Applied Cryptography: Protocols, Algorithms, and Source Code in C, 20th Anniversary Edition
- 16h 14m
- Bruce Schneier
- John Wiley & Sons (US)
- 1996
From the world's most renowned security technologist, Bruce Schneier, this 20th Anniversary Edition is the most definitive reference on cryptography ever published and is the seminal work on cryptography. Cryptographic techniques have applications far beyond the obvious uses of encoding and decoding information. For developers who need to know about capabilities, such as digital signatures, that depend on cryptographic techniques, there's no better overview than Applied Cryptography, the definitive book on the subject. Bruce Schneier covers general classes of cryptographic protocols and then specific techniques, detailing the inner workings of real-world cryptographic algorithms including the Data Encryption Standard and RSA public-key cryptosystems. The book includes source-code listings and extensive advice on the practical aspects of cryptography implementation, such as the importance of generating truly random numbers and of keeping keys secure.
About the Author
Bruce Schneier is an internationally renowned security technologist, called a "security guru" by The Economist. He is the author of twelve books—including his seminal work, Applied Cryptography: Protocols, Algorithms, and Source Code in C, and Secrets & Lies: Digital Security in a Networked World as well as hundreds of articles, essays, and academic papers. His influential newsletter "Crypto-Gram" and blog "Schneier on Security" are read by over 250,000 people. Schneier is a fellow at the Berkman Center for Internet and Society at Harvard Law School, a program fellow at the New America Foundation's Open Technology Institute, a board member of the Electronic Frontier Foundation, and an Advisory Board member of the Electronic Privacy Information Center. He is also the Chief Technology Officer of Resilient Systems, Inc. You can read his blog, essays, and academic papers at www.schneier.com.
In this Book
-
Foundations
-
Protocol Building Blocks
-
Basic Protocols
-
Intermediate Protocols
-
Advanced Protocols
-
Esoteric Protocols
-
Key Length
-
Key Management
-
Algorithm Types and Modes
-
Using Algorithms
-
Mathematical Background
-
Data Encryption Standard (DES)
-
Other Block Ciphers
-
Still Other Block Ciphers
-
Combining Block Ciphers
-
Pseudo-Random-Sequence Generators and Stream Ciphers
-
Other Stream Ciphers and Real Random-Sequence Generators
-
One-Way Hash Functions
-
Public-Key Algorithms
-
Public-Key Digital Signature Algorithms
-
Identification Schemes
-
Key-Exchange Algorithms
-
Special Algorithms for Protocols
-
Example Implementations
-
Politics
-
Afterword by Matt Blaze