##
**Applied cryptography. Protocols, algorithms and source code in C.
2nd ed.**
*(English)*
Zbl 0853.94001

New York, NY: Wiley. xxii, 758 p. (1996).

The first edition of this book was reviewed by the present reviewer (see Zbl 0789.94001)]. Unfortunately, almost all the complaints of the former review are still valid for this enlarged second edition. It contains new information on the Clipper Chip, new encryption algorithms, including algorithms from Russia and South Africa, and the RC4 stream cipher; the latest protocols for digital signatures, authentication, secure elections, digital cash etc. More detailed information on key management and cryptographic implementations.

Reviewer’s remarks:

1) On p. 7 the author briefly mentions the rubber-hose cryptanalysis. More detailed discussion of that approach would be useful.

2) Protocol failures are briefly mentioned, also one time pad as perfect encryption scheme is analysed on p. 15. Unfortunately, the most famous protocol failure which led to the cracking of a Soviet one time pad is not mentioned. It is called the VENONA case (see pp. 227-239 of the book of Peter Wright, “Spy Cather”, Dell Publishing, New York (1988)).

3) The first edition had a very detailed bibliography with 908 references. The second edition has 1653 references. It is really marvellous! Nevertheless several very important references are not included. First of all, F. L. Bauer’s bestseller “Kryptologie” [(1st and 2nd editions) Berlin: Springer (1993, 1994; Zbl 0780.94007, Zbl 0817.94010)] is not included. Bauer’s book came out with a different title (Entzifferte Geheimnisse) that can be considered as an enlarged 3rd edition of Kryptologie [Heidelberg: Springer (1995; Zbl 0834.94001)] (an English translation also exists).

It is worth mentioning that some further important items are not included: e.g. H. Rohrbach, [in: Naturforschung und Medizin in Deutschland 1939-1946, 233-257 (1953; Zbl 0053.08803) (the English translation was published in: Cryptologia 2, 21-37, 101-121 (1978))]; Jack Levine, United States Cryptographic Patents 1861-1989 [Cryptologia, Terre Haute, Indiana (1991)]; E. R. Berlekamp, Decoding binary Bose-Chaudry-Hocquenghem codes [IEEE Trans. Inf. Theory IT-11, 577-579 (1965; Zbl 0143.41402)]; B. Jansson, Random number generators, Stockholm (1966; Zbl 0154.43902); D. R. Hofstadter, Gödel, Escher, Bach. An eternal golden braid [Basic Books, New York (1979), Reprint 1981]; G. Simmons, Cryptology: The mathematics of secure communication [Math. Intell. 1, 233-246 (1979; Zbl 0411.94009)]; J. W. Smith and S. Wagstaff, How to crack an RSA cryptosystem [Congr. Numer. 40, 367-373 (1983)].

Errata are available via e-mail: schneier@counterpane.com.

Reviewer’s remarks:

1) On p. 7 the author briefly mentions the rubber-hose cryptanalysis. More detailed discussion of that approach would be useful.

2) Protocol failures are briefly mentioned, also one time pad as perfect encryption scheme is analysed on p. 15. Unfortunately, the most famous protocol failure which led to the cracking of a Soviet one time pad is not mentioned. It is called the VENONA case (see pp. 227-239 of the book of Peter Wright, “Spy Cather”, Dell Publishing, New York (1988)).

3) The first edition had a very detailed bibliography with 908 references. The second edition has 1653 references. It is really marvellous! Nevertheless several very important references are not included. First of all, F. L. Bauer’s bestseller “Kryptologie” [(1st and 2nd editions) Berlin: Springer (1993, 1994; Zbl 0780.94007, Zbl 0817.94010)] is not included. Bauer’s book came out with a different title (Entzifferte Geheimnisse) that can be considered as an enlarged 3rd edition of Kryptologie [Heidelberg: Springer (1995; Zbl 0834.94001)] (an English translation also exists).

It is worth mentioning that some further important items are not included: e.g. H. Rohrbach, [in: Naturforschung und Medizin in Deutschland 1939-1946, 233-257 (1953; Zbl 0053.08803) (the English translation was published in: Cryptologia 2, 21-37, 101-121 (1978))]; Jack Levine, United States Cryptographic Patents 1861-1989 [Cryptologia, Terre Haute, Indiana (1991)]; E. R. Berlekamp, Decoding binary Bose-Chaudry-Hocquenghem codes [IEEE Trans. Inf. Theory IT-11, 577-579 (1965; Zbl 0143.41402)]; B. Jansson, Random number generators, Stockholm (1966; Zbl 0154.43902); D. R. Hofstadter, Gödel, Escher, Bach. An eternal golden braid [Basic Books, New York (1979), Reprint 1981]; G. Simmons, Cryptology: The mathematics of secure communication [Math. Intell. 1, 233-246 (1979; Zbl 0411.94009)]; J. W. Smith and S. Wagstaff, How to crack an RSA cryptosystem [Congr. Numer. 40, 367-373 (1983)].

Errata are available via e-mail: schneier@counterpane.com.

Reviewer: J.Dénes (Budapest)

### MSC:

94-01 | Introductory exposition (textbooks, tutorial papers, etc.) pertaining to information and communication theory |

94A60 | Cryptography |