format: Paperback
It turns out that cryptography is the least of the issues in cryptographic systems. Good codes are available in good implementations all over the place (one reason the authors warn against implementing your own, since good implementations are very hard). But, as the authors say in their introductory chapter, "Cryptography by itself is fairly useless." They liken strong codes in a weak system to a bank-vault door on a tent. This book provides a first lesson in pouring some concrete into the walls behind that door.

Phrased as a text for a one semester graduate or advanced undergrad class, this highly readable text covers a range of basics - the first and most pervasive being the professional paranoia needed to actively seek out ways to defeat your own systems. The authors cover things you might expect in a crypto course, including ciphers, message digests, key exchange, and a smattering of mathematical basics. There's less of the real crypto material than you might think, however. I mean, what good is the unbreakable code when the bad guy with a root kit can read your passwords from the paging file or /dev/kmem? Instead, this book stands out for things like wiping secrets from memory as fast as you can - if you can, if language design or the physics of computer memory even make it possible. Even things like random numbers and the system clock come under careful scrutiny and analysis of their own. The reader who goes through this book cover to cover comes away with a solid appreciation of the hardware, software, and social issues involved in creating truly secure systems.

But, as the authors take pains to state, this is only an introduction. As happened with Schneier's "Applied Cryptography", it could become "...
Read more ›
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
12 of 14 people found the following review helpful By Ben Rothke on November 30, 2010
Format: Paperback
Good cryptography can ensure that your data is readable only to authorized parties. The danger of bad cryptography is a false sense of data security. The line between the two is exceptionally thin, and the difference between the two is spelled out in great detail in this text.

The first edition of coauthor Bruce Schneier's Applied Cryptography came out in 1994. What was revolutionary then, and launched a new generation of security mavens, is now obsolete in many parts. Cryptography Engineering is a much-needed update. While not as detailed as the former work, and with significantly fewer code examples, the new text is still a valuable resource for anyone who wants to come up to speed on the essentials of modern cryptography.

The book covers the major uses of cryptography today, namely messaging security and the other fundamental areas including key management, block ciph­ers, block modes, hash functions, encryption modes, message authentication codes, implementation issues, negotiation protocols, and much more.

The three authors bring many decades of unique experience on the topic to the book. Their goal is to get the reader to think like a cryptographer, and the book does a great job of that. It is rich in real-world examples, and each chapter ends with a number of exercises to take the theoretical ideas and put them into practice.

While billed as an introductory text on the subject, Cryptography Engineering is not for the fainthearted. Anyone intrigued by the topic and with the time to dedicate to the matter will find the book worth their while.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again

Most Recent Customer Reviews


More About the Authors

Discover books, learn about writers, read author blogs, and more.

Set up an Amazon Giveaway

Amazon Giveaway allows you to run promotional giveaways in order to create buzz, reward your audience, and attract new followers and customers. Learn more
Cryptography Engineering: Design Principles and Practical Applications
This item: Cryptography Engineering: Design Principles and Practical Applications
Price: $55.00 $30.89
Ships from and sold by Amazon.com