Summer Reading B2G1 Free
 
 

Special Offers see all

Enter to WIN a $100 Credit

Subscribe to PowellsBooks.news
for a chance to win.
Privacy Policy

Visit our stores


    Recently Viewed clear list


    Original Essays | July 31, 2015

    Susan Casey: IMG Voices in the Ocean



    In 2010, the year dolphins came into my life, I spent my days working in midtown Manhattan, on the 36th floor of a big, impressive office building.... Continue »
    1. $19.57 Sale Hardcover add to wish list

    spacer

This item may be
out of stock.

Click on the button below to search for this title in other formats.


Check for Availability
Add to Wishlist

Applied Cryptography: Protocols, Algorithms, & Source Code in C

Applied Cryptography: Protocols, Algorithms, & Source Code in C Cover

 

Synopses & Reviews

Publisher Comments:

". . .the best introduction to cryptography I've ever seen. . . .The book the National Security Agency wanted never to be published. . . ." -Wired Magazine

". . .monumental . . . fascinating . . . comprehensive . . . the definitive work on cryptography for computer programmers . . ." -Dr. Dobb's Journal

". . .easily ranks as one of the most authoritative in its field." -PC Magazine

". . .the bible of code hackers." -The Millennium Whole Earth Catalog

This new edition of the cryptography classic provides you with a comprehensive survey of modern cryptography. The book details how programmers and electronic communications professionals can use cryptography-the technique of enciphering and deciphering messages-to maintain the privacy of computer data. It describes dozens of cryptography algorithms, gives practical advice on how to implement them into cryptographic software, and shows how they can be used to solve security problems. Covering the latest developments in practical cryptographic techniques, this new edition shows programmers who design computer applications, networks, and storage systems how they can build security into their software and systems.

What's new in the Second Edition?

* New information on the Clipper Chip, including ways to defeat the key escrow mechanism

* New encryption algorithms, including algorithms from the former Soviet Union and South Africa, and the RC4 stream cipher

* The latest protocols for digital signatures, authentication, secure elections, digital cash, and more

* More detailed information on key management and cryptographic implementations

Synopsis:

After a brief account of the history of cryptography, the latest data on encryption protocols and techniques are explained. Describes present-day applications ranging from electronic cash to anonymous messaging and current security concerns. The second section assumes fairly sophisticated knowledge of the C programming language and features numerous source code fragments. Practical implementations of the code are listed throughout the book's second half.

Description:

Includes bibliographical references (p. 571-604) and index.

About the Author

BRUCE SCHNEIER is President of Counter-pane Systems, a consulting firm specializing in cryptography and computer security. He is a contributing editor to Dr. Dobb's Journal, serves on the board of directors of the International Association of Cryptologic Research, and is a member of the Advisory Board for the Electronic Privacy Information Center. He is the author of E-Mail Security (Wiley) and is a frequent lecturer on cryptography, computer security, and privacy.

Table of Contents

Foundations.

CRYPTOGRAPHIC PROTOCOLS.

Protocol Building Blocks.

Basic Protocols.

Intermediate Protocols.

Advanced Protocols.

Esoteric Protocols.

CRYPTOGRAPHIC TECHNIQUES.

Keys.

Using Algorithms.

CRYPTOGRAPHIC ALGORITHMS.

Mathematical Background.

Data Encryption Standard (DES).

Other Block Algorithms.

Public-Key Algorithms.

More Public-Key Algorithms.

One-Way Hash Functions.

Random Sequence Generators and Stream Ciphers.

Special Algorithms for Protocols.

THE REAL WORLD.

Example Implementations.

Politics.

SOURCE CODE.

Source Code.

References.

Index.

Product Details

ISBN:
9780471597568
Subtitle:
Protocols, Algorithms, and Source Code in C
Publisher:
Wiley
Author:
Schneier, Bruce
Location:
New York :
Subject:
Telecommunication
Subject:
Computer security
Subject:
Cryptography
Subject:
Security
Subject:
Programming - Software Development
Subject:
Computer Security & Cryptography
Copyright:
Series Volume:
no. 11131
Publication Date:
19951101
Binding:
Paperback
Grade Level:
General/trade
Illustrations:
Yes
Pages:
618
Dimensions:
233 x 190 x 29 mm 39 oz

Related Subjects

Computers and Internet » Internet » General
Computers and Internet » Networking » Cryptography

Applied Cryptography: Protocols, Algorithms, & Source Code in C
0 stars - 0 reviews
$ In Stock
Product details 618 pages John Wiley & Sons, Incorporated - English 9780471597568 Reviews:
"Synopsis" by , After a brief account of the history of cryptography, the latest data on encryption protocols and techniques are explained. Describes present-day applications ranging from electronic cash to anonymous messaging and current security concerns. The second section assumes fairly sophisticated knowledge of the C programming language and features numerous source code fragments. Practical implementations of the code are listed throughout the book's second half.
spacer
spacer
  • back to top

FOLLOW US ON...

     
Powell's City of Books is an independent bookstore in Portland, Oregon, that fills a whole city block with more than a million new, used, and out of print books. Shop those shelves — plus literally millions more books, DVDs, and gifts — here at Powells.com.