Applied cryptography: protocols, algorithms, and source code in CAfter a brief account of the history of cryptography, the latest data on encryption protocols and techniques are explained. Describes presentday applications ranging from electronic cash to anonymous messaging and current security concerns. The second section assumes fairly sophisticated knowledge of the C programming language and features numerous source code fragments. Practical implementations of the code are listed throughout the book's second half. 
What people are saying  Write a review
User ratings
5 stars 
 
4 stars 
 
3 stars 
 
2 stars 
 
1 star 

Review: Applied Cryptography: Protocols, Algorithms, and Source Code in C
User Review  GoodreadsSchneier's Big Book of Codes. Daunting. Read full review
Review: Applied Cryptography: Protocols, Algorithms, and Source Code in C
User Review  Gil  GoodreadsIf you need to write encryption applications, or, want to understand how encryption works, see the math, algorithms, source code so you can analyze in your favourite debugger, then this book is for ... Read full review
Common terms and phrases
Alice and Bob Alice encrypts Alice sends authentication bank block algorithm block cipher Bob's public key break bruteforce attack bytes Carol cheat chips choose ciphertext complexity cryptographic algorithm cryptosystem database Dave decrypts the message differential cryptanalysis digital signature document encrypted message encryption and decryption encryption key example factor Figure hardware identity implementation input integer Kerberos keystream knapsack machine Mallet mode modulo money order onetime pad oneway function oneway hash function operations output password Peggy permutation plaintext plaintext block polynomial possible prime numbers private key problem protocol pseudorandom public key publickey algorithms publickey cryptography quadratic residue random bit random number random string result round Sboxes scheme secret key Section sends Bob sequence session key standard step stream ciphers subblocks timestamp Trent users valid verify Victor voters votes weak keys XORed zeroknowledge zeroknowledge proof