Applied Cryptography – Bruce Schneier – 2nd Edition

Description

This new edition of the classic provides you with a comprehensive survey of modern cryptography. The book details how programmers and communications professionals can use cryptography-the technique of enciphering and deciphering messages-to maintain the privacy of computer data.

It describes dozens of cryptography , gives practical advice on how to them into cryptographic software, and shows how they can be used to solve security problems. Covering the latest developments in practical , this new edition shows programmers who computer applications, networks, and storage systems how they can build security into their software and systems.

The second edition of Applied Cryptography is a major rewrite of the first edition: 50% more words, 7 more chapters, and over 1600 new references. Not only did I make corrections to the first edition and add developments since it was published, but I also included topics left out of the first edition.

Table of Contents


CRYPTOGRAPHIC PROTOCOLS.
Protocol Building Blocks.
Basic Protocols.
Intermediate Protocols.
Advanced Protocols.
Esoteric Protocols.

CRYPTOGRAPHIC TECHNIQUES.
Key Length.
Key Management.
Algorithm Types and Modes.
Using Algorithms.

CRYPTOGRAPHIC ALGORITHMS.
Data Encryption Standard (DES).
Other Block Ciphers.
Other Stream Ciphers and Real Random-Sequence Generators.
Public-Key Algorithms.
Special Algorithms for Protocols.

THE REAL WORLD.
Example Implementations.
Politics.

SOURCE CODE.
Source Code.
References.
guest
0 Comments
Inline Feedbacks
View all comments
0
Would love your thoughts, please comment.x
()
x