From the Inside Flap
This smart, relevant guide is a must for all those committed to computer and cyber security. Bruce Schneier covers general classes of cryptographic protocols and then specific techniques, detailing the inner workings of real-world cryptographic algorithms including the Data Encryption Standard and RSA public-key cryptosystems. This book includes source-code listings and extensive advice on the practical aspects of cryptography implementation, such as the importance of generating truly random numbers and keeping keys secure. It describes dozens of cryptography algorithms, gives practical advice on how to implement them into cryptographic software, and shows how they can be used to solve security problems.
From the Back Cover
Praise for Applied Cryptography
"This book should be on the shelf of any computer professional involved in the use or implementation of cryptography."
"An encyclopedic survey ... could well have been subtitled 'The Joy of Encrypting' ... a useful addition to the library of any active or would-be security practitioner."
"...the best introduction to cryptography I've ever seen...The book the National Security Agency wanted never to be published..."
"...easily ranks as one of the most authoritative in its field..."
"...monumental...fascinating...comprehensive...the definitive work on cryptography for computer programmers..."
Dr. Dobb's journal
Written by the world's most renowned security technologist this special Anniversary Edition celebrates 20 years for the most definitive reference on cryptography ever published, Applied Cryptography, Protocols, Algorithms, and Source Code in C. Inside security enthusiasts will find a compelling introduction by author Bruce Schneider written specifically for this keepsake edition.
Included in this edition:
See all Product description
- Exclusive forward by Bruce Schneier
- Ways to defeat the key escrow mechanism
- Encryption algorithms, including algorithms from the former Soviet Union and South Africa, and the RC4 stream cipher
- Protocols for digital signatures, authentication, secure elections, digital cash, and more
- Detailed information on key management and cryptographic implementations