The Full Wiki

Bruce Schneier: Wikis


Note: Many of our articles have direct quotes from sources you can cite, within the Wikipedia article! This article doesn't yet, but we're working on it! See more info or our list of citable articles.


From Wikipedia, the free encyclopedia

Bruce Schneier

Born January 15, 1963 (1963-01-15) (age 47)
Residence United States
Citizenship American
Fields Computer science
Institutions Counterpane Internet Security
Bell Labs
United States Department of Defense
BT Group
Alma mater American University
University of Rochester
Known for Cryptography, security

Bruce Schneier (born January 15, 1963, pronounced /ˈʃnаɪər/) is an American cryptographer, computer security specialist, and writer. He is the author of several books on computer security and cryptography, and is the founder and chief technology officer of BT Counterpane, formerly Counterpane Internet Security, Inc. He received his master's degree in computer science from the American University in Washington, DC in 1988[1].


Writings on computer security and general security

In 2000, Schneier published Secrets and Lies: Digital Security in a Networked World. In 2003, Schneier published Beyond Fear: Thinking Sensibly About Security in an Uncertain World.

Schneier writes a freely available monthly Internet newsletter on computer and other security issues, Crypto-Gram, as well as a security weblog, Schneier on Security. The weblog started out as a way to publish essays before they appeared in Crypto-Gram, making it possible for others to comment on them while the stories were still current, but over time the newsletter became a monthly email version of the blog, re-edited and re-organized.[2] Schneier is frequently quoted in the press on computer and other security issues, pointing out flaws in security and cryptographic implementations ranging from biometrics to airline security after the September 11, 2001 attacks. He also writes "Security Matters", a regular column for Wired Magazine.[3]

He has also criticized security approaches that try to prevent any malicious incursion, instead arguing that designing systems to fail well is more important.[4]

Schneier revealed on his blog that in the December 2004 issue of the SIGCSE Bulletin, three Pakistani academics, Khawaja Amer Hayat, Umar Waqar Anis, and S. Tauseef-ur-Rehman, from the International Islamic University in Islamabad, Pakistan, plagiarized an article written by Schneier and got it published.[5] The same academics subsequently plagiarized another article by Schneier on "Analysis of Real-time Transport Protocol Security" as well.[5] Schneier complained to the editors of the periodical, which generated a minor controversy.[6] The editor of the SIGCSE Bulletin removed the paper from their website and demanded official letters of admission and apology. Schneier noted on his blog that International Islamic University personnel had requested him "to close comments in this blog entry"; Schneier refused to close comments on the blog, but he did delete posts which he deemed "incoherent or hostile".[5]

Other writing

Schneier and Karen Cooper were nominated in 2000 for the Hugo Award, in the category of Best Related Book, for their Minicon 34 Restaurant Guide, a work originally published for the Minneapolis science fiction convention Minicon which gained a readership internationally in science fiction fandom for its wit and good humor.[7]

Cryptographic algorithms

Schneier has been involved in the creation of many cryptographic algorithms.

Hash functions:

Stream ciphers

Pseudo-Random number generators

Block ciphers


  • Schneier, Bruce. Applied Cryptography, John Wiley & Sons, 1994. ISBN 0-471-59756-2
  • Schneier, Bruce. Protect Your Macintosh, Peachpit Press, 1994. ISBN 1-56609-101-2
  • Schneier, Bruce. E-Mail Security, John Wiley & Sons, 1995. ISBN 0-471-05318-X
  • Schneier, Bruce. Applied Cryptography, Second Edition, John Wiley & Sons, 1996. ISBN 0-471-11709-9
  • Schneier, Bruce; Kelsey, John; Whiting, Doug; Wagner, David; Hall, Chris; Ferguson, Niels. The Twofish Encryption Algorithm, John Wiley & Sons, 1996. ISBN 0-471-35381-7
  • Schneier, Bruce; Banisar, David. The Electronic Privacy Papers, John Wiley & Sons, 1997. ISBN 0-471-12297-1
  • Schneier, Bruce. Secrets and Lies: Digital Security in a Networked World, John Wiley & Sons, 2000. ISBN 0-471-25311-1
  • Schneier, Bruce. Beyond Fear: Thinking Sensibly about Security in an Uncertain World, Copernicus Books, 2003. ISBN 0-387-02620-7
  • Ferguson, Niels; Schneier, Bruce. Practical Cryptography, John Wiley & Sons, 2003. ISBN 0-471-22357-3
  • Schneier, Bruce. Schneier on Security, John Wiley & Sons, 2008. ISBN 978-0-470-39535-6

See also


  1. ^ Charles C. Mann Homeland Insecurity
  2. ^ Blood, Rebecca (January 2007). "Bruce Schneier". Bloggers on Blogging. Retrieved 2007-04-19.  
  3. ^ Schneier, Bruce. "Security Matters". Wired Magazine. Retrieved 2008-03-10.  
  4. ^ Homeland Insecurity, Atlantic Monthly, September 2002
  5. ^ a b c "Schneier on Security: Plagiarism and Academia: Personal Experience". Retrieved 2009-06-09.  
  6. ^ "ONLINE - International News Network". 2007-06-09. Retrieved 2009-06-09.  
  7. ^ "Hugo Awards Nominations". Locus Magazine. 2000-04-21.  

External links


Up to date as of January 14, 2010

From Wikiquote

Bruce Schneier (born January 15, 1963) is an American cryptographer, computer security specialist, and writer.


  • It is poor civic hygiene to install technologies that could someday facilitate a police state.
    • Secrets and Lies (2000), p. 53
  • More people are killed every year by pigs than by sharks, which shows you how good we are at evaluating risk.
  • When my mother gets a prompt 'Do you want to download this?' she's going to say yes. It's disingenuous for Microsoft to give you all of these tools [in Internet Explorer] with which to hang yourself, and when you do, then say it's your fault.
  • Chaos is hard to create, even on the Internet. Here's an example. Go to Buy a book without using SSL. Watch the total lack of chaos.
  • ... if anyone thinks they can get an accurate picture of anyplace on the planet by reading news reports, they're sadly mistaken.
  • We can't keep weapons out of prisons; we can't possibly expect to keep them out of airports.
  • Technical problems can be remediated. A dishonest corporate culture is much harder to fix.
  • Beware the Four Horsemen of the Information Apocalypse: terrorists, drug dealers, kidnappers, and child pornographers. Seems like you can scare any public into allowing the government to do anything with those four.
  • I mean, the computer industry promises nothing. Did you ever read a shrink-wrapped license agreement? You should read one. It basically says, if this product deliberately kills your children, and we knew it would, and we decided not to tell you because it might harm sales, we´re not liable. I mean, it says stuff like that. They're absurd documents. You have no rights.
    • "Your computer is not secure", Hartford Advocate, 2006-04-27.
  • The point of terrorism is to cause terror, sometimes to further a political goal and sometimes out of sheer hatred. The people terrorists kill are not the targets; they are collateral damage. And blowing up planes, trains, markets or buses is not the goal; those are just tactics.
    The real targets of terrorism are the rest of us: the billions of us who are not killed but are terrorized because of the killing. The real point of terrorism is not the act itself, but our reaction to the act.
    And we're doing exactly what the terrorists want.
  • There are two kinds of cryptography in this world: cryptography that will stop your kid sister from reading your files, and cryptography that will stop major governments from reading your files.

External links

Wikipedia has an article about:

Got something to say? Make a comment.
Your name
Your email address