All around us, sensitive and valuable data is stored and transmitted digitally. Computer messages speed through global networks. Corporate plans are stored on desktop hard disks. Sums of money are transferred electronically. How can this information be kept out of the hands of unauthorized users?
Applied Cryptography details how you can use C and C++ and cryptography — the technique of enciphering and deciphering messages — to maintain the privacy of computer data. Covering the latest developments in cryptographic techniques, Schneier shows you how to build security into the computer software and systems you use every day. This updated version covers:
New information on the Clipper Chip
New encryption algorithms from the former Soviet Union, including "GOST"
More detailed information on incorporating algorithms and programming fragments into working software
New information on the latest developments in message authentication (digital signatures) and digital cash
Unless otherwise noted above, most orders ship within 1 to 2 days. We will promptly notify you if there is a stock problem with any items on your order and provide you with an estimated delivery date. If you have a firm need by date, please provide such information in the comment section at checkout.
Page Count (est.): 758
Pub Date: 10/15/1995