Applied Cryptography: Protocols, Algorithms, and Source Code in C". . .the best introduction to cryptography I've ever seen. . . .The book the National Security Agency wanted never to be published. . . ." -Wired Magazine ". . .monumental . . . fascinating . . . comprehensive . . . the definitive work on cryptography for computer programmers . . ." -Dr. Dobb's Journal ". . .easily ranks as one of the most authoritative in its field." -PC Magazine ". . .the bible of code hackers." -The Millennium Whole Earth Catalog This new edition of the cryptography classic provides you with a comprehensive survey of modern cryptography. The book details how programmers and electronic communications professionals can use cryptography-the technique of enciphering and deciphering messages-to maintain the privacy of computer data. It describes dozens of cryptography algorithms, gives practical advice on how to implement them into cryptographic software, and shows how they can be used to solve security problems. Covering the latest developments in practical cryptographic techniques, this new edition shows programmers who design computer applications, networks, and storage systems how they can build security into their software and systems. What's new in the Second Edition? * New information on the Clipper Chip, including ways to defeat the key escrow mechanism * New encryption algorithms, including algorithms from the former Soviet Union and South Africa, and the RC4 stream cipher * The latest protocols for digital signatures, authentication, secure elections, digital cash, and more * More detailed information on key management and cryptographic implementations |
Contents
Foundations | 1 |
Cryptographic Protocols | 19 |
Protocol Building Blocks | 21 |
Copyright | |
42 other sections not shown
Other editions - View all
Applied Cryptography: Protocols, Algorithms and Source Code in C Bruce Schneier Limited preview - 2017 |
Applied Cryptography: Protocols, Algorithms and Source Code in C Bruce Schneier Limited preview - 2015 |
Applied Cryptography: Protocols, Algorithms, and Source Code in C Bruce Schneier No preview available - 2015 |
Common terms and phrases
Alice and Bob Alice encrypts Alice sends authentication bank bits block cipher Bob's public key brute-force attack bytes C₁ called Carol cheat choose ciphertext complexity cryptosystem database decrypts the message differential cryptanalysis digital cash digital signature document encrypted message encryption algorithm encryption key factor hash value identity implementation input K₁ key length key management keystream LFSR linear linear cryptanalysis Mallory mode modulo money order one-time pad one-way function one-way hash function output password Peggy permutation plaintext block polynomial prime private key problem protocol public key public-key algorithms public-key cryptography quadratic residue random number result round S-boxes scheme secret key Section sends Bob sequence session key shift register signed standard step stream ciphers subkeys timestamp tion Trent trust unsigned long users valid verify Victor vote voter weak keys XORed zero-knowledge