Knowing how a camera works does not make you a great photographer. Knowing what cryptographic designs are and how existing cryptographic protocols work does not give you proficiency in using cryptography. You must learn to think like a cryptographer.
That is what this book will teach you. Dive deeply into specific, concrete cryptographic protocols and learn why certain decisions were made. Recognize the challenges and how to overcome them. With this book, which is suitable for both classroom and self-study, you will learn to use cryptography effectively in real-world systems.
Understand what goes into designing cryptographic protocols
Develop an understanding of the interface between cryptography and the surrounding system, including people, economics, hardware, software, ethics, policy, and other aspects of the real world
Look beyond the security protocol to see weaknesses in the surrounding system
Thwart the adversary by understanding how adversaries think
Learn how to build cryptography into new products
Bruce Schneier is an internationally renowned security technologist whose advice is sought by business, government, and the media. He is the author of Applied Cryptography, Secrets and Lies, and Schneier on Security.
Tadayoshi Kohno is a professor at the University of Washington. He is known for his research and for developing innovative new approaches to cryptography and computer security education.
It's a "middle ground" book and probably the one you should start with if you are interested in practical cryptography.
This book does a great job explaining cryptographic principles and techniques, but is a little light on technical details and the underlying mathematics.
I mean, what good is the unbreakable code when the bad guy with a root kit can read your passwords from the paging file or /dev/kmem?
This book does a great job explaining cryptographic principles and techniques, but is a little light on technical details and the underlying mathematics. Read morePublished 3 months ago by JAYNESS the Great
Its a very easy read more concerned with high level applications and attacks. If you're into the math and algorithms Applied Cryptography is for you. Read morePublished 3 months ago by Dave Mercer
While this text is a great introductory text, it's focus is too much on basic concepts and too little on actual engineering and giving examples of implementation.Published 5 months ago by Jackie Li
Bruce and his buddies did it again! Great book, you should be ashamed of yourself if you haven't read it! lolsPublished 6 months ago by Keith Makan
This book provides with great info about developing crypto solution from an engineering point of view, show as the various pieces of cryptography (block cypher, hash function... Read morePublished 10 months ago by Gianluca Pacchiella
I ordered the hardbound book and received the softbound book.
It's still a great book either way.
Since that review was too short for Amazon, I'll make it longer. Read more
excellent text - and a worthwhile "sequel" to applied cryptography (by Schneier). Basically - I would recommend anything by Ferguson and / or Schneier.Published 11 months ago by J. Peterson
The math in this book is at least at an upper division college math level. I thought the book was excellent, though I would have appreciated a chapter on gnupg, or PGP. Read morePublished on May 9, 2012 by Dwarfplanet9
The text is a deep synthesis of tradititional cryptography combined with additional and modern techniques: I found particularly intersting the definitions which in this field are... Read morePublished on September 12, 2011 by Francesco Bubbico