Goodreads helps you keep track of books you want to read.
Start by marking “Practical Cryptography” as Want to Read:
Practical Cryptography
Enlarge cover
Rate this book
Clear rating
Open Preview

Practical Cryptography

4.15  ·  Rating Details ·  242 Ratings  ·  14 Reviews
Security is the number one concern for businesses worldwide. The gold standard for attaining security is cryptography because it provides the most reliable tools for storing or transmitting digital information. Written by Niels Ferguson, lead cryptographer for Counterpane, Bruce Schneier's security company, and Bruce Schneier himself, this is the much anticipated follow-up ...more
Paperback, 385 pages
Published April 17th 2003 by Wiley (first published 2003)
More Details... edit details

Friend Reviews

To see what your friends thought of this book, please sign up.

Reader Q&A

To ask other readers questions about Practical Cryptography, please sign up.

Be the first to ask a question about Practical Cryptography

Community Reviews

(showing 1-30)
filter  |  sort: default (?)  |  Rating Details
Brian
Feb 03, 2013 Brian rated it really liked it
(4.0) Learned some, well explained for the most part, probably will never need to use any of it though

Enjoyable, educational read. Main takeaways: don't even think of 'innovating' crypto. Follow well researched (and attacked) algorithms, protocols. If you really care about security, then think twice about even considering performance when making design decisions. I like their framework: force attacker to sift through 128 bits of entropy at each step, to keep the weakest link as strong as necessa
...more
VLT
Sep 07, 2015 VLT added it
While I actually understood perhaps a quarter of what I read, this book is so elegantly written that I could not put it down. Clear, concise, and to the point - good prose is a marvel to behold in this age of crappy writing!
Koen Crolla
Aug 13, 2016 Koen Crolla rated it liked it
Practical Cryptography is a sequel to Applied Cryptography , but not in the sense that it's more of the same, just updated to 2003. Where Applied dealt with cryptographic algorithms and fundamental concepts, Practical focuses on bringing those together to build larger systems, and some the pitfalls involved.
It's not strictly aimed at teaching readers to build such systems, though; more than anything, it tries to discourage them from doing so in the first place by demonstrating that there are mo
...more
Greg Stoll
Dec 28, 2011 Greg Stoll rated it it was amazing
This book is somewhat of a sequel to Applied Cryptography. Where that book is a long list of lots of different neat cryptographic algorithms, this is a much more practical book which gives solid advice on what algorithms, etc. to use.

It also hammers again and again that security is only as valuable as its weakest link, and often that won't been the cryptography. As such, it covers a ton of different ways security can be compromised, including using cryptographic functions in the wrong mode, not
...more
kislam
Nov 17, 2009 kislam rated it really liked it
This book is an excellent introduction to the application of cryptography to information security, highlighting its proper role and usage as well as covering design notes for cryptographically secure systems.
Joe
Oct 19, 2015 Joe rated it it was amazing
A good first read for security and cryptography if you have any math aptitude. Really well done - kind of makes you paranoid.
Tyler
Dec 21, 2011 Tyler rated it really liked it
Easy to read book on practical crypto. Doesn't get too deep into the mathematical and theoretical weeds, but it presents practice information for daily use.
Robert
Apr 24, 2010 Robert rated it really liked it
Shelves: computers
Good first read for cryptography...not as complete as some but better than most. While it won't take the place of 'Applied Cryptography' it will be a loaner to those interested in the subject.
Cameron
Jul 02, 2012 Cameron rated it it was amazing
One of the hardest books I've ever attempted to read. Very in-depth analysis of the inner-workings of modern crypto methods. Definitely worth reading if you're interested. Not for the faint of heart.
Dwayne
Dwayne rated it liked it
Sep 30, 2014
Muhammad Hasnain
Muhammad Hasnain rated it it was amazing
Oct 15, 2015
David
Sep 29, 2013 David rated it it was amazing
Strikes that balance of 'high level' with 'technical depth'.
Adam
Adam rated it really liked it
Mar 29, 2013
Robert G. Jakabosky
Robert G. Jakabosky rated it really liked it
Mar 26, 2012
Thomas Fleckenstein
Thomas Fleckenstein rated it it was amazing
Sep 20, 2014
Paul Lundin
Paul Lundin rated it really liked it
May 18, 2015
Micah
Micah rated it really liked it
Aug 11, 2015
Kaustubh
Kaustubh rated it liked it
Feb 26, 2012
0xm4110c
0xm4110c rated it it was amazing
May 13, 2015
Andrew
Andrew rated it it was amazing
Oct 13, 2012
Mathieu Fenniak
Mathieu Fenniak rated it it was amazing
Nov 09, 2014
Asteris Masouras
Asteris Masouras rated it really liked it
Dec 15, 2012
Vamsi Rathnakar
Vamsi Rathnakar rated it it was amazing
Dec 21, 2015
Josh N.
Josh N. rated it really liked it
Feb 22, 2011
Anthony
Anthony rated it it was amazing
Jan 04, 2016
Laust
Laust rated it it was amazing
Mar 30, 2014
Frans
Frans rated it really liked it
Jan 06, 2014
Newelle
Newelle rated it really liked it
Oct 30, 2011
Steve O
Steve O rated it it was amazing
Apr 12, 2007
David
David rated it it was amazing
Jun 22, 2012
« previous 1 3 4 5 6 7 8 9 next »
There are no discussion topics on this book yet. Be the first to start one »
  • Handbook of Applied Cryptography
  • Applied Cryptography: Protocols, Algorithms, and Source Code in C
  • Security Engineering: A Guide to Building Dependable Distributed Systems
  • Writing Secure Code
  • Counter Hack Reloaded: A Step-By-Step Guide to Computer Attacks and Effective Defenses
  • Reversing: Secrets of Reverse Engineering
  • The Protocols (TCP/IP Illustrated, Volume 1)
  • Metasploit: The Penetration Tester's Guide
  • Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
  • Silence on the Wire: A Field Guide to Passive Reconnaissance and Indirect Attacks
  • The Implementation (TCP/IP Illustrated, Volume 2)
  • Unauthorised Access: Physical Penetration Testing for IT Security Teams
  • Beautiful Security: Leading Security Experts Explain How They Think (Theory In Practice, #28)
  • The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System
  • Computers & Typesetting, Volume A: The TeXBook
  • The Codebreakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet
  • Discrete Mathematics with Applications
  • No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing

Goodreads is hiring!

If you like books and love to build cool products, we may be looking for you.
Learn more »

Share This Book