Applied cryptography: protocols, algorithms, and source code in CAfter a brief account of the history of cryptography, the latest data on encryption protocols and techniques are explained. Describes presentday applications ranging from electronic cash to anonymous messaging and current security concerns. The second section assumes fairly sophisticated knowledge of the C programming language and features numerous source code fragments. Practical implementations of the code are listed throughout the book's second half. 
What people are saying  Write a review
User ratings
5 stars 
 
4 stars 
 
3 stars 
 
2 stars 
 
1 star 

Review: Applied Cryptography: Protocols, Algorithms, and Source Code in C
User Review  Dave Peticolas  GoodreadsSchneier's Big Book of Codes. Daunting. Read full review
Review: Applied Cryptography: Protocols, Algorithms, and Source Code in C
User Review  Nelson Minar  GoodreadsWhat a wonderful book! I studied some crypto in college (public key and zero knowledge proofs) and found the field almost incomprehensible: lots of very specific number theories, very little overview ... Read full review
Common terms and phrases
Alice and Bob Alice encrypts Alice sends authentication bank block algorithm block cipher Bob's public key break bruteforce attack bytes Carol cheat chips choose ciphertext complexity cryptographic algorithm cryptosystem database Dave decrypts the message differential cryptanalysis digital signature document encrypted message encryption and decryption encryption key example factor Figure hardware identity implementation input integer Kerberos keystream knapsack machine Mallet mode modulo money order onetime pad oneway function oneway hash function operations output password Peggy permutation plaintext plaintext block polynomial possible prime numbers private key problem protocol pseudorandom public key publickey algorithms publickey cryptography quadratic residue random bit random number random string result round Sboxes scheme secret key Section sends Bob sequence session key standard step stream ciphers subblocks timestamp Trent users valid verify Victor voters votes weak keys XORed zeroknowledge zeroknowledge proof