Difference between revisions of "Applied Cryptography: Protocols, Algorithms and Source Code in C, 2nd Edition"

From Embedded Lab Vienna for IoT & Security
Jump to navigation Jump to search
(Automatic literature creation)
(Automatic literature update)
 
Line 1: Line 1:
{{Literature|device_name=Applied Cryptography: Protocols, Algorithms and Source Code in C, 2nd Edition|image_link=https://stuff.elvis.science/uploads/accessories/accessory-image-OawrZDgOQm.png|type=Book|author=Bruce Schneier|language=English|isbn=978-1119096726|publisher=1996|pages=675|references=https://www.schneier.com/books/applied-cryptography/|description="This second edition of the cryptography classic provides you with a comprehensive survey of modern cryptography. The book details how programmers and electronic communications professionals can use cryptography--the technique of enciphering and deciphering messages--to maintain the privacy of computer data. It describes dozens of cryptography algorithms, gives practical advice on how to implement them in cryptographic software, and shows how they can be used to solve security problems. Covering the latest developments in practical cryptographic techniques, this new edition shows programmers who design computer applications, networks, and storage systems how they can build security into their software and systems.
{{Literature|device_name=Applied Cryptography: Protocols, Algorithms and Source Code in C, 2nd Edition|image_link=https://stuff.elvis.science/uploads/accessories/accessory-image-OawrZDgOQm.png|type=Book|author=Bruce Schneier|language=English|isbn=978-1119096726|publisher=1996|pages=675|references=https://www.schneier.com/books/applied-cryptography/|description= This second edition of the cryptography classic provides you with a comprehensive survey of modern cryptography. The book details how programmers and electronic communications professionals can use cryptography--the technique of enciphering and deciphering messages--to maintain the privacy of computer data. It describes dozens of cryptography algorithms, gives practical advice on how to implement them in cryptographic software, and shows how they can be used to solve security problems. Covering the latest developments in practical cryptographic techniques, this new edition shows programmers who design computer applications, networks, and storage systems how they can build security into their software and systems.
What's New in the Second Edition?
What's New in the Second Edition?


The second edition of Applied Cryptography is a major rewrite of the first edition: 50% more words, 7 more chapters, and over 1600 new references. Not only did I make corrections to the first edition and add developments since it was published, but I also included topics left out of the first edition.
The second edition of Applied Cryptography is a major rewrite of the first edition: 50% more words, 7 more chapters, and over 1600 new references. Not only did I make corrections to the first edition and add developments since it was published, but I also included topics left out of the first edition.


The second edition has lots of new algorithms (including GOST, Blowfish, RC4, and A5), more information on the Clipper Chip and key escrow, dozens of new protocols, more information on how PGP works, detailed information on key management and modes of operation, and new source code."}}
The second edition has lots of new algorithms (including GOST, Blowfish, RC4, and A5), more information on the Clipper Chip and key escrow, dozens of new protocols, more information on how PGP works, detailed information on key management and modes of operation, and new source code.}}

Latest revision as of 17:49, 1 February 2024

accessory-image-OawrZDgOQm.png

Information
Type Book
Author Bruce Schneier
Language English
Publisher 1996
ISBN 978-1119096726
Pages 675

Book Description

This second edition of the cryptography classic provides you with a comprehensive survey of modern cryptography. The book details how programmers and electronic communications professionals can use cryptography--the technique of enciphering and deciphering messages--to maintain the privacy of computer data. It describes dozens of cryptography algorithms, gives practical advice on how to implement them in cryptographic software, and shows how they can be used to solve security problems. Covering the latest developments in practical cryptographic techniques, this new edition shows programmers who design computer applications, networks, and storage systems how they can build security into their software and systems. What's New in the Second Edition?

The second edition of Applied Cryptography is a major rewrite of the first edition: 50% more words, 7 more chapters, and over 1600 new references. Not only did I make corrections to the first edition and add developments since it was published, but I also included topics left out of the first edition.

The second edition has lots of new algorithms (including GOST, Blowfish, RC4, and A5), more information on the Clipper Chip and key escrow, dozens of new protocols, more information on how PGP works, detailed information on key management and modes of operation, and new source code.

References

https://www.schneier.com/books/applied-cryptography/