CDN$ 34.48
  • List Price: CDN$ 54.99
  • You Save: CDN$ 20.51 (37%)
Only 1 left in stock (more on the way).
Ships from and sold by Amazon.ca.
Gift-wrap available.
Quantity:1
Have one to sell?
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more
See all 2 images

Practical Cryptography Paperback – Apr 17 2003


See all 2 formats and editions Hide other formats and editions
Amazon Price New from Used from
Paperback
"Please retry"
CDN$ 34.48
CDN$ 32.13 CDN$ 32.52

2014 Books Gift Guide
Yes Please is featured in our 2014 Books Gift Guide. More gift ideas

Customers Who Bought This Item Also Bought



Product Details

  • Paperback: 432 pages
  • Publisher: Wiley; 1 edition (April 17 2003)
  • Language: English
  • ISBN-10: 0471223573
  • ISBN-13: 978-0471223573
  • Product Dimensions: 18.7 x 2.2 x 23.5 cm
  • Shipping Weight: 635 g
  • Average Customer Review: 3.6 out of 5 stars  See all reviews (13 customer reviews)
  • Amazon Bestsellers Rank: #412,944 in Books (See Top 100 in Books)
  • See Complete Table of Contents

Product Description

Review

"...the insight into the world of security that is offered here makes for an interesting read...any readers who are responsible for network and data security will find plenty of valuable pointers..." (PC Utilities, June 2003)

"...absolutely brilliantly written.... I loved the chapters on PKI...a must read!..." (Information Security Bulletin, July 2003) --This text refers to an out of print or unavailable edition of this title.

From the Back Cover

Two of the world’s top experts in cryptography teach you how to secure your digital future

In today’s world, security is a top concern for businesses worldwide. Without a secure computer system, you don’t make money, you don’t expand, and–bottom line–you don’t survive. Cryptography holds great promise as the technology to provide security in cyberspace. Amazingly enough, no literature exists about how to implement cryptography and how to incorporate it into real-world systems. With Practical Cryptography, an author team of international renown provides you with the first hands-on cryptographic product implementation guide, bridging the gap between cryptographic theory and real-world cryptographic applications.

This follow-up guide to the bestselling Applied Cryptography dives in and explains the how-to of cryptography. You’ll find discussions on:

  • Practical rules for choosing and using cryptographic primitives, from block ciphers to digital signatures
  • Implementing cryptographic algorithms and systems in a secure way on today’s computers
  • A consistent design philosophy to ensure that every part of the system achieves the required security level
  • Why security affects every part of the system, and why it has to be a primary goal of the project
  • How simple interfaces for cryptographic primitives reduce system complexity and increase system security

Inside This Book (Learn More)
First Sentence
This book is about security: about how to build secure cryptographic systems. Read the first page
Explore More
Concordance
Browse Sample Pages
Front Cover | Copyright | Table of Contents | Excerpt | Index | Back Cover
Search inside this book:

What Other Items Do Customers Buy After Viewing This Item?

Customer Reviews

3.6 out of 5 stars

Most helpful customer reviews

Format: Paperback
Classic books are often by definition, boring. Moby Dick is an American classic, and an insomniacs delight. Similarly, Bruce Schneier's Applied Cryptography is the definitive book on cryptography, but is far too complex and mathematical for most readers.
With that, Practical Cryptography is a superb text for anyone needing to know the core details of cryptography, but don't want to be bogged down with theoretical and abstract cryptographic ideas.
Where Applied Cryptography is a reference, Practical Cryptography is meant to be a narrative. The book follows the design of a secure cryptographic system from its algorithm selection, design philosophy, analysis, debugging and implementation.
The implementation aspect is crucial, as while there are many books available on the theory of cryptography, there is amazingly little about its practical implementation. While Practical Cryptography is a much easier read than Applied Cryptography, it is primarily geared for the applications
While Practical Cryptography is not as technical as its older brother Applied Cryptography, it is still not a For Dummies type of book. The average reader will likely find most of the book far too abstract for their needs. But for those that are looking for a practical and usable book about implementing cryptography, this is the definitive reference.
Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again.
Format: Paperback
Two of the leading world cryptographers take their time to show engineers of all kinds, not just programmers, how the security is to be implemented.
To quote: "one of the reasons for writing this book: to get other people to understand the insidious nature of security, and how important is to do it right."
The whole point of the book is to show how would the authors have built an encryption system if everything's to be done right. This means secure communication channel, key negotiation, random number generation and public key encryption. Basically what you have in this book is a blueprint for the best possible crypto system.
The authors describe a few cryptographic primitives, like block ciphers and hash functions, but not a whole lot and nothing in details. The authors just pick one of each (explaining exactly why the one they picked is the best) and stick with it throughout the book.
The book has surprisingly little math, if any. No details of any existing protocol in particular.
A lot of (literally dozens) attacks described, at any point, on any part, and for each a cure is proposed or "no cure possible" conclusion is made. Pretty informative.
Lots of advises, some more technical, some more philosophical. Lots of auxiliary info, like patents on crypto, dancing pigs :), implementation notes etc. Some chapters are about a dozen pages long. A touch, but it makes you think.
Oh, and it describes Mr. Schneier's new Yarrow random generator, and what's more - a shiny new extension to it called Fortuna. Fascinating stuff if you ask me.
There are some minor downsides too.
First, the pseudocode which is used for describing algorithms is strikingly bad.
Read more ›
Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again.
By A Customer on May 18 2003
Format: Hardcover
Well, I can't really recommend the book. It's readable enough,
but I can't figure out their target audience. Only someone actually
implementing a cryptographic system would get anything out of
this book. At the end of the book, they warn you that a good
implementation is so hard that you really should hire an
expert to do it. They also say "The world is full of of bad
security systems designed by people who have read Applied
Cryptography. Practical Cryptography is likely to have the
same effect."
They say they wrote the book as an introduction to the state
of the art ("[people] .. must learn it somewhere, and we didn't
know of any other suitable books.") Given that no one but a
programmer or mathematician would get through half the book,
it's unlikely to reach a general audience, or even the managers
who really need their advice.
The content level of the book is very uneven as well, with
general, strategic advice mixed with algorithm discussions. Yet
there's almost no nuts and bolts programming advice. They just
point you off to other sources for all of that.
They have these little "So what should I do?" sections at the
end of most chapters, but they are pretty cynical. The most
common advice amounts to "there's no way to know without analyzing
your requirements." The other comments are along the lines of
"the software industry is a mess", "the standards process is a mess",
"the patent process is a mess", "(technique X) hasn't been around
long enough to be analyzed much, is a patent minefield, or has been
broken, or nearly broken. Don't use it." And finally, that security
depends on the weakest link, which generally won't be the
cryptography anyway.
Read more ›
Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again.
By A Customer on May 11 2003
Format: Hardcover
With its heritage in "Applied Cryptography", the world's most famous book on the subject, I had high hopes for "Practical Cryptography".
Until page 149, when I read the following: "We can give you advice on how to write good cryptographic code...specifically, don't use C or C++". I looked for emoticons or signs of a subtle humour, but couldn't find them. Better get Linus to dust off his JDK then. :-) They have a point, but the book's title is surely a misnomer. Unfortunately this style of advice is pretty symptomatic of much of the book.
Like Burnett's "Cryptography" in the RSA Security series, this book takes a comprehensive but high level approach. I think this is the wrong way to entice curious engineers. The authors lack Burnett's enthusiasm, setting a dismal backdrop in which good security is impossible, and at times appear very condescending.
The highlight of this book is the advice that the authors give on choosing symmetric algorithms - for example they like AES for its 256 bit key size, but don't like its 128 bit block size. Some of their thoughts place them in a cryptographic minority, but their rationale for these thoughts are well worth reading, almost enlightening.
They emphasize that cryptographic algorithms need close and lengthy scrutiny by their peers and warn the reader against new and untested designs. And then present in great length, without warnings about misuse, their new and unscrutinized PRNG Fortuna.
The final chapter of the book runs along the lines of "we've told you this stuff, but you're going to get it really wrong, so just use an expert".
Read more ›
Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again.

Most recent customer reviews



Feedback