APPLYCa.pdf

(273 KB) Pobierz
Page 1
Prev. Page
Home
Next Page
Next Chapter
APPLIED CRYPTOGRAPHY ...............................
Errata ................................................................
Contents in Brief ................................................
Contents ............................................................
PART V SOURCE CODE .................................
Foreword ...........................................................
Preface ..............................................................
How TO READ THIS BOOK .............................
Acknowledgments .............................................
About the Author ...............................................
2
3
6
7
14
15
19
20
22
23
Prev. Page
Next page
Home
Next Page
Next Chapter
from reviews of the first edition
of
APPLIED CRYPTOGRAPHY
Protocols, Algorithms, and Source Code in C
".
.
.
the definitive text on the subject. . . .”
-Software Development Magazine
good reading for anyone interested in cryptography.”
-BYTE
".
.
.
“This book should be on the shelf of any computer professional
involved in the use or implementation of cryptography.”
-IEEE Software
"
dazzling . . . fascinating. . . . This book
absolutely must
be on your
bookshelf . . .”
-PC Techniques
" . . .
comprehensive . . . an encyclopedic work . . .”
-The Cryptogram
" . . .
a fantastic book on cryptography today. It belongs in the library of
anyone interested in cryptography or anyone who deals with informa-
tion security and cryptographic systems.”
-Computers eS Security
“An encyclopedic survey . . . could well have been subtitled ‘The Joy of
Encrypting’ . . . a useful addition to the library of any active or would-be
security practitioner.”
-Cryptologia
" . . .
encyclopedic . . . readable . . . well-informed . . . picks up where
Dorothy Denning’s classic
Cryptography and Data Security
left off a
dozen years ago. . . . This book would be a bargain at twice the price.”
--;login:
“This is a marvelous resource-the best book on cryptography and its
application available today.”
-Dorothy Denning
Georgetown University
" . . Schneier’s book is an indispensable reference and resource. . . . I
recommend it highly.”
-Martin Hellman
Stanford University
Page 2
Prev. Page
Home
Next Page
Next Chapter
Errata
A list of the errors found in this book along with corresponding
corrections is updated periodically. For the most recent electronic
version, send email to:
schneier@counterpane.com
For the most recent printed version, send a stamped, self-addressed
envelope to:
AC Corrections
Counterpane Systems
101 E. Minnekaka Parkway
Minneapolis, MN 55419
Readers are encouraged to distribute electronic or printed versions
of this list to other readers of this book.
Page 3
Prev. Page
Next page
Home
Next Page
Next Chapter
Publisher: Katherine Schowalter
Editor: Phil Sutherland
Assistant Editor: Allison Roarty
Managing Editor: Robert Aronds
Text Design & Composition: North Market Street Graphics
Designations used by companies to distinguish their products are often claimed as trademarks. In all
instances where John Wiley & Sons, Inc. is aware of a claim, the product names appear in initial capital
or all capital letters. Readers, however, should contact the appropriate companies for more complete
information regarding trademarks and registration.
This text is printed on acid-free paper.
Copyright © 1996 by Bruce Schneier
Published by John Wiley & Sons, Inc.
All rights reserved. Published simultaneously in Canada.
This publication is designed to provide accurate and authoritative information in regard to the subject
matter covered. It is sold with the understanding that the publisher is not engaged in rendering legal,
accounting, or other professional service. If legal advice or other expert assistance is required, the services
of a competent professional person should be sought.
In no event will the publisher or author be liable for any consequential, incidental, or indirect damages
(including damages for loss of business profits, business interruption, loss of business information, and
the like) arising from the use or inability to use the protocols and algorithms in this book, even if the pub-
lisher or author has been advised of the possibility of such damages.
Some of the protocols and algorithms in this book are protected by patents and copyrights. It is the
responsibility of the reader to obtain all necessary patent and copyright licenses before implementing in
software any protocol or algorithm in this book. This book does not contain an exhaustive list of all appli-
cable patents and copyrights.
Some of the protocols and algorithms in this book are regulated under the United States Department of
State International Traffic in Arms Regulations. It is the responsibility of the reader to obtain all neces-
sary export licenses before implementing in software for export any protocol or algorithm in this book.
Reproduction or translation of any part of this work beyond that permitted by section 107 or 108 of the
1976 United States Copyright Act without the permission of the copyright owner is unlawful. Requests
for permission or further information should be addressed to the Permissions Department, John Wiley &
Sons. Inc.
Library of Congress Cataloging-in-Publication Data:
Schneier, Bruce
Applied Cryptography Second Edition : protocols, algorithms, and source code in C
/ Bruce Schneier.
Includes bibliographical references (p. 675).
ISBN O-471-12845-7 (cloth : acid-free paper). - ISBN
0-471-1 1709-9 (paper : acid-free paper)
1. Computer security. 2. Telecommunication-Security measures.
3. Cryptography. I. Title.
QA76.9.A25S35
1996
005.8’2-dc20
Printed in the United States of America
1098765
95-12398
CIP
Page 5
Zgłoś jeśli naruszono regulamin