Applied cryptography: protocols, algorithms, and source code in CAfter a brief account of the history of cryptography, the latest data on encryption protocols and techniques are explained. Describes presentday applications ranging from electronic cash to anonymous messaging and current security concerns. The second section assumes fairly sophisticated knowledge of the C programming language and features numerous source code fragments. Practical implementations of the code are listed throughout the book's second half. 
What people are saying  Write a review
User ratings
5 stars 
 
4 stars 
 
3 stars 
 
2 stars 
 
1 star 

LibraryThing Review
User Review  Pondlife  LibraryThingI read this book back in 1998, and it was the first serious cryptography book I'd read. It's the classic reference book, and it covers a lot of ground. It's over 15 years old now, so it's missing some ... Read full review
LibraryThing Review
User Review  wweisser  LibraryThingReally excellent. On par with any classic manual of computer science. Read full review
Other editions  View all
Applied Cryptography: Protocols, Algorithms and Source Code in C Bruce Schneier Limited preview  2017 
Applied Cryptography: Protocols, Algorithms and Source Code in C Bruce Schneier Limited preview  2015 
Common terms and phrases
Alice and Bob Alice encrypts Alice sends authentication bank block algorithm block cipher Bob's public key break bruteforce attack bytes Carol cheat chips choose ciphertext complexity cryptographic algorithm cryptosystem database Dave decrypts the message differential cryptanalysis digital signature document encrypted message encryption and decryption encryption key example factor Figure hardware identity implementation input integer Kerberos keystream knapsack machine Mallet mode modulo money order onetime pad oneway function oneway hash function operations output password Peggy permutation plaintext plaintext block polynomial possible prime numbers private key problem protocol pseudorandom public key publickey algorithms publickey cryptography quadratic residue random bit random number random string result round Sboxes scheme secret key Section sends Bob sequence session key standard step stream ciphers subblocks timestamp Trent users valid verify Victor voters votes weak keys XORed zeroknowledge zeroknowledge proof