Applied Cryptography – Bruce Schneier – 2nd Edition

Description

This new edition of the cryptography classic provides you with a comprehensive survey of modern cryptography. The details how programmers and professionals can use cryptography-the technique of enciphering and deciphering messages-to maintain the privacy of computer data.

It describes dozens of cryptography , gives practical advice on how to implement them into cryptographic , and shows how they can be used to solve security . Covering the latest developments in practical cryptographic techniques, this new edition shows programmers who design computer applications, networks, and storage systems how they can build security into their and systems.

The second edition of is a major rewrite of the first edition: 50% more words, 7 more chapters, and over 1600 new references. Not only did I make corrections to the first edition and add developments since it was published, but I also included topics left out of the first edition.

Table of Content


CRYPTOGRAPHIC PROTOCOLS.
Protocol Building Blocks.
Basic Protocols.
Intermediate Protocols.
Advanced Protocols.
Esoteric Protocols.

CRYPTOGRAPHIC TECHNIQUES.
Key Length.
Key Management.
Algorithm Types and Modes.
Using Algorithms.

CRYPTOGRAPHIC ALGORITHMS.
Data Encryption Standard (DES).
Other Block Ciphers.
Other Stream Ciphers and Real Random-Sequence Generators.
Public-Key Algorithms.
Special Algorithms for Protocols.

THE REAL WORLD.
Example Implementations.
Politics.

SOURCE CODE.
Source Code.
References.