Applied Cryptography – Bruce Schneier – 2nd Edition

This new of the classic provides you with a comprehensive survey of modern . The details how programmers and electronic communications professionals can use -the technique of enciphering and deciphering messages-to maintain the privacy of computer data.

It describes dozens of cryptography , gives practical advice on how to implement them into cryptographic software, and shows how they can be used to solve security . Covering the latest developments in practical cryptographic , this new edition shows programmers who design computer applications, networks, and storage systems how they can build security into their software and systems.

The second edition of Applied Cryptography is a major rewrite of the first edition: 50% more words, 7 more chapters, and over 1600 new references. Not only did I make corrections to the first edition and add developments since it was published, but I also included topics left out of the first edition.

CRYPTOGRAPHIC PROTOCOLS.
Protocol Building Blocks.
Basic Protocols.
Intermediate Protocols.
Protocols.
Esoteric Protocols.

CRYPTOGRAPHIC TECHNIQUES.
Key Length.
Key Management.
Algorithm Types and Modes.
Using Algorithms.

CRYPTOGRAPHIC ALGORITHMS.
Data Encryption Standard (DES).
Other Block Ciphers.
Other Stream Ciphers and Real Random-Sequence Generators.
Public-Key Algorithms.
Special Algorithms for Protocols.

THE REAL WORLD.
Example Implementations.
Politics.

SOURCE CODE.
Source Code.
References.

Title: Applied Cryptography: Protocols; Algorithms and Source Code in C
Author: Bruce Schneier
Edition: 2nd Edition
ISBN: 0471117099 | 978-0471117094
Type: eBook
Language: English
Algorithms
REVIEW 57%
57%

No Comments

  • Can you please leave feedback and comments here

    Your opinions and comments would be greatly appreciated. If you have comments or questions we've added this section so that we might have a dialogue with you.

Complete all fields

11 − seven =