## Applied cryptography: protocols, algorithms, and source code in CAfter a brief account of the history of cryptography, the latest data on encryption protocols and techniques are explained. Describes present-day applications ranging from electronic cash to anonymous messaging and current security concerns. The second section assumes fairly sophisticated knowledge of the C programming language and features numerous source code fragments. Practical implementations of the code are listed throughout the book's second half. |

### From inside the book

Try this search over all volumes: **output**

Results 1-0 of 0

### What people are saying - Write a review

#### Review: Applied Cryptography: Protocols, Algorithms, and Source Code in C

User Review - Robert - GoodreadsThis is THE cryptography book to study/read/consume... If you are involved with cryptography in any way and haven't read this book then you are really missing out (as well as acting foolishly). This is a must read! Read full review

### Other editions - View all

Applied cryptography: protocols, algorithms, and source code in C Bruce Schneier No preview available - 2007 |

Applied Cryptography: Protocols, Algorithms and Source Code in C Bruce Schneier No preview available - 2015 |

### Common terms and phrases

Alice and Bob Alice encrypts Alice sends authentication bank block algorithm block cipher Bob's public key break brute-force attack bytes Carol cheat chips choose ciphertext complexity cryptographic algorithm cryptosystem database Dave decrypts the message differential cryptanalysis digital signature document encrypted message encryption and decryption encryption key example factor Figure hardware identity implementation input integer Kerberos keystream knapsack machine Mallet mode modulo money order one-time pad one-way function one-way hash function operations output password Peggy permutation plaintext plaintext block polynomial possible prime numbers private key problem protocol pseudo-random public key public-key algorithms public-key cryptography quadratic residue random bit random number random string result round S-boxes scheme secret key Section sends Bob sequence session key standard step stream ciphers sub-blocks timestamp Trent users valid verify Victor voters votes weak keys XORed zero-knowledge zero-knowledge proof