Goodreads helps you keep track of books you want to read.
Start by marking “Cryptography Engineering: Design Principles and Practical Applications” as Want to Read:
Cryptography Engineering: Design Principles and Practical Applications
Enlarge cover
Rate this book
Clear rating
Open Preview

Cryptography Engineering: Design Principles and Practical Applications

4.09 of 5 stars 4.09  ·  rating details  ·  113 ratings  ·  5 reviews
The ultimate guide to cryptography, updated from an author team of the world's top cryptography experts.Cryptography is vital to keeping information safe, in an era when the formula to do so becomes more and more challenging. Written by a team of world-renowned cryptography experts, this essential guide is the definitive introduction to all major areas of cryptography: mes ...more
Paperback, 353 pages
Published March 8th 2010 by Wiley Publishing (first published 2010)
more details... edit details

Friend Reviews

To see what your friends thought of this book, please sign up.

Reader Q&A

To ask other readers questions about Cryptography Engineering, please sign up.

Be the first to ask a question about Cryptography Engineering

This book is not yet featured on Listopia. Add this book to your favorite list »

Community Reviews

(showing 1-30 of 477)
filter  |  sort: default (?)  |  rating details
The math in this book is at least at an upper division college math level. I thought the book was excellent, though I would have appreciated a chapter on gnupg, or PGP.

This book promises that it utterly will not leave the reader ready to go write good security software, but no book can do that.

The final chapter covered Standards and Patents. The standards info was quite cynical, and from my own experience also quite accurate. A bit more on patents would have been nice, as opposed to the absence
Vasil Kolev
This wasn't easy.

The math in it isn't hard, and nothing is very complex, but I lost count of the times I thought "shit, we're doing this wrong" or "this would be insane to get right". Also, I found some stuff missing, for example any other public-key system than RSA, PGP, or the XEX/XTS modes of AES (which are used a lot in storage systems).

But all in all, this seems to be the best book on the topic out there at the moment.
Kyle The Hacker
Apr 16, 2013 Kyle The Hacker rated it 5 of 5 stars
Recommends it for: security engineers
I found Cryptography Engineering extremely useful in building and reinforcing the mindset for security engineers needing to build cryptographic systems. The authors (as expected) deliver an excellent explanation of the mindset required to securely and properly construct these systems, and what types of concerns should be on the minds of these engineers.
Brian Palmer
This is the sort of book that terrifies me at the idea of ever touching security code, but it was great for pointing out common mistakes people make when implementing clever algorithms.
DC James
Extremely informative and practical.
Kenny A
Kenny A marked it as to-read
Sep 03, 2015
Vladyslav Sitalo
Vladyslav Sitalo marked it as to-read
Sep 02, 2015
Brian marked it as to-read
Aug 28, 2015
Boffo marked it as to-read
Aug 26, 2015
Shyam marked it as to-read
Aug 25, 2015
Tom marked it as to-read
Aug 24, 2015
Gary Fixler
Gary Fixler marked it as to-read
Aug 23, 2015
Ais Ais
Ais Ais marked it as to-read
Aug 18, 2015
John is currently reading it
Aug 17, 2015
Magno Reis
Magno Reis marked it as to-read
Aug 17, 2015
Hugo marked it as to-read
Aug 11, 2015
Geeta marked it as to-read
Aug 10, 2015
Arturo marked it as to-read
Aug 09, 2015
Ray marked it as to-read
Aug 08, 2015
Christopher Woodall
Christopher Woodall marked it as to-read
Aug 08, 2015
Raymond marked it as to-read
Aug 05, 2015
San marked it as to-read
Aug 04, 2015
Lucas Uyezu
Lucas Uyezu marked it as to-read
Aug 01, 2015
Erick Herring
Erick Herring marked it as to-read
Jul 31, 2015
Michael Carlson
Michael Carlson marked it as to-read
Jul 30, 2015
« previous 1 3 4 5 6 7 8 9 15 16 next »
There are no discussion topics on this book yet. Be the first to start one »
  • Security Engineering: A Guide to Building Dependable Distributed Systems
  • Applied Cryptography: Protocols, Algorithms, and Source Code in C
  • Handbook of Applied Cryptography
  • The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws
  • The Tangled Web: A Guide to Securing Modern Web Applications
  • The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System
  • The Protocols (TCP/IP Illustrated, Volume 1)
  • Gray Hat Python: Python Programming for Hackers and Reverse Engineers
  • Reversing: Secrets of Reverse Engineering
  • Writing Secure Code
  • Metasploit: The Penetration Tester's Guide
  • A Discipline of Programming
  • The Architecture of Open Source Applications, Volume II
  • SQL Antipatterns
  • Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning
  • Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
  • Essentials of Programming Languages
  • The Linux Programming Interface: A Linux and UNIX System Programming Handbook

Goodreads is hiring!

If you like books and love to build cool products, we may be looking for you.
Learn more »
Practical Cryptography

Share This Book

“A friend of ours encountered this problem with his home-built computer long ago. He wrote a BIOS that used a magic value in a particular memory location to determine whether a reset was a cold reboot or a warm reboot. After a while the machine refused to boot after power-up because the memory had learned the magic value, and the boot process therefore treated every reset as a warm reboot. As this did not initialize the proper variables, the boot process failed.

The solution in his case was to swap some memory chips around, scrambling the magic value that the SRAM had learned. For us, it was a lesson to remember: memory retains more data than you think.”
“The function of cryptographic protocols is to minimize the amount of trust required.” 0 likes
More quotes…