<< 1 >>
Rating: Summary: AES also-ran, hint: use Rijndael Review: Bruce Schneier is the Yoda of crpytography and information security, if you've heard him there's no need to ask anyone else. This book would probably only appeal to the genuinely avid crypto fan, its Greek to anyone else. It is a thorough exposition of the making of the Twofish cypher, the latest attempt to secure information as absolutely as possible. You must be well versed in cryptography to get anything out of the work.
Rating: Summary: fascinating to a limited audience Review: Bruce Schneier is the Yoda of crpytography and information security, if you've heard him there's no need to ask anyone else. This book would probably only appeal to the genuinely avid crypto fan, its Greek to anyone else. It is a thorough exposition of the making of the Twofish cypher, the latest attempt to secure information as absolutely as possible. You must be well versed in cryptography to get anything out of the work.
Rating: Summary: AES also-ran, hint: use Rijndael Review: In case you've been asleep for the past few years, the AES competition is over. Rijndael won, two-fish lost. End of story. This book serves only as a historical artifact depicting Schneier's failed attempt at lasting fame and glory. Listen to the *real* crypto experts (i.e. the AES judges) and stick with the solution that they've chosen. The source code in this book is an ungodly mess that I wouldn't wish on my worst enemy. It is a mish-mash of poorly explained macros and pre-processor directives. It would take a divine miracle to get the source to compile (Scheier neglects to go into the details of how to do a build, he just throws the source code at you and expects you to figure it out). Perhaps, then, it's no surprise why team-Schneier lost AES. This book was just PR for the AES competition. Now that it's over, the only thing this book is good for is to prop a door open.
Rating: Summary: A important book to decipher Review: This book is not a how-to-do thing. You will learn why this cypher was created, how it was created it all the details. Not an introductory book. But very worth to who ever want to enter modern applied cryptographic field.
<< 1 >>
|