Applied Cryptography – Bruce Schneier – 2nd Edition

Description

This new edition of the cryptography classic provides you with a comprehensive survey of modern cryptography. The details how programmers and communications professionals can use cryptography-the technique of enciphering and deciphering messages-to maintain the privacy of data.

It describes dozens of cryptography , gives practical advice on how to implement them into cryptographic , and shows how they can be used to solve security . Covering the latest developments in practical cryptographic techniques, this new edition shows programmers who computer applications, networks, and storage systems how they can build security into their software and systems.

The second edition of Applied Cryptography is a major rewrite of the first edition: 50% more words, 7 more chapters, and over 1600 new references. Not only did I make corrections to the first edition and add developments since it was published, but I also included topics left out of the first edition.

Table of Content


CRYPTOGRAPHIC PROTOCOLS.
Protocol Building Blocks.
Basic Protocols.
Intermediate Protocols.
Advanced Protocols.
Esoteric Protocols.

CRYPTOGRAPHIC TECHNIQUES.
Key Length.
Key Management.
Algorithm Types and Modes.
Using Algorithms.

CRYPTOGRAPHIC ALGORITHMS.
Data Encryption Standard (DES).
Other Block Ciphers.
Other Stream Ciphers and Real Random-Sequence Generators.
Public-Key Algorithms.
Special Algorithms for Protocols.

THE REAL WORLD.
Example Implementations.
Politics.

SOURCE CODE.
Source Code.
References.

No Comments

  • Feedback: Leave your comments here!

    Your opinions and comments would be greatly appreciated.
    If you have comments or questions we've added this section so that we might have a dialogue with you.

Complete all fields

seventeen + 3 =