Here are 64 books that Cryptography fans have personally recommended if you like
Cryptography.
Shepherd is a community of 12,000+ authors and super readers sharing their favorite books with the world.
I taught myself to code back in 1994 while working the graveyard shift as a geologist in the environmental industry. My job consisted of sitting in a chair during the dark hours of the night in a shopping center in Stockton, CA, watching another geologist take samples from wells in the parking lot. A friend of mine suggested I learn to code because I liked computers. I don’t mean to make this out to be a “it’s so simple anyone can do it!” You need to have a relentless drive to learn, which is why I wrote my book, The Imposter’s Handbook - as an active step to learning what I didn’t know I didn’t know.
This book makes me jealous as the author has an incredible ability to communicate the densest of topics (Cryptography) in an engaging, wonderful way.
It draws you in and you find yourself transported to battlefields and war rooms of the past. I’ve always taken cryptography for granted - I type httpsinto my browser and navigate to a site and all’s well. I know things are reasonably secure - but why?
It turns out that RSA, the algorithm that underpins things like SSL and SSH, is a landmark of human achievement and did something that millennia of mathematicians and scientists could not: provide secure, end-to-end encryption. A wonderful story.
In his first book since the bestselling Fermat's Enigma, Simon Singh offers the first sweeping history of encryption, tracing its evolution and revealing the dramatic effects codes have had on wars, nations, and individual lives. From Mary, Queen of Scots, trapped by her own code, to the Navajo Code Talkers who helped the Allies win World War II, to the incredible (and incredibly simple) logisitical breakthrough that made Internet commerce secure, The Code Book tells the story of the most powerful intellectual weapon ever known: secrecy.
Throughout the text are clear technical and mathematical explanations, and portraits of the remarkable…
It is April 1st, 2038. Day 60 of China's blockade of the rebel island of Taiwan.
The US government has agreed to provide Taiwan with a weapons system so advanced that it can disrupt the balance of power in the region. But what pilot would be crazy enough to run…
I am a cryptography professor, which sadly doesn’t mean I spend my time breaking secret messages (at least not every day). I first studied cryptography simply because it was fun and interesting. It still is – but today it is unbelievably important, underpinning the security of almost everything we do in the digital world. I believe that developing a notion of 'cyber common sense’ is a vital life skill since so much of what we do is digital. A basic understanding of cryptography and its societal impact provides a superb foundation for making sense of digital security, so I’ve selected some of my favourite reads to get you started.
I always knew cryptography was political, but I had no idea how political until I read this book. Seeing the subject I am so fascinated by through the words of a political journalist was truly eye-opening. Steven Levy navigates a deeply fascinating period in modern technological history – the late twentieth-century battles between governments trying to maintain power and control over communications, and technologists who saw the fledgling internet as an opportunity to build a new world. Cryptography, which protects digital communications, sat plum on the frontline between these two communities, hence battles over cryptography turned into so-called 'crypto wars’ (although nobody died). Nobody who read this book was surprised with much that Edward Snowden had to say to the world in 2013 – Snowden was just reportage of the latest chapter in the same ongoing conflict.
If you've ever made a secure purchase with your credit card over the Internet, then you have seen cryptography, or "crypto", in action. From Stephen Levy the author who made "hackers" a household word comes this account of a revolution that is already affecting every citizen in the twenty-first century. Crypto tells the inside story of how a group of "crypto rebels"—nerds and visionaries turned freedom fighters—teamed up with corporate interests to beat Big Brother and ensure our privacy on the Internet. Levy's history of one of the most controversial and important topics of the digital age reads like the…
I have worked in cybersecurity for over 20 years and think it’s one of the most important topics in our modern world. Everyone needs to be secure–from young kids to elderly people avoiding online scams. As a practicing Chief Security Officer, I work with security technology and people every day, and I’m getting to live my childhood dream of being a writer helping people understand these complex challenges. Security is a part of the foundation of Maslow’s Hierarchy of Needs and allows everyone to live up to their full potential as humans. People are the most important part of security, and you don’t need a degree in computer science to be cyber secure.
The first person to ever catch a hacker wasn’t an FBI or CIA agent. It was an astronomer, and his name was Clifford Stoll. This book is a biographical account of how he took on a German hacker who was selling secrets to the KGB in the 1980s. I love this book because it shows how anyone can play a role in cybersecurity.
As a kid, I watched the TV adaptation of the book for PBS’s NOVA program and went into cybersecurity in large part because of Stoll. Because cybersecurity wasn’t a profession at the time, Stoll created his own innovative techniques, like building the first computer honeypot to help catch the hacker in action. When his book was made into a PBS documentary, as a thank you for putting up with him and all the crazy things he had to do to track the hacker, he had all of…
Before the Internet became widely known as a global tool for terrorists, one perceptive U.S. citizen recognized its ominous potential. Armed with clear evidence of computer espionage, he began a highly personal quest to expose a hidden network of spies that threatened national security. But would the authorities back him up? Cliff Stoll's dramatic firsthand account is "a computer-age detective story, instantly fascinating [and] astonishingly gripping" (Smithsonian).
Cliff Stoll was an astronomer turned systems manager at Lawrence Berkeley Lab when a 75-cent accounting error alerted him to the presence of an unauthorized user on his system. The hacker's code name…
A Duke with rigid opinions, a Lady whose beliefs conflict with his, a long disputed parcel of land, a conniving neighbour, a desperate collaboration, a failure of trust, a love found despite it all.
Alexander Cavendish, Duke of Ravensworth, returned from war to find that his father and brother had…
I am a cryptography professor, which sadly doesn’t mean I spend my time breaking secret messages (at least not every day). I first studied cryptography simply because it was fun and interesting. It still is – but today it is unbelievably important, underpinning the security of almost everything we do in the digital world. I believe that developing a notion of 'cyber common sense’ is a vital life skill since so much of what we do is digital. A basic understanding of cryptography and its societal impact provides a superb foundation for making sense of digital security, so I’ve selected some of my favourite reads to get you started.
Most digital technologies crucially rely on cryptography for their security, but few are entirely built from cryptography. Bitcoin is – simply – cryptography. The idea that money can be created from cryptography is a little bit mind-blowing, even for a cryptographer like myself. Dominic Frisby wrote one of the first, and finest, books about the leading cryptocurrency Bitcoin. He explores not just the incredible story of the founding of Bitcoin, but also gives an accessible explanation of how it works and what role it might play in our wider financial system. If you have let the term 'cryptocurrency’ wash over you but remain just a tiny bit curious, this book is your best route towards enlightenment. Whether you then decide to invest in any cryptocurrency is another matter altogether!
Following the economic crisis of 2008, the website `bitcoin.org' was registered by a mysterious computer programmer called Satoshi Nakamoto. A new form of money was born: electronic cash. Does Bitcoin have the potential to change how the world transacts financially? Or is it just a passing fad, even a major scam?
In Bitcoin: The Future of Money?, MoneyWeek's Dominic Frisby's explains this controversial new currency and how it came about, interviewing some of the key players in its development while casting light on its strange and murky origins, in particular the much-disputed identity of Nakamoto himself.
The defining event in my parents’ lives, World War II has always been in my blood. When I was growing up, it would surface now and again when old comrades came to visit or when we came across souvenirs from the war. My favorite was a carefully etched German map showing sea lanes in the Caribbean, exotic and somehow menacing at the same time. My curiosity piqued, I knew I wanted to be in the thick of history—which meant reading and writing about the war, getting my PhD in history, and becoming a Marine and an intelligence officer.
David was a pioneer. Before Codebreakers there was next to nothing in print about codebreaking. Focused on World War II, he introduced a generation of readers to a secret realm, inviting us to look behind the big green door for the first time. This generous and loyal friend alerted me to the need for comprehensive overview of American intelligence in World War II.
Codebreaking is the most important form of secret intelligence in the world. It produces much more and more trustworthy information than spies, and this intelligence exerts great influences upon the policies of governments.
I started learning cryptography in the early 2000s with books borrowed from my university’s library, and with information I could find online. Since then I’ve practiced cryptography for 15 years in a variety of contexts: as an academic researcher, while working on my PhD; as a cryptography engineer for software and hardware pay-TV systems; as a consultant for private and public sector clients; as a vulnerability researcher in my spare time; as a code auditor for cryptography projects; as a start-up founder in the domain of IoT security; and as CSO (chief security officer) of a fintech start-up. I live in Lausanne, Switzerland, and besides crypto I enjoy literature, rock climbing, and playing classical guitar.
Although David is a friend, I only recommend his book because it’s great, both in terms of content and presentation. Real-World Cryptography is today’s reference book about cryptographic tools and applications: Modern schemes such as the SHA-3 hash function and the Noise protocol framework, end-to-end encryption protocols, cryptocurrencies’ cryptography mechanisms, as well as emerging techniques like fully-homomorphic encryption and multi-party computation; Wong’s book delivers a practice-oriented, accessible introduction, enriched by many visual illustrations (including original comics strips!), and exercises (with their solutions).
If you're browsing the web, using public APIs, making and receiving electronic payments, registering and logging in users, or experimenting with blockchain, you're relying on cryptography. And you're probably trusting a collection of tools, frameworks, and protocols to keep your data, users, and business safe. It's important to understand these tools so you can make the best decisions about how, where, and why to use them. Real-World Cryptography teaches you applied cryptographic techniques to understand and apply security at every level of your systems and applications. about the technologyCryptography is the foundation of information security. This simultaneously ancient and emerging…
The Duke's Christmas Redemption
by
Arietta Richmond,
A Duke who has rejected love, a Lady who dreams of a love match, an arranged marriage, a house full of secrets, a most unneighborly neighbor, a plot to destroy reputations, an unexpected love that redeems it all.
Lady Charlotte Wyndham, given in an arranged marriage to a man she…
I started learning cryptography in the early 2000s with books borrowed from my university’s library, and with information I could find online. Since then I’ve practiced cryptography for 15 years in a variety of contexts: as an academic researcher, while working on my PhD; as a cryptography engineer for software and hardware pay-TV systems; as a consultant for private and public sector clients; as a vulnerability researcher in my spare time; as a code auditor for cryptography projects; as a start-up founder in the domain of IoT security; and as CSO (chief security officer) of a fintech start-up. I live in Lausanne, Switzerland, and besides crypto I enjoy literature, rock climbing, and playing classical guitar.
If you want to compose or play music, you need to know some basic music theory: notes, scales, chords, and so on. Likewise, solid cryptography knowledge requires understanding its foundations: concepts such as one-way function, pseudorandom generators, computational hardness, secure encryption, and zero-knowledge proofs. Goldreich’s books are the best starting point for those who want to delve into cryptography theory.
Cryptography is concerned with the conceptualization, definition and construction of computing systems that address security concerns. The design of cryptographic systems must be based on firm foundations. This book presents a rigorous and systematic treatment of the foundational issues: defining cryptographic tasks and solving new cryptographic problems using existing tools. It focuses on the basic mathematical tools: computational difficulty (one-way functions), pseudorandomness and zero-knowledge proofs. The emphasis is on the clarification of fundamental concepts and on demonstrating the feasibility of solving cryptographic problems, rather than on describing ad-hoc approaches. The book is suitable for use in a graduate course on…
I write historical nonfiction, I’m an avid reader, and I’ve long been fascinated by the past. But I’m far less interested in the stories of powerful people, political intrigues, and significant battles. I would rather read (and write) hidden history: the stories that have not yet been discovered or fully explored and stories that are left out of history books—accidentally or deliberately. I find these far more compelling. They often provide a deeper look at how history affects those who lack power, influence, and money but who nevertheless do remarkable and often heroic things. I live in Portugal and have started working on a new historical nonfiction book.
In 2018, I went to an author reading by Liza Mundy. Deep into researching my own nonfiction book, I was fascinated as Mundy talked about interviewing women who became code breakers in World War II.
The government recruited them from top colleges and universities, looking for women who were gifted in math and music. The women were sworn to secrecy and kept their word, telling people they had been secretaries during the war. They maintained that fiction into their old age or their graves.
Mundy tracked down survivors and showed them documentation that the program had been declassified. They had been released from their vow of silence and could share their stories with her. The book is excellent.
An expert on East European politics and economics analyzes and evaluates Western policies toward the new East European democracies as they struggle to build stable political orders and functioning market economies. He argues that the West must give higher priority to assisting the region and reorient its strategies so as to emphasize the political and administrative dimensions of economic reconstruction. He reviews the economic legacy of past Western policies and of Eastern Europe's previous dependency on the Soviet Union, and then examines in detail the changing East-West trade patterns, the prospect for Western investment and technology transfer, the questions of…
I’ve been playing with computers and electronics since childhood. I even supported the people in my village with their computer issues back then. During my studies in electrical engineering, I learned how to solve technical challenges with structured approaches. At this time, I became fascinated by topics like cryptography and embedded system security. The books on this list helped me understand important concepts and practical real-world obstacles. I hope they are also of value to you!
When I take this book off my shelf, the probability that I find the answer I'm looking for is very high. Yes, it's a big book, and I'm pretty sure I haven't read every single page yet, but because of its broad coverage of security engineering knowledge, from crypto to real-world processes, it is an invaluable reference for teaching and practical cyber security.
Now that there's software in everything, how can you make anything secure? Understand how to engineer dependable systems with this newly updated classic
In Security Engineering: A Guide to Building Dependable Distributed Systems, Third Edition Cambridge University professor Ross Anderson updates his classic textbook and teaches readers how to design, implement, and test systems to withstand both error and attack.
This book became a best-seller in 2001 and helped establish the discipline of security engineering. By the second edition in 2008, underground dark markets had let the bad guys specialize and scale up; attacks were increasingly on users rather than…
This book follows the journey of a writer in search of wisdom as he narrates encounters with 12 distinguished American men over 80, including Paul Volcker, the former head of the Federal Reserve, and Denton Cooley, the world’s most famous heart surgeon.
In these and other intimate conversations, the book…
I write as Robert J. Lloyd, but my friends call me Rob. Having studied Fine Art at a BA degree level (starting as a landscape painter but becoming a sculpture/photography/installation/performance generalist), I then moved to writing. During my MA degree in The History of Ideas, I happened to read Robert Hooke’s diary, detailing the life and experiments of this extraordinary and fascinating man. My MA thesis and my Hooke & Hunt series of historical thrillers are all about him. I’m fascinated by early science, which was the initial ‘pull’ into writing these stories, but the political background of the times (The Popish Plot and the Exclusion Crisis, for example) is just as enticing.
About WWII codebreaking, the reason this makes my ‘Best 5’ is that, besides being constantly inventive and informative, it’s also very funny. (I’m that shallow.)
There are similarities, I think, with Catch 22, in the plot’s intelligence, absurdity, and dreamlike turns.
I think Stephenson’s character Bobbie Shaftoe, a soldier who carries out counterintelligence deceptions, is hilarious. Also, Stephenson’s use of real historical characters–he presents believable portraits of Alan Turing, Douglas MacArthur, Karl Dönitz, and Hermann Göring, with a walk-on appearance by Albert Einstein–gave me license to do so in my own fiction.
With this extraordinary first volume in an epoch-making masterpiece, Neal Stephenson hacks into the secret histories of nations and the private obsessions of men, decrypting with dazzling virtuosity the forces that shaped this century.
In 1942, Lawrence Pritchard Waterhouse—mathematical genius and young Captain in the U.S. Navy—is assigned to detachment 2702. It is an outfit so secret that only a handful of people know it exists, and some of those people have names like Churchill and Roosevelt. The mission of Waterhouse and Detachment 2702—commanded by Marine Raider Bobby Shaftoe-is to keep the Nazis ignorant of the fact that Allied Intelligence…