- Series: Spring/Summer 15
- Paperback: 758 pages
- Publisher: Wiley; 2nd edition (October 18, 1996)
- Language: English
- ISBN-10: 0471117099
- ISBN-13: 978-0471117094
- Product Dimensions: 7.2 x 1.6 x 9.2 inches
- Shipping Weight: 2.6 pounds (View shipping rates and policies)
- Average Customer Review: 123 customer reviews
- Amazon Best Sellers Rank: #581,845 in Books (See Top 100 in Books)
Enter your mobile number or email address below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.
To get the free app, enter your mobile phone number.
Applied Cryptography: Protocols, Algorithms, and Source Code in C 2nd Edition
Use the Amazon App to scan ISBNs and compare prices.
Fulfillment by Amazon (FBA) is a service we offer sellers that lets them store their products in Amazon's fulfillment centers, and we directly pack, ship, and provide customer service for these products. Something we hope you'll especially enjoy: FBA items qualify for FREE Shipping and Amazon Prime.
If you're a seller, Fulfillment by Amazon can help you increase your sales. We invite you to learn more about Fulfillment by Amazon .
There is a newer edition of this item:
The Amazon Book Review
Author interviews, book reviews, editors picks, and more. Read it now
Frequently bought together
Customers who bought this item also bought
Cryptographic techniques have applications far beyond the obvious uses of encoding and decoding information. For Internet developers who need to know about capabilities, such as digital signatures, that depend on cryptographic techniques, there's no better overview than Applied Cryptography, the definitive book on the subject. Bruce Schneier covers general classes of cryptographic protocols and then specific techniques, detailing the inner workings of real-world cryptographic algorithms including the Data Encryption Standard and RSA public-key cryptosystems. The book includes source-code listings and extensive advice on the practical aspects of cryptography implementation, such as the importance of generating truly random numbers and of keeping keys secure.
"the definitive publicly available text on the theory and practice of cryptography" (Computer Shopper, January 2002)
Top customer reviews
There was a problem filtering reviews right now. Please try again later.
After receiving a brand new copy of this edition and seeing what the aged cover looked like, which I do not blame the seller for, I did question the legitimacy of the print itself until I noticed the Wiley holographic approval stamp. After further investigation I found the binding to be uneven causing groups of pages to not line up with others, as well as the cover which bent because the wrapping was bound around this flaw for a couple years around the almost newspaper quality paper used within the book.
Overall this is a great book to have, and while there are sections that have certainly aged since the 1st edition (and still in the 2nd edition), I would highly recommend buying the 1st edition if you like to own a book that will last for years. If you could care less if your book falls apart in a year or two, this may be the book for you, but I would still recommend purchasing a used 1st edition paperback over this edition.
That said, this book is a bit out of date if you are interested in studying any of the currently used technologies. Also, there is some errata that can confuse people not familiar with the topics already. Finally, some topics contain incomplete discussions.
I would love to see an updated version of this book!
The real value of Applied Cryptography is the fundamental understanding (and interest, in my case) it helps to build. Intros to terminology, theory, practical implementations, attack models, and protocol weaknesses are outlined here in great detail. I can honestly say that this book - along with lots of openssl / gnupg tinkering - have put a functional (for my sysadmin purposes) cryptography foundation within my grasp.
NB: this book is old enough that it pays to shop around for a used copy in good condition.
Some math-based sections are included, but overall math knowledge is assumed to be minimal. Overall, the book is very consitent in how much it expects the reader to know, few sections are much more advanced than others.
While not up-to-date with the latest algorithms and available computing specifications, it focuses as much as possible on the timeless aspects of cryptography. A recommended read to all aspiring cryptographers.