In weniger als einer Minute können Sie mit dem Lesen von Applied Cryptography: Protocols, Algorithms, and Source C... auf Ihrem Kindle beginnen. Sie haben noch keinen Kindle? Hier kaufen Oder fangen Sie mit einer unserer gratis Kindle Lese-Apps sofort an zu lesen.

An Ihren Kindle oder ein anderes Gerät senden


Kostenlos testen

Jetzt kostenlos reinlesen

An Ihren Kindle oder ein anderes Gerät senden

Jeder kann Kindle Bücher lesen  selbst ohne ein Kindle-Gerät  mit der KOSTENFREIEN Kindle App für Smartphones, Tablets und Computer.
Applied Cryptography: Protocols, Algorithms, and Source Code in C: Protocols, Algorithms and Source Code in C

Applied Cryptography: Protocols, Algorithms, and Source Code in C: Protocols, Algorithms and Source Code in C [Kindle Edition]

Bruce Schneier
4.7 von 5 Sternen  Alle Rezensionen anzeigen (50 Kundenrezensionen)

Kindle-Preis: EUR 32,67 Inkl. MwSt. und kostenloser drahtloser Lieferung über Amazon Whispernet

Weitere Ausgaben

Amazon-Preis Neu ab Gebraucht ab
Kindle Edition EUR 32,67  
Gebundene Ausgabe --  
Taschenbuch EUR 48,48  


Cryptographic techniques have applications far beyond the obvious uses of encoding and decoding information. For Internet developers who need to know about capabilities, such as digital signatures, that depend on cryptographic techniques, there's no better overview than Applied Cryptography, the definitive book on the subject. Bruce Schneier covers general classes of cryptographic protocols and then specific techniques, detailing the inner workings of real-world cryptographic algorithms including the Data Encryption Standard and RSA public-key cryptosystems. The book includes source-code listings and extensive advice on the practical aspects of cryptography implementation, such as the importance of generating truly random numbers and of keeping keys secure.


"the definitive publicly available text on the theory and practice of cryptography" (Computer Shopper, January 2002)


Mehr über den Autor

Entdecken Sie Bücher, lesen Sie über Autoren und mehr

Welche anderen Artikel kaufen Kunden, nachdem sie diesen Artikel angesehen haben?


Die hilfreichsten Kundenrezensionen
2 von 2 Kunden fanden die folgende Rezension hilfreich
5.0 von 5 Sternen Pflicht-Kauf in Punkto Kryptographie 4. Februar 2003
Format:Gebundene Ausgabe
Bruce Schneier ist neben der von ihm entwickelten Krypto-Algorithmen ebenso für sein relativ populistisches Fachbuch bekannt. Darin beschreibt er sehr detailliert und übergreifend die Funktionsweise der verschiedenen Protokolle und Methoden. Ein Pflicht-Kauf für all jene, die sich ernsthaft mit Kryptographie beschäftigen möchten. Laut einem Mail-Wechsel mit Schneier (Oktober 2002) wird es keine dritte Auflage dieses Werks geben, da das Thema explodiert ist und nicht mehr in einem einzelnen Band abgehandelt werden könne.
War diese Rezension für Sie hilfreich?
1 von 1 Kunden fanden die folgende Rezension hilfreich
4.0 von 5 Sternen The best introduction to cryptography I have read 21. Januar 1999
If you are already a cryppie or other security professional, this book will not add much to your knowledge. But if you are a programmer or other systems person with a desire to familiarize yourself with the field, I can't recommend this book highly enough. A reasonably solid mathematical background is required to fully understand the algorithms, but the book is structured in such a way that you can skip most of the heavily technical stuff and still get a lot out of the read.
Because this is essentially an introductory text, generality is the name of the game. Pretty much everything is covered, but to a low, or medium at best, degree of depth. (Only DES is covered thoroughly.) However, the reference list in the back is huge, and you can use it to easily track down any more detailed information that you're after.
War diese Rezension für Sie hilfreich?
1 von 1 Kunden fanden die folgende Rezension hilfreich
5.0 von 5 Sternen Essential Crypto Overview 2. Juli 2000
Clearly a monumental work. Easy reading style, thorough treatment of protocols and ciphers of all styles and purposes...if you read this and don't pick up something useful then I want to hire you!
Copious and meticulous references. Consistent style throughout is a big plus. Dry wit (Alice and Bob find a book on Artificial Inteligence lying discarded and unused on the road...)makes for fun reading.
The only thing I would wish for is a clearer delineation between protocols and ciphers in the public domain vs. patented.
War diese Rezension für Sie hilfreich?
5.0 von 5 Sternen The most comprehensive text on computer-era cryptology. 13. Dezember 1996
Von Ein Kunde
Habitues of sci.crypt will be familiar with Bruce Schneier's
*Applied Cryptography*; if any of them have but one text on crypto
for reference, it will almost certainly be *Applied Cryptography*.
It is the de facto standard reference on modern cryptography as
well as serving as an excellent introduction to the subject.

The art is very old - Julius Caesar was the first recorded user of
cryptography for military purposes - and reached a watershed when
computers were put to work in order to break German and Japanese
ciphers. Indeed, that was the first *real* application of electronic
computers. A natural development was the use of computers for the
development of cryptographic systems.

That is where Bruce Schneier's remarkable book begins. It is notable
for two reasons: the breadth and depth of coverage, and the high
standard of technical communication.

As a reference its scope is encyclopaedic, providing descriptions
and assessments of just about every non-military crypto system
developed since computers were first applied to the purpose. There
are also military-cum-government algorithms amongst the collection,
some from the old Soviet Union and others from South Africa. It is
not just an A-Z procession of algorithms; the author progresses
in a logical manner through the many technical aspects of cryptography.

It is common to find that masters of mysterious technical arts are
poor communicators. Bruce Schneier demonstrates exceptional skill
as a technical communicator. Here is a book about an esoteric
subject - one built on a foundation of theoretical mathematics - that
ordinary folk can read.
Lesen Sie weiter... ›
War diese Rezension für Sie hilfreich?
An excellent, informative and entertaining introduction to this field.
The first third covers, in reasonably technical detail, the theory and mathematical implementation of cryptosystems. Much of this isn't necessary for the casual reader, but its the clearest explanation of this arcane stuff you're going to find anywhere.
The second third covers real-world applications of cryptosystems - electronic voting, cyber-money, key management and a thousand other inventive uses. Sufficiently non-technical for even a salesman to understand.
The last third covers the politics of modern encryption, and is more intriguing, exciting and informative than any Tom Clancy novel. This last part alone is worth the price of the book.
Schneier's writing style is informal, informative and often humourous. It's hard to believe anyone can write about such a (potentially) dry subject and yet include some genuine jokes!
Buy this book.
War diese Rezension für Sie hilfreich?
5.0 von 5 Sternen Invaluable resource for almost everyone. 4. September 1998
Von Ein Kunde
The red cover of the book drew my attention while I was browsing the shelves of the library here. I borrowed the book and was immediately fascinated by the style of the book. Clear outlines, huge reference appendix for readers who want to delve further into particular subjects, not too much plain text on one page. It gives a perfect overview of the things a cryptographer, or just an interested amateur, needs to know about particular subjects.
There might be one little disadvantage (it wasn't for me though), and that's the rather superficial coverage of some of the concepts, especially the mathematical background (number theory, complexity theory) of cryptography. But the book is not intended to be a math book. If you want to study the mathematics of cryptography, read Konheim or Niederreiter. If you want to study the concepts that underly the many fields of cryptography, read Schneier.
War diese Rezension für Sie hilfreich?
Möchten Sie weitere Rezensionen zu diesem Artikel anzeigen?
Waren diese Rezensionen hilfreich?   Wir wollen von Ihnen hören.
Die neuesten Kundenrezensionen
4.0 von 5 Sternen Ein tolles Buch, sollte überarbeitet werden
Eines der wenigen Nicht-Fachbücher welche man verschlingt wie einen guten Roman.
Der erste Teil über die möglichen Anwendungen der Kryptographie ließ sich... Lesen Sie weiter...
Vor 21 Monaten von Lukas veröffentlicht
5.0 von 5 Sternen Best in crypto town
A must have book on cryptography.
Reads like a novel.
All you ever wanted to know about Alice, Bob, and other crypto characters and never dared to ask... Lesen Sie weiter...
Veröffentlicht am 14. Januar 2002 von maximinix
5.0 von 5 Sternen The essential bible for communications security
From theory to protocols to the source code of some of the most popular algorithms. Detailed analysis of some of the most secure cryptosystems ever to appear on paper (outside the... Lesen Sie weiter...
Am 2. Mai 2000 veröffentlicht
5.0 von 5 Sternen Stress on "Applied" in the title...
The book is maybe 15% theory, just enough to give you a grounding in what's going on, the rest is in-the-trenches crypto. Lesen Sie weiter...
Am 31. Januar 2000 veröffentlicht
2.0 von 5 Sternen Fails to explore the mathematics behind crypto
Although this book presents a broad introduction to various crypto methods, it devotes little or no time to the actual mathematics/implementation of a REAL crypto system. Lesen Sie weiter...
Am 29. November 1999 veröffentlicht
4.0 von 5 Sternen The Britannica of Cryptography
Schneier's book is a surprisingly down-to-earth encyclopedia of the data scrambling technology which secures electronic communication worldwide, and which the US Government has... Lesen Sie weiter...
Veröffentlicht am 27. November 1999 von Adam Scoville
5.0 von 5 Sternen 3ikdd834lq9df9412kas99304u5asklff9492l;asr99b94q'qwf9au4io4
Translates to: It was the best book I could find on cryptography for C :
Am 5. Oktober 1999 veröffentlicht
5.0 von 5 Sternen Amazing
I wouldn't really recommend reading this book from cover to cover, but it has some very interesting sections and can be used as an awesome reference guide.
Am 24. September 1999 veröffentlicht
5.0 von 5 Sternen If you buy only one cryptography book...
...this is the one to buy. A straightforward read, with clear and unambiguous descriptions of crytography concepts, algorithms and implementations. Lesen Sie weiter...
Am 9. September 1999 veröffentlicht
5.0 von 5 Sternen Fabulous!
This book is the definitive source on encryption and cryptanalysis. Bruce Schneier is amazing. I would definitely recommend this book to anyone wanting to know ANYTHING on the... Lesen Sie weiter...
Am 9. September 1999 veröffentlicht
Kundenrezensionen suchen
Nur in den Rezensionen zu diesem Produkt suchen

Beliebte Markierungen

 (Was ist das?)
it is insufficient to protect ourselves with laws; we need to protect ourselves with mathematics. &quote;
Markiert von 19 Kindle-Nutzern
the encryption key is often called the public key, and the decryption key is often called the private key. &quote;
Markiert von 8 Kindle-Nutzern
Symmetric algorithms can be divided into two categories. Some operate on the plaintext a single bit (or sometimes byte) at a time; these are called stream algorithms or stream ciphers. Others operate on the plaintext in groups of bits. The groups of bits are called blocks, and the algorithms are called block algorithms or block ciphers. &quote;
Markiert von 8 Kindle-Nutzern

Kunden diskutieren

Das Forum zu diesem Produkt
Diskussion Antworten Jüngster Beitrag
Noch keine Diskussionen

Fragen stellen, Meinungen austauschen, Einblicke gewinnen
Neue Diskussion starten
Erster Beitrag:
Eingabe des Log-ins

Kundendiskussionen durchsuchen
Alle Amazon-Diskussionen durchsuchen

Ähnliche Artikel finden