Applied Cryptography

Second Edition

Bruce Schneier
John Wiley & Sons, 1996
ISBN 0-471-11709-9
Paperback - 784 pages - $60.00
ISBN 0-471-12845-7
Hardcover - 784 pages - $85.00

Table of Contents - Preface - Foreword - Afterword
Errata - First Edition Errata
Source Code

This new edition of the cryptography classic provides you with a comprehensive survey of modern cryptography. The book details how programmers and electronic communications professionals can use cryptography -- the technique of enciphering and deciphering messages -- to maintain the privacy of computer data. It describes dozens of cryptography algorithms, gives practical advice on how to implement them in cryptographic software, and shows how they can be used to solve security problems. Covering the latest developments in practical cryptographic techniques, this new edition shows programmers who design computer applications, networks, and storage systems how they can build security into their software and systems.

What's New in the Second Edition?

The second edition of Applied Cryptography is a major rewrite of the first edition: 50% more words, 7 more chapters, and over 1600 new references. Not only did I make corrections to the first edition and add developments since it was published, but I also included topics left out of the first edition.

The second edition has lots of new algorithms (including GOST, Blowfish, RC4, and A5), more information on the Clipper Chip and key escrow, dozens of new protocols, more information on how PGP works, detailed information on key management and modes of operation, and new source code.

Corrected Printings

Wiley has published a corrected printing of Applied Cryptography, 2nd ed. They didn't correct everything, only changes that didn't affect page breaks. Still, I counted over 250 individual corrections.

The fifth printing or greater is the corrected version. To find what printing you own, turn to page iv (it's opposite the "Contents in Brief" page). The last line (under "Printed in the United States of America") is a series of numbers, counting down from 10. The lowest number is the printing. For example, you have a fifth printing if your last line looks like:

10 9 8 7 6 5
cover of Applied Cryptography


Powell's | Amazon | B&N |

Powell's | Amazon | B&N |

Foreign Editions

Simplified Chinese


Tal Cohen's Bookshelf

Praise for
Applied Cryptography

"...the best introduction to cryptography I've ever seen.... The book the National Security Agency wanted never to be published...."

--Wired Magazine

"...monumental...the definitive work on cryptography for computer programmers..."

-- Dr. Dobb's Journal

"...easily ranks as one of the most authorative in its field."

-- PC Magazine

"...the bible of code hackers."

-- The Millennium Whole Earth Catalog

more quotes

Photo of Bruce Schneier by Per Ervland.

Schneier on Security is a personal website. Opinions expressed are not necessarily those of Resilient Systems, Inc..