Buy used:
$15.54
Get Fast, Free Shipping with Amazon Prime
to get FREE delivery Saturday, November 16. Order within 7 hrs 30 mins
Or Non members get FREE delivery Tuesday, November 19 on orders shipped by Amazon over $35
Condition: Used: Good
Comment: This item shows wear including moderate wear to edges and cover.
Access codes and supplements are not guaranteed with used items.
Kindle app logo image

Download the free Kindle app and start reading Kindle books instantly on your smartphone, tablet, or computer - no Kindle device required.

Read instantly on your browser with Kindle for Web.

Using your mobile phone camera - scan the code below and download the Kindle app.

QR code to download the Kindle App

Follow the author

Something went wrong. Please try your request again later.

Applied Cryptography: Protocols, Algorithms, and Source Code in C 2nd Edition

4.4 4.4 out of 5 stars 158 ratings

". . .the best introduction to cryptography I've ever seen. . . .The book the National Security Agency wanted never to be published. . . ." -Wired Magazine

". . .monumental . . . fascinating . . . comprehensive . . . the definitive work on cryptography for computer programmers . . ." -Dr. Dobb's Journal

". . .easily ranks as one of the most authoritative in its field." -PC Magazine

". . .the bible of code hackers." -The Millennium Whole Earth Catalog

This new edition of the cryptography classic provides you with a comprehensive survey of modern cryptography. The book details how programmers and electronic communications professionals can use cryptography-the technique of enciphering and deciphering messages-to maintain the privacy of computer data. It describes dozens of cryptography algorithms, gives practical advice on how to implement them into cryptographic software, and shows how they can be used to solve security problems. Covering the latest developments in practical cryptographic techniques, this new edition shows programmers who design computer applications, networks, and storage systems how they can build security into their software and systems.

What's new in the Second Edition?
* New information on the Clipper Chip, including ways to defeat the key escrow mechanism
* New encryption algorithms, including algorithms from the former Soviet Union and South Africa, and the RC4 stream cipher
* The latest protocols for digital signatures, authentication, secure elections, digital cash, and more
* More detailed information on key management and cryptographic implementations

Amazon First Reads | Editors' picks at exclusive prices

Editorial Reviews

Amazon.com Review

Cryptographic techniques have applications far beyond the obvious uses of encoding and decoding information. For Internet developers who need to know about capabilities, such as digital signatures, that depend on cryptographic techniques, there's no better overview than Applied Cryptography, the definitive book on the subject. Bruce Schneier covers general classes of cryptographic protocols and then specific techniques, detailing the inner workings of real-world cryptographic algorithms including the Data Encryption Standard and RSA public-key cryptosystems. The book includes source-code listings and extensive advice on the practical aspects of cryptography implementation, such as the importance of generating truly random numbers and of keeping keys secure.

Review

"the definitive publicly available text on the theory and practice of cryptography" (Computer Shopper, January 2002)

Product details

  • ASIN ‏ : ‎ 0471117099
  • Publisher ‏ : ‎ John Wiley & Sons Inc; 2nd edition (October 18, 1996)
  • Language ‏ : ‎ English
  • Paperback ‏ : ‎ 758 pages
  • ISBN-10 ‏ : ‎ 9780471117094
  • ISBN-13 ‏ : ‎ 978-0471117094
  • Item Weight ‏ : ‎ 2.55 pounds
  • Dimensions ‏ : ‎ 7.5 x 1.5 x 9.25 inches
  • Customer Reviews:
    4.4 4.4 out of 5 stars 158 ratings

About the author

Follow authors to get new release updates, plus improved recommendations.
Bruce Schneier
Brief content visible, double tap to read full content.
Full content visible, double tap to read brief content.

Bruce Schneier is an internationally renowned security technologist, called a "security guru" by The Economist. He is the author of 12 books -- including "Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World" -- as well as hundreds of articles, essays, and academic papers. His influential newsletter "Crypto-Gram" and blog "Schneier on Security" are read by over 250,000 people. Schneier is a fellow at the Berkman Center for Internet and Society at Harvard Law School, a program fellow at the New America Foundation's Open Technology Institute, a board member of the Electronic Frontier Foundation, and an Advisory Board member of the Electronic Privacy Information Center. He is also the Chief Technology Officer of Resilient Systems, Inc.

Customer reviews

4.4 out of 5 stars
158 global ratings

Top reviews from the United States

Reviewed in the United States on September 15, 2018
Wonderful book. Very approachable yet comprehensive. No need to be afraid of the mathematics or symbolic logic; the protocols section alone is worth the purchase and much of it is written in story form - something like: If Alice wants to prove to Bob that she knows a secret and there's a cave that splits in two halfway down and Bob yells down which path she should emerge from and they do this ten times...however now that Bob knows that Alice knows the secret, he can't prove that to anyone and he doesn't know the secret - a zero knowledge proof. That was just my poor attempt at summarizing a protocol - it's wonderful and thought provoking to an almost dizzying extent.
One person found this helpful
Report
Reviewed in the United States on November 3, 2001
When I read this just after it came out, it was arguably the best, most comprehensive book on the subject. It may still be, but I haven't surveyed the field in the last year. But either way, this book is very easy to read, and makes some fairly complicated stuff easy to understand. This is a subject area that makes it real easy to be dry, boring, and all of that, but this book is none of those things. Applied Cryptography is fun to read, and makes the subject interesting. About 1/2 of the book is stuff anyone interested in the subject, or anyone that needs to implement some form of encryption or digital signatures will find very useful. The other half is the underlying algorithms and mathematics behind it, which to be honest I didn't read and didn't need to know to do my job. But this is a great book, and has both sides of the story.
One person found this helpful
Report
Reviewed in the United States on November 19, 2014
Much praise has already been heaped on Bruce Schneier and this seminal book. I can add that I bought a copy of this book when it was first published. It became a key reference book over my career and finally just fell apart and was discarded. Technology has changed in ways I never dreamed. The new, imaginative and sophisticated cyber threats of today are more challenging than ever. That being said, the principles of this science are as relevant today as they were then. To have them presented as Mr. Schneier has in this book means that new generations will find it as exciting and fresh as if it were a 21st century marvel. It never occurred to me that I could re-read the book for the pure pleasure of it. How remarkable.
2 people found this helpful
Report
Reviewed in the United States on October 10, 2010
Of course Bruce's book (even the second edition) is very dated in terms of the specific ciphers and hash functions that are prominently featured. But those will continue to evolve as time passes; no book is going to capture the modern developments for long.

The real value of Applied Cryptography is the fundamental understanding (and interest, in my case) it helps to build. Intros to terminology, theory, practical implementations, attack models, and protocol weaknesses are outlined here in great detail. I can honestly say that this book - along with lots of openssl / gnupg tinkering - have put a functional (for my sysadmin purposes) cryptography foundation within my grasp.

NB: this book is old enough that it pays to shop around for a used copy in good condition.
5 people found this helpful
Report
Reviewed in the United States on October 2, 2001
This book is readable introduction to real cryptography. It covers a wide range of topics (block and stream cyphers and hashing and random number generation algorithms) in enough depth, and with sufficient theoretical foundation, to give the reader an honest overview of the field. The last section contains code for many of the algorithms and electronic versions are available through Schneier's web site.
Throughout the book Schneier manages to include current references to the inevitable political and legal issues. These references are discussed in an engaging manner and without letting them hog the spotlight. On the other hand, in a fast-moving field like cryptography, they are beginning to get a bit long in the tooth. The book was originally published in 1996 and many of the remarks are noticeably dated (though, perhaps, historically interesting).
Printings before the fifth are also riddled with errors. Fortunately, good errata are available at Schneier's website. They are essential: if you find yourself thinking "That can't be right", it probably isn't.
Read this book first. Without some college level mathematics you may have to skim some of the chapters; still, you can probably curl up on your couch and read it cover to cover. If, afterwards, you get hooked into following up with Stinson's "Cryptograpy", or Menezes "Handbook of Applied Cryptography", don't say I didn't warn you!
13 people found this helpful
Report
Reviewed in the United States on January 9, 2008
Applied Cryptography is a classic book on how and why cryptography works. It is written very clearly and explains in detail how various aspects of cryptography work.

Some math-based sections are included, but overall math knowledge is assumed to be minimal. Overall, the book is very consitent in how much it expects the reader to know, few sections are much more advanced than others.

While not up-to-date with the latest algorithms and available computing specifications, it focuses as much as possible on the timeless aspects of cryptography. A recommended read to all aspiring cryptographers.
2 people found this helpful
Report
Reviewed in the United States on February 1, 2010
I am no expert, not in mathematics neither in cryptography. Well this book is exactly what i was looking for, no hard mathematics, no hard cryptographic theory, indeed a book for beginners like me and also for the engineer who wants implement his own cryptographic system. Specially for
computer science students and system developers this book is a great reference.
Implementation details and sample code in C language are included. The book is also very complete
Including the main topics in cryptography and cryptanalysis.
Reviewed in the United States on March 3, 2010
Essentially a glossary. Repetitious, drawn-out, painful explanation of terms. Nothing serious, nothing in-depth. Sounds professional but hollow. The only strong point of this book is that it includes many, many terms; useful from a "talk" point of view, but useless from an "applied" point of view.
8 people found this helpful
Report

Top reviews from other countries

Translate all reviews to English
bigbean
5.0 out of 5 stars Great!
Reviewed in Canada on May 30, 2020
Book in perfect condition. Thanks!
Cliente da Amazon
5.0 out of 5 stars Exige concentração e prática
Reviewed in Brazil on November 29, 2019
Apresenta um resumo histórico da criptografia, vantagens e desvantagens de cada algoritmo, e vários exemplos práticos na linguagem C.
Exige concentração e exercícios práticos para de fato ser compreendido.
Não é uma leitura casual.
Customer image
Cliente da Amazon
5.0 out of 5 stars Exige concentração e prática
Reviewed in Brazil on November 29, 2019
Apresenta um resumo histórico da criptografia, vantagens e desvantagens de cada algoritmo, e vários exemplos práticos na linguagem C.
Exige concentração e exercícios práticos para de fato ser compreendido.
Não é uma leitura casual.
Images in this review
Customer image Customer image Customer image
Customer imageCustomer imageCustomer image
steven dunn
5.0 out of 5 stars Excellent
Reviewed in the United Kingdom on January 17, 2020
Well worth the price a wealth of information
saszar
1.0 out of 5 stars Opinion!!
Reviewed in Spain on December 4, 2018
A good book with a lack of examples and structure.
Brian
5.0 out of 5 stars un classique
Reviewed in France on August 24, 2015
Je l'ai re-acheté car j'avais perdu le 1re; tres bon pour expliquer les bases de crypto en detaile.
Pour leur utilisation, je vous recommande le livre "Cryptography Engineering" de Niels Ferguson et al...