[109172] in Cypherpunks

home help back first fref pref prev next nref lref last post

CDR: Book Review: AC [/.]

daemon@ATHENA.MIT.EDU (Jim Choate)
Fri Mar 12 18:16:28 1999

From: Jim Choate <ravage@einstein.ssz.com>
To: cypherpunks@einstein.ssz.com
Date: Fri, 12 Mar 1999 17:03:28 -0600 (CST)
Reply-To: Jim Choate <ravage@einstein.ssz.com>


X-URL: http://slashdot.org/books/99/03/11/1623221.shtml

                 REVIEW: Applied Cryptography, 2nd Edition
                                      
                             by Bruce Schneier
                                      
                  (John Wiley & Sons, ISBN 0-471-11709-9)
                                  Nutshell
      Review: A fantastic introduction and a handy reference on one of
                computer science's most interesting fields.
                         Rating: Outstanding (8/10)
                            Review by: Tal Cohen
                                      
       More than any other field in computer science, cryptography is
   associated with computer warfare. Recent international treaties define
    cryptographic algorithms as weapons, and the laws of many countries
        prohibit either the development, the usage, or the export of
         cryptographic algorithms. Yet while feared by governments,
   cryptography is one of the most fascinating -- and useful -- fields of
                               algorithmics.
                                      
   The whole point of cryptography is to solve problems. (Actually,
   that's the whole point of computers -- something many peopletend to
   forget.) Cryptography solves problems that involve secrecy,
   authentication, integrity, and dishonest people. You can learn all
   about cryptographic algorithms and techniques, but these are academic
   unless they can solve a problem.
   
      Bruce Schneier's Applied Cryptography, in its second edition, is
   probably the best introduction to the field. Schneier is not merely an
     excellent technical writer, but also a researcherin the field; for
   example, he developed the public-domain Blowfish encryption algorithm.
    But unlike many works by other researchers, Schneier's work does not
    read like a dry paper for a scientific journal. His writing is very
         enjoyable (though the jokes are overdone at times) and his
                   explanations are almost always lucid.
                                      
[text deleted]


    ____________________________________________________________________
 
        The trouble with acting according to your conscience is that
        once you start doing it, nobody can trust you any more.

                                            Alexis A. Gilliland

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------


home help back first fref pref prev next nref lref last post