Goodreads helps you keep track of books you want to read.
Start by marking “Cryptography Engineering: Design Principles and Practical Applications” as Want to Read:
Cryptography Engineering: Design Principles and Practical Applications
Enlarge cover
Rate this book
Clear rating
Open Preview

Cryptography Engineering: Design Principles and Practical Applications

4.09 of 5 stars 4.09  ·  rating details  ·  96 ratings  ·  5 reviews
The ultimate guide to cryptography, updated from an author team of the world's top cryptography experts.Cryptography is vital to keeping information safe, in an era when the formula to do so becomes more and more challenging. Written by a team of world-renowned cryptography experts, this essential guide is the definitive introduction to all major areas of cryptography: mes ...more
Paperback, 353 pages
Published March 8th 2010 by Wiley Publishing (first published 2010)
more details... edit details

Friend Reviews

To see what your friends thought of this book, please sign up.

Reader Q&A

To ask other readers questions about Cryptography Engineering, please sign up.

Be the first to ask a question about Cryptography Engineering

This book is not yet featured on Listopia. Add this book to your favorite list »

Community Reviews

(showing 1-30 of 382)
filter  |  sort: default (?)  |  rating details
The math in this book is at least at an upper division college math level. I thought the book was excellent, though I would have appreciated a chapter on gnupg, or PGP.

This book promises that it utterly will not leave the reader ready to go write good security software, but no book can do that.

The final chapter covered Standards and Patents. The standards info was quite cynical, and from my own experience also quite accurate. A bit more on patents would have been nice, as opposed to the absence
Vasil Kolev
This wasn't easy.

The math in it isn't hard, and nothing is very complex, but I lost count of the times I thought "shit, we're doing this wrong" or "this would be insane to get right". Also, I found some stuff missing, for example any other public-key system than RSA, PGP, or the XEX/XTS modes of AES (which are used a lot in storage systems).

But all in all, this seems to be the best book on the topic out there at the moment.
Kyle The Hacker
Apr 16, 2013 Kyle The Hacker rated it 5 of 5 stars
Recommends it for: security engineers
I found Cryptography Engineering extremely useful in building and reinforcing the mindset for security engineers needing to build cryptographic systems. The authors (as expected) deliver an excellent explanation of the mindset required to securely and properly construct these systems, and what types of concerns should be on the minds of these engineers.
Brian Palmer
This is the sort of book that terrifies me at the idea of ever touching security code, but it was great for pointing out common mistakes people make when implementing clever algorithms.
DC James
Extremely informative and practical.
Alex Guglielmino
Alex Guglielmino marked it as to-read
Feb 22, 2015
Jacob Helwig
Jacob Helwig marked it as to-read
Feb 18, 2015
Fredrik Slättman
Fredrik Slättman is currently reading it
Feb 09, 2015
Katherine marked it as to-read
Feb 08, 2015
Behzad marked it as to-read
Feb 08, 2015
Bassem Alfiky
Bassem Alfiky marked it as to-read
Feb 17, 2015
Casey marked it as to-read
Feb 05, 2015
Alex marked it as to-read
Feb 07, 2015
Shirley marked it as to-read
Jan 31, 2015
Manish added it
Jan 28, 2015
Pepijn Looije
Pepijn Looije marked it as to-read
Jan 27, 2015
Mark marked it as to-read
Jan 26, 2015
Koen marked it as to-read
Jan 26, 2015
Jamie marked it as to-read
Jan 25, 2015
Computeristgeek marked it as to-read
Jan 25, 2015
Pulleasy marked it as to-read
Jan 24, 2015
Alyssa added it
Jan 21, 2015
« previous 1 3 4 5 6 7 8 9 12 13 next »
There are no discussion topics on this book yet. Be the first to start one »
  • Security Engineering: A Guide to Building Dependable Distributed Systems
  • Applied Cryptography: Protocols, Algorithms, and Source Code in C
  • Handbook of Applied Cryptography
  • The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws
  • Reversing: Secrets of Reverse Engineering
  • Gray Hat Python: Python Programming for Hackers and Reverse Engineers
  • Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
  • The Tangled Web: A Guide to Securing Modern Web Applications
  • Essentials of Programming Languages
  • Metasploit: The Penetration Tester's Guide
  • Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning
  • The Elements of Computing Systems: Building a Modern Computer from First Principles
  • Understanding the Linux Kernel
  • SQL Antipatterns
  • The Protocols (TCP/IP Illustrated, Volume 1)
  • Masterminds of Programming: Conversations with the Creators of Major Programming Languages
  • Hacking: The Art of Exploitation
  • Writing Secure Code
Practical Cryptography

Share This Book

“A friend of ours encountered this problem with his home-built computer long ago. He wrote a BIOS that used a magic value in a particular memory location to determine whether a reset was a cold reboot or a warm reboot. After a while the machine refused to boot after power-up because the memory had learned the magic value, and the boot process therefore treated every reset as a warm reboot. As this did not initialize the proper variables, the boot process failed.

The solution in his case was to swap some memory chips around, scrambling the magic value that the SRAM had learned. For us, it was a lesson to remember: memory retains more data than you think.”
“The function of cryptographic protocols is to minimize the amount of trust required.” 0 likes
More quotes…