Buy new:
-49% $30.34
Delivery October 28 - 31
Ships from: Amazon
Sold by: BE_UNIQ
$30.34 with 49 percent savings
List Price: $60.00
The List Price is the suggested retail price of a new product as provided by a manufacturer, supplier, or seller. Except for books, Amazon will display a List Price if the product was purchased by customers on Amazon or offered by other retailers at or above the List Price in at least the past 90 days. List prices may not necessarily reflect the product's prevailing market price.
Learn more
FREE International Returns
$11.24 Shipping & Import Charges to Canada Details

Shipping & Fee Details

Price $30.34
AmazonGlobal Shipping $9.66
Estimated Import Charges $1.58
Total $41.58

Delivery October 28 - 31
$$30.34 () Includes selected options. Includes initial monthly payment and selected options. Details
Price
Subtotal
$$30.34
Subtotal
Initial payment breakdown
Shipping cost, delivery date, and order total (including tax) shown at checkout.
Ships from
Amazon
Amazon
Ships from
Amazon
Sold by
Returns
30-day refund/replacement
30-day refund/replacement
This item can be returned in its original condition for a full refund or replacement within 30 days of receipt.
Payment
Secure transaction
Your transaction is secure
We work hard to protect your security and privacy. Our payment security system encrypts your information during transmission. We don’t share your credit card details with third-party sellers, and we don’t sell your information to others. Learn more
$10.42
FREE International Returns
Minor wear on the cover. Name and number written on the inside of the front cover. Otherwise, the book is in very good condition. Clean and crisp pages. No notes. No highlights. No underlining. Minor wear on the cover. Name and number written on the inside of the front cover. Otherwise, the book is in very good condition. Clean and crisp pages. No notes. No highlights. No underlining. See less
Delivery Friday, October 25
Only 1 left in stock - order soon.
$$30.34 () Includes selected options. Includes initial monthly payment and selected options. Details
Price
Subtotal
$$30.34
Subtotal
Initial payment breakdown
Shipping cost, delivery date, and order total (including tax) shown at checkout.
Access codes and supplements are not guaranteed with used items.
Added to

Sorry, there was a problem.

There was an error retrieving your Wish Lists. Please try again.

Sorry, there was a problem.

List unavailable.
Kindle app logo image

Download the free Kindle app and start reading Kindle books instantly on your smartphone, tablet, or computer - no Kindle device required.

Read instantly on your browser with Kindle for Web.

Using your mobile phone camera - scan the code below and download the Kindle app.

QR code to download the Kindle App

Follow the author

Something went wrong. Please try your request again later.

Applied Cryptography: Protocols, Algorithms, and Source Code in C 2nd Edition

4.4 4.4 out of 5 stars 159 ratings

{"desktop_buybox_group_1":[{"displayPrice":"$30.34","priceAmount":30.34,"currencySymbol":"$","integerValue":"30","decimalSeparator":".","fractionalValue":"34","symbolPosition":"left","hasSpace":false,"showFractionalPartIfEmpty":true,"offerListingId":"kQsiMqaWreCOwTTwFRLF%2FA8Rm8OULXIIZF%2FV5x7Hsj0Yoit8H9uCL81LncJGUW3eSTZMpEohbEkUrHT3xXr%2FR%2BokLRovq5pcbmP%2BiUA5m%2Fr%2BriF91mKhfRpQC7FxX8CRQ6JZ9%2FyEMlB092w9b22llA%2FnN1m4DylZ663lBObuKaRleHgzp9%2FOhw%3D%3D","locale":"en-US","buyingOptionType":"NEW","aapiBuyingOptionIndex":0}, {"displayPrice":"$10.42","priceAmount":10.42,"currencySymbol":"$","integerValue":"10","decimalSeparator":".","fractionalValue":"42","symbolPosition":"left","hasSpace":false,"showFractionalPartIfEmpty":true,"offerListingId":"kQsiMqaWreCOwTTwFRLF%2FA8Rm8OULXIIQLk%2BC4vXf4MDbqluT%2F7Q5%2FTFXhxD%2B9hfeUqI0tASjuQFQeTmC5S%2FCkV%2BOamhjc08necvKIlZWRd%2B8h4W2x%2BH20BSlMSfvIofoUkb7SCkBq6cxa15Ts%2Bochc5lS2TYbYAdUCXn58nX7dKrsqJhMAbQF6TJkoULJWC","locale":"en-US","buyingOptionType":"USED","aapiBuyingOptionIndex":1}]}

Purchase options and add-ons

". . .the best introduction to cryptography I've ever seen. . . .The book the National Security Agency wanted never to be published. . . ." -Wired Magazine

". . .monumental . . . fascinating . . . comprehensive . . . the definitive work on cryptography for computer programmers . . ." -Dr. Dobb's Journal

". . .easily ranks as one of the most authoritative in its field." -PC Magazine

". . .the bible of code hackers." -The Millennium Whole Earth Catalog

This new edition of the cryptography classic provides you with a comprehensive survey of modern cryptography. The book details how programmers and electronic communications professionals can use cryptography-the technique of enciphering and deciphering messages-to maintain the privacy of computer data. It describes dozens of cryptography algorithms, gives practical advice on how to implement them into cryptographic software, and shows how they can be used to solve security problems. Covering the latest developments in practical cryptographic techniques, this new edition shows programmers who design computer applications, networks, and storage systems how they can build security into their software and systems.

What's new in the Second Edition?
* New information on the Clipper Chip, including ways to defeat the key escrow mechanism
* New encryption algorithms, including algorithms from the former Soviet Union and South Africa, and the RC4 stream cipher
* The latest protocols for digital signatures, authentication, secure elections, digital cash, and more
* More detailed information on key management and cryptographic implementations

Frequently bought together

This item: Applied Cryptography: Protocols, Algorithms, and Source Code in C
$30.34
Sold by BE_UNIQ and ships from Amazon Fulfillment.
+
$11.94
In Stock
Ships from and sold by Amazon.com.
+
$38.25
Get it as soon as Tuesday, Oct 22
Only 11 left in stock - order soon.
Sold by ayvax and ships from Amazon Fulfillment.
Total price: $00
To see our price, add these items to your cart.
Details
Added to Cart
spCSRF_Treatment
Some of these items ship sooner than the others.
Choose items to buy together.

Editorial Reviews

Amazon.com Review

Cryptographic techniques have applications far beyond the obvious uses of encoding and decoding information. For Internet developers who need to know about capabilities, such as digital signatures, that depend on cryptographic techniques, there's no better overview than Applied Cryptography, the definitive book on the subject. Bruce Schneier covers general classes of cryptographic protocols and then specific techniques, detailing the inner workings of real-world cryptographic algorithms including the Data Encryption Standard and RSA public-key cryptosystems. The book includes source-code listings and extensive advice on the practical aspects of cryptography implementation, such as the importance of generating truly random numbers and of keeping keys secure.

Review

"the definitive publicly available text on the theory and practice of cryptography" (Computer Shopper, January 2002)

Product details

  • ASIN ‏ : ‎ 0471117099
  • Publisher ‏ : ‎ John Wiley & Sons Inc; 2nd edition (October 18, 1996)
  • Language ‏ : ‎ English
  • Paperback ‏ : ‎ 758 pages
  • ISBN-10 ‏ : ‎ 9780471117094
  • ISBN-13 ‏ : ‎ 978-0471117094
  • Item Weight ‏ : ‎ 2.55 pounds
  • Dimensions ‏ : ‎ 7.5 x 1.5 x 9.25 inches
  • Customer Reviews:
    4.4 4.4 out of 5 stars 159 ratings

About the author

Follow authors to get new release updates, plus improved recommendations.
Bruce Schneier
Brief content visible, double tap to read full content.
Full content visible, double tap to read brief content.

Bruce Schneier is an internationally renowned security technologist, called a "security guru" by The Economist. He is the author of 12 books -- including "Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World" -- as well as hundreds of articles, essays, and academic papers. His influential newsletter "Crypto-Gram" and blog "Schneier on Security" are read by over 250,000 people. Schneier is a fellow at the Berkman Center for Internet and Society at Harvard Law School, a program fellow at the New America Foundation's Open Technology Institute, a board member of the Electronic Frontier Foundation, and an Advisory Board member of the Electronic Privacy Information Center. He is also the Chief Technology Officer of Resilient Systems, Inc.

Customer reviews

4.4 out of 5 stars
159 global ratings

Top reviews from the United States

Reviewed in the United States on September 15, 2018
Wonderful book. Very approachable yet comprehensive. No need to be afraid of the mathematics or symbolic logic; the protocols section alone is worth the purchase and much of it is written in story form - something like: If Alice wants to prove to Bob that she knows a secret and there's a cave that splits in two halfway down and Bob yells down which path she should emerge from and they do this ten times...however now that Bob knows that Alice knows the secret, he can't prove that to anyone and he doesn't know the secret - a zero knowledge proof. That was just my poor attempt at summarizing a protocol - it's wonderful and thought provoking to an almost dizzying extent.
One person found this helpful
Report
Reviewed in the United States on November 3, 2001
When I read this just after it came out, it was arguably the best, most comprehensive book on the subject. It may still be, but I haven't surveyed the field in the last year. But either way, this book is very easy to read, and makes some fairly complicated stuff easy to understand. This is a subject area that makes it real easy to be dry, boring, and all of that, but this book is none of those things. Applied Cryptography is fun to read, and makes the subject interesting. About 1/2 of the book is stuff anyone interested in the subject, or anyone that needs to implement some form of encryption or digital signatures will find very useful. The other half is the underlying algorithms and mathematics behind it, which to be honest I didn't read and didn't need to know to do my job. But this is a great book, and has both sides of the story.
One person found this helpful
Report
Reviewed in the United States on November 19, 2014
Much praise has already been heaped on Bruce Schneier and this seminal book. I can add that I bought a copy of this book when it was first published. It became a key reference book over my career and finally just fell apart and was discarded. Technology has changed in ways I never dreamed. The new, imaginative and sophisticated cyber threats of today are more challenging than ever. That being said, the principles of this science are as relevant today as they were then. To have them presented as Mr. Schneier has in this book means that new generations will find it as exciting and fresh as if it were a 21st century marvel. It never occurred to me that I could re-read the book for the pure pleasure of it. How remarkable.
2 people found this helpful
Report
Reviewed in the United States on January 9, 2008
Applied Cryptography is a classic book on how and why cryptography works. It is written very clearly and explains in detail how various aspects of cryptography work.

Some math-based sections are included, but overall math knowledge is assumed to be minimal. Overall, the book is very consitent in how much it expects the reader to know, few sections are much more advanced than others.

While not up-to-date with the latest algorithms and available computing specifications, it focuses as much as possible on the timeless aspects of cryptography. A recommended read to all aspiring cryptographers.
2 people found this helpful
Report
Reviewed in the United States on October 2, 2001
This book is readable introduction to real cryptography. It covers a wide range of topics (block and stream cyphers and hashing and random number generation algorithms) in enough depth, and with sufficient theoretical foundation, to give the reader an honest overview of the field. The last section contains code for many of the algorithms and electronic versions are available through Schneier's web site.
Throughout the book Schneier manages to include current references to the inevitable political and legal issues. These references are discussed in an engaging manner and without letting them hog the spotlight. On the other hand, in a fast-moving field like cryptography, they are beginning to get a bit long in the tooth. The book was originally published in 1996 and many of the remarks are noticeably dated (though, perhaps, historically interesting).
Printings before the fifth are also riddled with errors. Fortunately, good errata are available at Schneier's website. They are essential: if you find yourself thinking "That can't be right", it probably isn't.
Read this book first. Without some college level mathematics you may have to skim some of the chapters; still, you can probably curl up on your couch and read it cover to cover. If, afterwards, you get hooked into following up with Stinson's "Cryptograpy", or Menezes "Handbook of Applied Cryptography", don't say I didn't warn you!
13 people found this helpful
Report
Reviewed in the United States on October 10, 2010
Of course Bruce's book (even the second edition) is very dated in terms of the specific ciphers and hash functions that are prominently featured. But those will continue to evolve as time passes; no book is going to capture the modern developments for long.

The real value of Applied Cryptography is the fundamental understanding (and interest, in my case) it helps to build. Intros to terminology, theory, practical implementations, attack models, and protocol weaknesses are outlined here in great detail. I can honestly say that this book - along with lots of openssl / gnupg tinkering - have put a functional (for my sysadmin purposes) cryptography foundation within my grasp.

NB: this book is old enough that it pays to shop around for a used copy in good condition.
5 people found this helpful
Report
Reviewed in the United States on July 21, 2005
I've never seen so many pages devoted to pure text. Man oh man, is there a lot of talk--yak yak yak. All technical issues are detoured, inviting the reader to check out the references listed at the end of the book (all I have to buy is 1,643 references--gee, thanks). I find it disheartening that a 700 page book on cryptography doesn't give out a lick of information on the actual subject. If you like a bunch of talk and some hand waving explanations, then this book is definitely for you. Engineers and computer programmers may not be satisfied.
14 people found this helpful
Report

Top reviews from other countries

Translate all reviews to English
bigbean
5.0 out of 5 stars Great!
Reviewed in Canada on May 30, 2020
Book in perfect condition. Thanks!
Cliente da Amazon
5.0 out of 5 stars Exige concentração e prática
Reviewed in Brazil on November 29, 2019
Apresenta um resumo histórico da criptografia, vantagens e desvantagens de cada algoritmo, e vários exemplos práticos na linguagem C.
Exige concentração e exercícios práticos para de fato ser compreendido.
Não é uma leitura casual.
Customer image
Cliente da Amazon
5.0 out of 5 stars Exige concentração e prática
Reviewed in Brazil on November 29, 2019
Apresenta um resumo histórico da criptografia, vantagens e desvantagens de cada algoritmo, e vários exemplos práticos na linguagem C.
Exige concentração e exercícios práticos para de fato ser compreendido.
Não é uma leitura casual.
Images in this review
Customer image Customer image Customer image
Customer imageCustomer imageCustomer image
steven dunn
5.0 out of 5 stars Excellent
Reviewed in the United Kingdom on January 17, 2020
Well worth the price a wealth of information
saszar
1.0 out of 5 stars Opinion!!
Reviewed in Spain on December 4, 2018
A good book with a lack of examples and structure.
Brian
5.0 out of 5 stars un classique
Reviewed in France on August 24, 2015
Je l'ai re-acheté car j'avais perdu le 1re; tres bon pour expliquer les bases de crypto en detaile.
Pour leur utilisation, je vous recommande le livre "Cryptography Engineering" de Niels Ferguson et al...