Goodreads helps you keep track of books you want to read.
Start by marking “Cryptography Engineering: Design Principles and Practical Applications” as Want to Read:
Cryptography Engineering: Design Principles and Practical Applications
Enlarge cover
Rate this book
Clear rating
Open Preview

Cryptography Engineering: Design Principles and Practical Applications

4.16  ·  Rating Details ·  209 Ratings  ·  12 Reviews
The ultimate guide to cryptography, updated from an author team of the world's top cryptography experts. Cryptography is vital to keeping information safe, in an era when the formula to do so becomes more and more challenging. Written by a team of world-renowned cryptography experts, this essential guide is the definitive introduction to all major areas of cryptography: me ...more
Paperback, 353 pages
Published March 8th 2010 by Wiley Publishing (first published 2010)
More Details... edit details

Friend Reviews

To see what your friends thought of this book, please sign up.

Reader Q&A

To ask other readers questions about Cryptography Engineering, please sign up.

Be the first to ask a question about Cryptography Engineering

This book is not yet featured on Listopia. Add this book to your favorite list »

Community Reviews

(showing 1-30)
filter  |  sort: default (?)  |  Rating Details
Vasil Kolev
This wasn't easy.

The math in it isn't hard, and nothing is very complex, but I lost count of the times I thought "shit, we're doing this wrong" or "this would be insane to get right". Also, I found some stuff missing, for example any other public-key system than RSA, PGP, or the XEX/XTS modes of AES (which are used a lot in storage systems).

But all in all, this seems to be the best book on the topic out there at the moment.
Brian Palmer
Sep 19, 2014 Brian Palmer rated it it was amazing
This is the sort of book that terrifies me at the idea of ever touching security code, but it was great for pointing out common mistakes people make when implementing clever algorithms.
Chris
May 17, 2017 Chris rated it it was amazing
I find cryptography engineering a topic that is addressed mostly by either the academic publication or StackOverflow, and litter in between.
This is a very readable and clearly structured book by some authoritative authors in the fields. The must-have reference for all security engineers.
But, it desperately needs a refresh after 7 years since it was initially published.
Matthew B.
Jun 27, 2017 Matthew B. rated it it was amazing
Excellent book. Many parts I already knew the basics of, but there was always something there, which I didn't.
D
Jan 10, 2017 D rated it liked it
Shelves: computers
3.5 / 5
Ron
May 05, 2012 Ron rated it really liked it  ·  review of another edition
Shelves: math, compsec
The math in this book is at least at an upper division college math level. I thought the book was excellent, though I would have appreciated a chapter on gnupg, or PGP.

This book promises that it utterly will not leave the reader ready to go write good security software, but no book can do that.

The final chapter covered Standards and Patents. The standards info was quite cynical, and from my own experience also quite accurate. A bit more on patents would have been nice, as opposed to the absence
...more
Kyle The Hacker
Apr 16, 2013 Kyle The Hacker rated it it was amazing
Recommends it for: security engineers
I found Cryptography Engineering extremely useful in building and reinforcing the mindset for security engineers needing to build cryptographic systems. The authors (as expected) deliver an excellent explanation of the mindset required to securely and properly construct these systems, and what types of concerns should be on the minds of these engineers.
Matthew Talbert
Apr 15, 2015 Matthew Talbert rated it really liked it
Every software developer should read this book. If for no other reason, then read it for the constant reminders of how easy is it to screw up security. As the authors say, develop professional paranoia!
عبدالله
Sep 13, 2015 عبدالله rated it it was amazing
Shelves: computer-science
أول كتاب حاسوبي أقرأه بشكل كامل. 3> ب_ب
الكتاب ممتع مرة بالنسبة لي وأستفدت منه كثير مع أنه كثير من المفاهيم الي فيه درستها من قبل بمادة أمن المعلومات بالجامعة.
أتفق مع تفكير الكاتب جدًا من ناحية الوسوسة أصلا كذا طبيعة تفكيري بالمجمل، بس من ناحية التطبيق بحياتي غالبا لا.
Bug
Jan 31, 2016 Bug rated it really liked it
Nice overview of cryptography.
Daniel Schulte
Mar 28, 2013 Daniel Schulte rated it really liked it
Really good book on the concepts of software security. It's easy to read and easy to understand. The only hard part is implementing the principles it talks about.
DC James
Aug 12, 2012 DC James rated it it was amazing
Extremely informative and practical.
Ω
Ω rated it it was amazing
May 15, 2013
Dan Farmer
Dan Farmer rated it really liked it
Jan 01, 2017
Peter Kowalczyk
Peter Kowalczyk rated it it was amazing
Jul 29, 2015
Abdo Ali
Abdo Ali rated it did not like it
Nov 15, 2014
Graham Hay
Graham Hay rated it it was amazing
Apr 22, 2014
Violet Blue
Violet Blue rated it liked it
Jan 31, 2016
shacklesburst
shacklesburst rated it it was amazing
Jan 04, 2015
Rohan
Rohan rated it really liked it
Mar 22, 2015
James Suchy
James Suchy rated it really liked it
Dec 15, 2011
Hjalti Thorarinsson
Hjalti Thorarinsson rated it really liked it
Feb 24, 2014
John Downey
John Downey rated it really liked it
Jan 13, 2015
Zaki Manian
Zaki Manian rated it it was amazing
Jan 16, 2015
Patrick
Patrick rated it really liked it
Jun 12, 2017
Mohit
Mohit rated it liked it
Feb 07, 2017
Eric
Eric rated it liked it
Sep 18, 2010
Robert Love
Robert Love rated it liked it
Mar 08, 2015
Jason
Jason rated it really liked it
Jul 22, 2013
Binary
Binary rated it it was amazing
Apr 30, 2016
« previous 1 3 4 5 6 7 next »
There are no discussion topics on this book yet. Be the first to start one »
  • Security Engineering: A Guide to Building Dependable Distributed Systems
  • Handbook of Applied Cryptography
  • Applied Cryptography: Protocols, Algorithms, and Source Code in C
  • The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System
  • The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws
  • The Tangled Web: A Guide to Securing Modern Web Applications
  • Gray Hat Python: Python Programming for Hackers and Reverse Engineers
  • Understanding Cryptography: A Textbook For Students And Practitioners
  • SQL Antipatterns
  • The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities
  • Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning
  • Reversing: Secrets of Reverse Engineering
  • Metasploit: The Penetration Tester's Guide
  • Literate Programming
  • The Protocols (TCP/IP Illustrated, Volume 1)
  • Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code
  • The Architecture of Open Source Applications, Volume II
  • Writing Secure Code

Goodreads is hiring!

If you like books and love to build cool products, we may be looking for you.
Learn more »

Share This Book



“A friend of ours encountered this problem with his home-built computer long ago. He wrote a BIOS that used a magic value in a particular memory location to determine whether a reset was a cold reboot or a warm reboot. After a while the machine refused to boot after power-up because the memory had learned the magic value, and the boot process therefore treated every reset as a warm reboot. As this did not initialize the proper variables, the boot process failed.

The solution in his case was to swap some memory chips around, scrambling the magic value that the SRAM had learned. For us, it was a lesson to remember: memory retains more data than you think.”
1 likes
“The function of cryptographic protocols is to minimize the amount of trust required.” 0 likes
More quotes…