Goodreads helps you keep track of books you want to read.
Start by marking “Cryptography Engineering: Design Principles and Practical Applications” as Want to Read:
Cryptography Engineering: Design Principles and Practical Applications
Enlarge cover
Rate this book
Clear rating
Open Preview

Cryptography Engineering: Design Principles and Practical Applications

4.20  ·  Rating details ·  347 ratings  ·  23 reviews
The ultimate guide to cryptography, updated from an author team of the world's top cryptography experts. Cryptography is vital to keeping information safe, in an era when the formula to do so becomes more and more challenging. Written by a team of world-renowned cryptography experts, this essential guide is the definitive introduction to all major areas of cryptography: me ...more
Paperback, 353 pages
Published March 8th 2010 by Wiley (first published 2010)
More Details... Edit Details

Friend Reviews

To see what your friends thought of this book, please sign up.

Reader Q&A

To ask other readers questions about Cryptography Engineering, please sign up.

Be the first to ask a question about Cryptography Engineering

Community Reviews

Showing 1-30
Average rating 4.20  · 
Rating details
 ·  347 ratings  ·  23 reviews

More filters
Sort order
Start your review of Cryptography Engineering: Design Principles and Practical Applications
Vasil Kolev
This wasn't easy.

The math in it isn't hard, and nothing is very complex, but I lost count of the times I thought "shit, we're doing this wrong" or "this would be insane to get right". Also, I found some stuff missing, for example any other public-key system than RSA, PGP, or the XEX/XTS modes of AES (which are used a lot in storage systems).

But all in all, this seems to be the best book on the topic out there at the moment.
Feb 27, 2018 rated it really liked it
Excelente livro sobre criptografia e sistemas de segurança. A primeira metade, que fala muito sobre a teoria é massante, mas vale a pena ao menos tentar entender (e escanear quando ver que está pesado demais). Tendo feito isso, você consegue tirar muito mais da segunda parte, que fala sobre a parte prática: a segurança de um sistema é definida pelo seu elo mais fraco. Esse livro implanta a paranoia de sempre estar preocupado em encontrar qual é esse elo e como alguém poderia quebrá-lo.
Oct 07, 2017 rated it it was amazing
I generally don't review "work" books that I read in the course of implementing something but this book was quite phenomenal in how it extracts very practical suggestions for building cryptographic applications. I used this in a sizable project and probably read a few chapters way more than 5 times to get all the ideas, and I'm sure this saved me many days of debugging arcane issues. I recommend everyone who may see themselves implementing cryptographic and evaluating security software to read t ...more
May 17, 2017 rated it it was amazing
I find cryptography engineering a topic that is addressed mostly by either the academic publication or StackOverflow, and litter in between.
This is a very readable and clearly structured book by some authoritative authors in the fields. The must-have reference for all security engineers.
But, it desperately needs a refresh after 7 years since it was initially published.
Brian Palmer
Sep 19, 2014 rated it it was amazing
This is the sort of book that terrifies me at the idea of ever touching security code, but it was great for pointing out common mistakes people make when implementing clever algorithms.
Mar 23, 2020 rated it it was amazing
Shelves: science, reviewed
The aim of this book is to introduce the reader to cryptographic concepts and the way of thinking ("professional paranoia"), rather than give a comprehensive treatment of all available techniques and protocols. In this, I would say, it is successful. The book can be understood with high school knowledge, some things are simplified that are more satisfyingly explained in other books, but this is in line with the book's stated aim of restricting to the essentials. The practicioner's persepective i ...more
Warren Mcpherson
Aug 13, 2018 rated it really liked it
Shelves: bookchain
Practical review of implementation considerations for cryptographic systems. It covers a broad range of technologies and the descriptions are bound to be insightful even to people who are quite experienced but still accessible to those who are not.
There are descriptions of critical algorithms like Diffie-Hellman and RSA. The mathematics are described along with techniques to validate large calculations. Many examples show how thoughtful security systems have been compromised by simple, understan
Eric Henziger
Sep 13, 2020 rated it really liked it
A nice read to get the basics of cryptography and developing a security mindset. Despite its age, still accurate and relevant in most places. Written in a clear and fun way, and a reasonable amount of focus on the math parts of cryptography.
Dominique Roux
May 01, 2020 rated it really liked it
Shelves: cs-hacking
Very good exercises
The topic is perfectly to get a overview of the principles. It's not about the full depth and knowing all algorithms afterwards, but to know how to correctly use them and to get to know on what to look at if it comes to security.
Mar 18, 2019 rated it it was amazing
Shelves: tech
Essential reading on the topic of cryptography.
Aug 21, 2017 rated it it was amazing
Unbelievable awesome book. It explained lot of security and cryptography stuff that I was only vaguely aware of.
Matthew B.
Jun 27, 2017 rated it it was amazing
Excellent book. Many parts I already knew the basics of, but there was always something there, which I didn't.
Aug 17, 2017 rated it really liked it
Should be required reading for anyone implementing any form of systems, or even most people who need to work with them.
Jan 10, 2017 rated it liked it
Shelves: computers
3.5 / 5
May 05, 2012 rated it really liked it  ·  review of another edition
Shelves: compsec, math
The math in this book is at least at an upper division college math level. I thought the book was excellent, though I would have appreciated a chapter on gnupg, or PGP.

This book promises that it utterly will not leave the reader ready to go write good security software, but no book can do that.

The final chapter covered Standards and Patents. The standards info was quite cynical, and from my own experience also quite accurate. A bit more on patents would have been nice, as opposed to the absence
Kyle The Hacker
Apr 16, 2013 rated it it was amazing
Recommends it for: security engineers
I found Cryptography Engineering extremely useful in building and reinforcing the mindset for security engineers needing to build cryptographic systems. The authors (as expected) deliver an excellent explanation of the mindset required to securely and properly construct these systems, and what types of concerns should be on the minds of these engineers.
Matthew Talbert
Apr 15, 2015 rated it really liked it
Every software developer should read this book. If for no other reason, then read it for the constant reminders of how easy is it to screw up security. As the authors say, develop professional paranoia!
Sep 13, 2015 rated it it was amazing
Shelves: computer-science
أول كتاب حاسوبي أقرأه بشكل كامل. 3> ب_ب
الكتاب ممتع مرة بالنسبة لي وأستفدت منه كثير مع أنه كثير من المفاهيم الي فيه درستها من قبل بمادة أمن المعلومات بالجامعة.
أتفق مع تفكير الكاتب جدًا من ناحية الوسوسة أصلا كذا طبيعة تفكيري بالمجمل، بس من ناحية التطبيق بحياتي غالبا لا.
Oct 01, 2019 rated it really liked it
Really nice and accessible, explains the principles in a clear way and the narrative style is unusually interesting for its kind.
Jan 31, 2016 rated it really liked it
Nice overview of cryptography.
Daniel Schulte
Mar 28, 2013 rated it really liked it
Really good book on the concepts of software security. It's easy to read and easy to understand. The only hard part is implementing the principles it talks about.
DC James
Aug 12, 2012 rated it it was amazing
Extremely informative and practical.
Dan Farmer
rated it really liked it
Jan 01, 2017
Peter Kowalczyk
rated it it was amazing
Jul 29, 2015
Alexander Nilsson
rated it it was amazing
Mar 10, 2018
Alex Melville
rated it really liked it
Feb 04, 2019
Matthew D Kunzman
rated it liked it
Jul 27, 2020
rated it really liked it
Oct 15, 2019
George Neville-Neil
rated it really liked it
Feb 15, 2019
Vladislav Tkach
rated it really liked it
Mar 15, 2020
« previous 1 3 4 5 6 7 8 9 10 11 12 next »
There are no discussion topics on this book yet. Be the first to start one »

Readers also enjoyed

  • Applied Cryptography: Protocols, Algorithms, and Source Code in C
  • Hands-On Machine Learning with Scikit-Learn and TensorFlow
  • Security Engineering: A Guide to Building Dependable Distributed Systems 2ed
  • Serious Cryptography: A Practical Introduction to Modern Encryption
  • Novacene: The Coming Age of Hyperintelligence
  • In the Presence of Absence
  • 15 Commitments of Conscious Leadership
  • The End of Policing
  • Hacking: The Art of Exploitation
  • Nonviolent Communication: A Language of Life
  • Secrets and Lies: Digital Security in a Networked World
  • Permanent Record
  • Fooled by Randomness: The Hidden Role of Chance in Life and in the Markets
  • Skunk Works: A Personal Memoir of My Years at Lockheed
  • Cryptography Apocalypse: Preparing for the Day When Quantum Computing Breaks Today's Crypto
  • Designing Data-Intensive Applications
  • Introduction to Algorithms
  • Learning Linux Binary Analysis
See similar books…

Goodreads is hiring!

If you like books and love to build cool products, we may be looking for you.
Learn more »

News & Interviews

  Justin A. Reynolds burst onto the YA scene last year with his debut book Opposite of Always, a heartfelt novel about love and friendship...
28 likes · 2 comments
“A friend of ours encountered this problem with his home-built computer long ago. He wrote a BIOS that used a magic value in a particular memory location to determine whether a reset was a cold reboot or a warm reboot. After a while the machine refused to boot after power-up because the memory had learned the magic value, and the boot process therefore treated every reset as a warm reboot. As this did not initialize the proper variables, the boot process failed.

The solution in his case was to swap some memory chips around, scrambling the magic value that the SRAM had learned. For us, it was a lesson to remember: memory retains more data than you think.”
“The function of cryptographic protocols is to minimize the amount of trust required.” 0 likes
More quotes…