Buy new:
$31.12$31.12
$6.53
delivery:
Feb 6 - 7
Ships from: UPICK MARKETING LLC Sold by: UPICK MARKETING LLC
Buy used: $15.99
Other Sellers on Amazon
100% positive over last 12 months
98% positive over last 12 months
100% positive
Download the free Kindle app and start reading Kindle books instantly on your smartphone, tablet, or computer - no Kindle device required. Learn more
Read instantly on your browser with Kindle for Web.
Using your mobile phone camera - scan the code below and download the Kindle app.
Applied Cryptography: Protocols, Algorithms, and Source Code in C 2nd Edition
| Price | New from | Used from |
Enhance your purchase
". . .monumental . . . fascinating . . . comprehensive . . . the definitive work on cryptography for computer programmers . . ." -Dr. Dobb's Journal
". . .easily ranks as one of the most authoritative in its field." -PC Magazine
". . .the bible of code hackers." -The Millennium Whole Earth Catalog
This new edition of the cryptography classic provides you with a comprehensive survey of modern cryptography. The book details how programmers and electronic communications professionals can use cryptography-the technique of enciphering and deciphering messages-to maintain the privacy of computer data. It describes dozens of cryptography algorithms, gives practical advice on how to implement them into cryptographic software, and shows how they can be used to solve security problems. Covering the latest developments in practical cryptographic techniques, this new edition shows programmers who design computer applications, networks, and storage systems how they can build security into their software and systems.
What's new in the Second Edition?
* New information on the Clipper Chip, including ways to defeat the key escrow mechanism
* New encryption algorithms, including algorithms from the former Soviet Union and South Africa, and the RC4 stream cipher
* The latest protocols for digital signatures, authentication, secure elections, digital cash, and more
* More detailed information on key management and cryptographic implementations
- ISBN-109780471117094
- ISBN-13978-0471117094
- Edition2nd
- PublisherWiley
- Publication dateOctober 18, 1996
- LanguageEnglish
- Dimensions7.2 x 1.6 x 9.2 inches
- Print length758 pages
Frequently bought together

- +
- +
Customers who viewed this item also viewed
Editorial Reviews
Amazon.com Review
Review
From the Inside Flap
". . .monumental . . . fascinating . . . comprehensive . . . the definitive work on cryptography for computer programmers . . ." -Dr. Dobb's Journal
". . .easily ranks as one of the most authoritative in its field." -PC Magazine
". . .the bible of code hackers." -The Millennium Whole Earth Catalog
This new edition of the cryptography classic provides you with a comprehensive survey of modern cryptography. The book details how programmers and electronic communications professionals can use cryptography-the technique of enciphering and deciphering messages-to maintain the privacy of computer data. It describes dozens of cryptography algorithms, gives practical advice on how to implement them into cryptographic software, and shows how they can be used to solve security problems. Covering the latest developments in practical cryptographic techniques, this new edition shows programmers who design computer applications, networks, and storage systems how they can build security into their software and systems.
What's new in the Second Edition?
* New information on the Clipper Chip, including ways to defeat the key escrow mechanism
* New encryption algorithms, including algorithms from the former Soviet Union and South Africa, and the RC4 stream cipher
* The latest protocols for digital signatures, authentication, secure elections, digital cash, and more
* More detailed information on key management and cryptographic implementations
From the Back Cover
". . .monumental . . . fascinating . . . comprehensive . . . the definitive work on cryptography for computer programmers . . ." -Dr. Dobb's Journal
". . .easily ranks as one of the most authoritative in its field." -PC Magazine
". . .the bible of code hackers." -The Millennium Whole Earth Catalog
This new edition of the cryptography classic provides you with a comprehensive survey of modern cryptography. The book details how programmers and electronic communications professionals can use cryptography-the technique of enciphering and deciphering messages-to maintain the privacy of computer data. It describes dozens of cryptography algorithms, gives practical advice on how to implement them into cryptographic software, and shows how they can be used to solve security problems. Covering the latest developments in practical cryptographic techniques, this new edition shows programmers who design computer applications, networks, and storage systems how they can build security into their software and systems.
What's new in the Second Edition?
* New information on the Clipper Chip, including ways to defeat the key escrow mechanism
* New encryption algorithms, including algorithms from the former Soviet Union and South Africa, and the RC4 stream cipher
* The latest protocols for digital signatures, authentication, secure elections, digital cash, and more
* More detailed information on key management and cryptographic implementations
About the Author
Product details
- ASIN : 0471117099
- Publisher : Wiley; 2nd edition (October 18, 1996)
- Language : English
- Paperback : 758 pages
- ISBN-10 : 9780471117094
- ISBN-13 : 978-0471117094
- Item Weight : 2.55 pounds
- Dimensions : 7.2 x 1.6 x 9.2 inches
- Best Sellers Rank: #682,770 in Books (See Top 100 in Books)
- #136 in Computer Cryptography
- #141 in Discrete Mathematics (Books)
- #182 in Web Encryption
- Customer Reviews:
About the author

Bruce Schneier is an internationally renowned security technologist, called a "security guru" by The Economist. He is the author of 12 books -- including "Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World" -- as well as hundreds of articles, essays, and academic papers. His influential newsletter "Crypto-Gram" and blog "Schneier on Security" are read by over 250,000 people. Schneier is a fellow at the Berkman Center for Internet and Society at Harvard Law School, a program fellow at the New America Foundation's Open Technology Institute, a board member of the Electronic Frontier Foundation, and an Advisory Board member of the Electronic Privacy Information Center. He is also the Chief Technology Officer of Resilient Systems, Inc.
Customer reviews
Customer Reviews, including Product Star Ratings help customers to learn more about the product and decide whether it is the right product for them.
To calculate the overall star rating and percentage breakdown by star, we don’t use a simple average. Instead, our system considers things like how recent a review is and if the reviewer bought the item on Amazon. It also analyzed reviews to verify trustworthiness.
Learn more how customers reviews work on Amazon-
Top reviews
Top reviews from the United States
There was a problem filtering reviews right now. Please try again later.
Throughout the book Schneier manages to include current references to the inevitable political and legal issues. These references are discussed in an engaging manner and without letting them hog the spotlight. On the other hand, in a fast-moving field like cryptography, they are beginning to get a bit long in the tooth. The book was originally published in 1996 and many of the remarks are noticeably dated (though, perhaps, historically interesting).
Printings before the fifth are also riddled with errors. Fortunately, good errata are available at Schneier's website. They are essential: if you find yourself thinking "That can't be right", it probably isn't.
Read this book first. Without some college level mathematics you may have to skim some of the chapters; still, you can probably curl up on your couch and read it cover to cover. If, afterwards, you get hooked into following up with Stinson's "Cryptograpy", or Menezes "Handbook of Applied Cryptography", don't say I didn't warn you!
The real value of Applied Cryptography is the fundamental understanding (and interest, in my case) it helps to build. Intros to terminology, theory, practical implementations, attack models, and protocol weaknesses are outlined here in great detail. I can honestly say that this book - along with lots of openssl / gnupg tinkering - have put a functional (for my sysadmin purposes) cryptography foundation within my grasp.
NB: this book is old enough that it pays to shop around for a used copy in good condition.
Some math-based sections are included, but overall math knowledge is assumed to be minimal. Overall, the book is very consitent in how much it expects the reader to know, few sections are much more advanced than others.
While not up-to-date with the latest algorithms and available computing specifications, it focuses as much as possible on the timeless aspects of cryptography. A recommended read to all aspiring cryptographers.
Top reviews from other countries
His work provides a good in-depth description of crypto protocols, signature systems, hashing & digests
and some of the well-known cipher systems (at the time of publication).
His presentation of the material is well balanced between concept & mathematical description.
Unfortunately due to both space restrictions & the US embargo on exporting crypto material there is a limit on how much
source code could be included in the book. I would have liked to see source code for
hashing & signatures.
Schneier offers discs with much more source but they can only be legally provided
to residents of the US & Canada thus I have to reduce my overall rating of this fine work to four stars.
Nevertheless as a reference on crypto algorithms & protocols, this remains a fine work.
Der erste Teil über die möglichen Anwendungen der Kryptographie ließ sich problemlos an einem Stück runter bis man merkt dass schon wieder viel zu viel Zeit vergangen ist. Die beschriebenen Anwendungen sind teilweise sehr abenteuerlich wie zum Beispiel ein Verfahren um dezentral Karten so zu mischeln, dass kein einzelner sie manipulieren oder vor vereinbarter "Aufdeckung" lesen kann.
"WTF" Momente sind also definitiv vorprogrammiert ;-)
Auch alle weiteren für nicht Mathematiker interessanten Aspekte der Kryptographie werden sehr gut erklärt. Mir hat vor allem die Diskussion über die Brute-Force-Fähigkeit von 192bit Keys gefallen.
Der zweite Teil des Buches behandelt verschiedene Verschlüsselungsalgorithmen im Detail. Hier ist dringend eine Überarbeitung nötig, denn viele dieser Algorithmen gelten inzwischen als unsicher und überholt (finde ich nicht so schlimm) dafür fehlen aber andere inzwischen gebräuchliche Verfahren (viel schlimmer).








