Goodreads helps you keep track of books you want to read.
Start by marking “Practical Cryptography” as Want to Read:
Practical Cryptography
Enlarge cover
Rate this book
Clear rating
Open Preview

Practical Cryptography

4.17  ·  Rating details ·  288 Ratings  ·  16 Reviews
Security is the number one concern for businesses worldwide. The gold standard for attaining security is cryptography because it provides the most reliable tools for storing or transmitting digital information. Written by Niels Ferguson, lead cryptographer for Counterpane, Bruce Schneier's security company, and Bruce Schneier himself, this is the much anticipated follow-up ...more
Paperback, 385 pages
Published April 17th 2003 by Wiley (first published 2003)
More Details... edit details

Friend Reviews

To see what your friends thought of this book, please sign up.

Reader Q&A

To ask other readers questions about Practical Cryptography, please sign up.

Be the first to ask a question about Practical Cryptography

Community Reviews

Showing 1-30
Rating details
Sort: Default
Nov 07, 2012 rated it really liked it
(4.0) Learned some, well explained for the most part, probably will never need to use any of it though

Enjoyable, educational read. Main takeaways: don't even think of 'innovating' crypto. Follow well researched (and attacked) algorithms, protocols. If you really care about security, then think twice about even considering performance when making design decisions. I like their framework: force attacker to sift through 128 bits of entropy at each step, to keep the weakest link as strong as necessa
Sep 07, 2015 added it
While I actually understood perhaps a quarter of what I read, this book is so elegantly written that I could not put it down. Clear, concise, and to the point - good prose is a marvel to behold in this age of crappy writing!
Sergey Ignatchenko
Dec 11, 2016 rated it it was amazing
Among other things, this book has an authoritative description of Fortuna CSPRNG, and Fortuna is still the best one out there...
Koen Crolla
Nov 11, 2013 rated it liked it
Practical Cryptography is a sequel to Applied Cryptography , but not in the sense that it's more of the same, just updated to 2003. Where Applied dealt with cryptographic algorithms and fundamental concepts, Practical focuses on bringing those together to build larger systems, and some the pitfalls involved.
It's not strictly aimed at teaching readers to build such systems, though; more than anything, it tries to discourage them from doing so in the first place by demonstrating that there are mo
Greg Stoll
Dec 25, 2011 rated it it was amazing
This book is somewhat of a sequel to Applied Cryptography. Where that book is a long list of lots of different neat cryptographic algorithms, this is a much more practical book which gives solid advice on what algorithms, etc. to use.

It also hammers again and again that security is only as valuable as its weakest link, and often that won't been the cryptography. As such, it covers a ton of different ways security can be compromised, including using cryptographic functions in the wrong mode, not
Nov 17, 2009 rated it really liked it
This book is an excellent introduction to the application of cryptography to information security, highlighting its proper role and usage as well as covering design notes for cryptographically secure systems.
Sep 29, 2013 rated it it was amazing
Strikes that balance of 'high level' with 'technical depth'.
Zeh Fernando
Sep 10, 2013 rated it really liked it
Very practical, if outdated.
Luc Taylor
Oct 04, 2012 rated it it was amazing
This book was awesome! Pleasurable cover to cover reading - unlike a normal "tech" book.
Pete Morgan
Jan 03, 2013 rated it really liked it
Great book on cryptographic concepts and the challenges cryptosystems try to solve.
Stefan C
Dec 14, 2016 rated it it was amazing
Great book, scores high on storytelling, math parts are easy to follow.
Sep 06, 2007 rated it it was amazing
A good first read for security and cryptography if you have any math aptitude. Really well done - kind of makes you paranoid.
Dec 21, 2011 rated it really liked it
Easy to read book on practical crypto. Doesn't get too deep into the mathematical and theoretical weeds, but it presents practice information for daily use.
Nov 14, 2008 rated it really liked it
Shelves: computers
Good first read for cryptography...not as complete as some but better than most. While it won't take the place of 'Applied Cryptography' it will be a loaner to those interested in the subject.
Jul 02, 2012 rated it it was amazing
One of the hardest books I've ever attempted to read. Very in-depth analysis of the inner-workings of modern crypto methods. Definitely worth reading if you're interested. Not for the faint of heart.
rated it liked it
Jun 13, 2013
rated it really liked it
Jun 08, 2017
Muhammad Hasnain
rated it it was amazing
Oct 15, 2015
rated it really liked it
Mar 29, 2013
Robert G. Jakabosky
rated it really liked it
Mar 26, 2012
Thomas Fleckenstein
rated it it was amazing
Sep 20, 2014
Drew Cameron
rated it really liked it
Oct 11, 2017
Paul Lundin
rated it really liked it
May 12, 2015
rated it really liked it
Aug 11, 2015
rated it liked it
Feb 26, 2012
rated it it was amazing
May 13, 2015
rated it it was amazing
Oct 13, 2012
Mathieu Fenniak
rated it it was amazing
Nov 09, 2014
rated it liked it
Feb 06, 2018
Asteris Masouras
rated it really liked it
Dec 15, 2012
« previous 1 3 4 5 6 7 8 9 10 next »
There are no discussion topics on this book yet. Be the first to start one »
  • Handbook of Applied Cryptography
  • Applied Cryptography: Protocols, Algorithms, and Source Code in C
  • Security Engineering: A Guide to Building Dependable Distributed Systems
  • Writing Secure Code
  • Counter Hack Reloaded: A Step-By-Step Guide to Computer Attacks and Effective Defenses
  • Reversing: Secrets of Reverse Engineering
  • The Protocols (TCP/IP Illustrated, Volume 1)
  • Metasploit: The Penetration Tester's Guide
  • Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
  • Silence on the Wire: A Field Guide to Passive Reconnaissance and Indirect Attacks
  • The Implementation (TCP/IP Illustrated, Volume 2)
  • Unauthorised Access: Physical Penetration Testing for It Security Teams
  • Beautiful Security: Leading Security Experts Explain How They Think (Theory In Practice, #28)
  • The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System
  • Computers & Typesetting, Volume A: The TeXBook
  • The Codebreakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet
  • Discrete Mathematics with Applications
  • No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing

Goodreads is hiring!

If you like books and love to build cool products, we may be looking for you.
Learn more »