Here are 85 books that Real-World Cryptography fans have personally recommended if you like Real-World Cryptography. Shepherd is a community of 12,000+ authors and super readers sharing their favorite books with the world.

When you buy books, we may earn a commission that helps keep our lights on (or join the rebellion as a member).

Book cover of The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography

Rob Conery Author Of The Imposter's Handbook: A CS Primer for Self-taught Developers

From my list on self-taught programmers.

Why am I passionate about this?

I taught myself to code back in 1994 while working the graveyard shift as a geologist in the environmental industry. My job consisted of sitting in a chair during the dark hours of the night in a shopping center in Stockton, CA, watching another geologist take samples from wells in the parking lot. A friend of mine suggested I learn to code because I liked computers. I don’t mean to make this out to be a “it’s so simple anyone can do it!” You need to have a relentless drive to learn, which is why I wrote my book, The Imposter’s Handbook - as an active step to learning what I didn’t know I didn’t know.

Rob's book list on self-taught programmers

Rob Conery Why Rob loves this book

This book makes me jealous as the author has an incredible ability to communicate the densest of topics (Cryptography) in an engaging, wonderful way.

It draws you in and you find yourself transported to battlefields and war rooms of the past. I’ve always taken cryptography for granted - I type https into my browser and navigate to a site and all’s well. I know things are reasonably secure - but why?

It turns out that RSA, the algorithm that underpins things like SSL and SSH, is a landmark of human achievement and did something that millennia of mathematicians and scientists could not: provide secure, end-to-end encryption. A wonderful story.

By Simon Singh ,

Why should I read it?

5 authors picked The Code Book as one of their favorite books, and they share why you should read it.

What is this book about?

In his first book since the bestselling Fermat's Enigma, Simon Singh offers the first sweeping history of encryption, tracing its evolution and revealing the dramatic effects codes have had on wars, nations, and individual lives. From Mary, Queen of Scots, trapped by her own code, to the Navajo Code Talkers who helped the Allies win World War II, to the incredible (and incredibly simple) logisitical breakthrough that made Internet commerce secure, The Code Book tells the story of the most powerful intellectual weapon ever known: secrecy.

Throughout the text are clear technical and mathematical explanations, and portraits of the remarkable…


If you love Real-World Cryptography...

Ad

Book cover of The High House

The High House by James Stoddard,

The Victorian mansion, Evenmere, is the mechanism that runs the universe.

The lamps must be lit, or the stars die. The clocks must be wound, or Time ceases. The Balance between Order and Chaos must be preserved, or Existence crumbles.

Appointed the Steward of Evenmere, Carter Anderson must learn the…

Book cover of Foundations of Cryptography: Volume 1, Basic Tools

Jean-Philippe Aumasson Author Of Serious Cryptography: A Practical Introduction to Modern Encryption

From my list on for cryptography apprentices.

Why am I passionate about this?

I started learning cryptography in the early 2000s with books borrowed from my university’s library, and with information I could find online. Since then I’ve practiced cryptography for 15 years in a variety of contexts: as an academic researcher, while working on my PhD; as a cryptography engineer for software and hardware pay-TV systems; as a consultant for private and public sector clients; as a vulnerability researcher in my spare time; as a code auditor for cryptography projects; as a start-up founder in the domain of IoT security; and as CSO (chief security officer) of a fintech start-up. I live in Lausanne, Switzerland, and besides crypto I enjoy literature, rock climbing, and playing classical guitar.

Jean-Philippe's book list on for cryptography apprentices

Jean-Philippe Aumasson Why Jean-Philippe loves this book

If you want to compose or play music, you need to know some basic music theory: notes, scales, chords, and so on. Likewise, solid cryptography knowledge requires understanding its foundations: concepts such as one-way function, pseudorandom generators, computational hardness, secure encryption, and zero-knowledge proofs. Goldreich’s books are the best starting point for those who want to delve into cryptography theory.  

By Oded Goldreich ,

Why should I read it?

1 author picked Foundations of Cryptography as one of their favorite books, and they share why you should read it.

What is this book about?

Cryptography is concerned with the conceptualization, definition and construction of computing systems that address security concerns. The design of cryptographic systems must be based on firm foundations. This book presents a rigorous and systematic treatment of the foundational issues: defining cryptographic tasks and solving new cryptographic problems using existing tools. It focuses on the basic mathematical tools: computational difficulty (one-way functions), pseudorandomness and zero-knowledge proofs. The emphasis is on the clarification of fundamental concepts and on demonstrating the feasibility of solving cryptographic problems, rather than on describing ad-hoc approaches. The book is suitable for use in a graduate course on…


Book cover of Security Engineering: A Guide to Building Dependable Distributed Systems

Dominik Merli Author Of Engineering Secure Devices: A Practical Guide for Embedded System Architects and Developers

From my list on embedded system security enthusiasts.

Why am I passionate about this?

I’ve been playing with computers and electronics since childhood. I even supported the people in my village with their computer issues back then. During my studies in electrical engineering, I learned how to solve technical challenges with structured approaches. At this time, I became fascinated by topics like cryptography and embedded system security. The books on this list helped me understand important concepts and practical real-world obstacles. I hope they are also of value to you!

Dominik's book list on embedded system security enthusiasts

Dominik Merli Why Dominik loves this book

When I take this book off my shelf, the probability that I find the answer I'm looking for is very high. Yes, it's a big book, and I'm pretty sure I haven't read every single page yet, but because of its broad coverage of security engineering knowledge, from crypto to real-world processes, it is an invaluable reference for teaching and practical cyber security.

By Ross Anderson ,

Why should I read it?

2 authors picked Security Engineering as one of their favorite books, and they share why you should read it.

What is this book about?

Now that there's software in everything, how can you make anything secure? Understand how to engineer dependable systems with this newly updated classic

In Security Engineering: A Guide to Building Dependable Distributed Systems, Third Edition Cambridge University professor Ross Anderson updates his classic textbook and teaches readers how to design, implement, and test systems to withstand both error and attack.

This book became a best-seller in 2001 and helped establish the discipline of security engineering. By the second edition in 2008, underground dark markets had let the bad guys specialize and scale up; attacks were increasingly on users rather than…


If you love David Wong...

Ad

Book cover of December on 5C4

December on 5C4 by Adam Strassberg,

Magical realism meets the magic of Christmas in this mix of Jewish, New Testament, and Santa stories–all reenacted in an urban psychiatric hospital!

On locked ward 5C4, Josh, a patient with many similarities to Jesus, is hospitalized concurrently with Nick, a patient with many similarities to Santa. The two argue…

Book cover of Quantum Computing Since Democritus

Ran Spiegler Author Of The Curious Culture of Economic Theory

From my list on scholarly and popular-science books that both pros and amateurs can enjoy.

Why am I passionate about this?

I am an academic researcher and an avid non-fiction reader. There are many popular books on science or music, but it’s much harder to find texts that manage to occupy the space between popular and professional writing. I’ve always been looking for this kind of book, whether on physics, music, AI, or math – even when I knew that as a non-pro, I wouldn’t be able to understand everything. In my new book I’ve been trying to accomplish something similar: A book that can intrigue readers who are not professional economic theorists, that they will find interesting even if they can’t follow everything.

Ran's book list on scholarly and popular-science books that both pros and amateurs can enjoy

Ran Spiegler Why Ran loves this book

A simple (not perfect) test of whether you’re going to love this book: Just check out the author’s blog, called “shtetl-optimized”. The style is similar: sharp, funny, mixing professional theoretical Computer Science with broader takes.

I am still in the middle of the book, and nevertheless, I’m happy to recommend it. As an amateur with superficial CS knowledge, I am enjoying this introduction to classical complexity theory and the basic theory of quantum computation.

Aaronson’s distinctive style makes the ride all the more enjoyable. It’s neither a “real” textbook nor a pop-science book. It’s in a weird space somewhere in between, and I love it!

By Scott Aaronson ,

Why should I read it?

3 authors picked Quantum Computing Since Democritus as one of their favorite books, and they share why you should read it.

What is this book about?

Written by noted quantum computing theorist Scott Aaronson, this book takes readers on a tour through some of the deepest ideas of maths, computer science and physics. Full of insights, arguments and philosophical perspectives, the book covers an amazing array of topics. Beginning in antiquity with Democritus, it progresses through logic and set theory, computability and complexity theory, quantum computing, cryptography, the information content of quantum states and the interpretation of quantum mechanics. There are also extended discussions about time travel, Newcomb's Paradox, the anthropic principle and the views of Roger Penrose. Aaronson's informal style makes this fascinating book accessible…


Book cover of Digital Fortress

Kat Wheeler Author Of There is No Cloud

From my list on technothrillers with accurate technology representation.

Why am I passionate about this?

I’m just a book-loving girl working in a corporate world who’s sick to death of the inaccurate representations of technology in fiction. FYI, tracing a phone call is instantaneous, no need to keep that pesky murderer on the line these days. Technology is so ingrained in our daily lives and most people have very limited knowledge of what it actually does, so I became fascinated with the idea of using real modern-day tech in murder mysteries. I got so obsessed with the idea I decided to write it. No Sci-Fi of future tech, it may seem farfetched, but all the electronic wizardry used in my novels is real and accurately represented.

Kat's book list on technothrillers with accurate technology representation

Kat Wheeler Why Kat loves this book

Ah, Dan Brown. Love him or hate him, he’s a paragon of the modern thriller. Let’s go way back to 1998. It was pre-DaVinci Code, and he released his first novel, Digital Fortress. For the time period, it was a unique idea. A woman cryptologist at the NSA gets embroiled in a high-stakes murder mystery and the only way through is to solve the code. There are a lot of issues with this book, primarily that the author couldn’t be bothered to check his work and misuses bits and bytes throughout the whole novel which makes the code-breaking premise ridiculous. But to be fair, this was 1998 and for a first novel, it’s still a fun ride. So, if you’re a Dan Brown fan or love a fast-paced easy read give it a try. If you have even a basic understanding of how encryption works you may…

By Dan Brown , Dan Brown ,

Why should I read it?

1 author picked Digital Fortress as one of their favorite books, and they share why you should read it.

What is this book about?

A former National Security Agency programmer threatens to release a mathematical formula that will allow organized crime and terrorism to skyrocket, unless the code-breaking computer that is used to keep them in check but that violates civil rights is not exposed to the public.


Book cover of Cybersecurity Is Everybody's Business: Solve the Security Puzzle for Your Small Business and Home

Eric J. Rzeszut Author Of 10 Don'ts on Your Digital Devices: The Non-Techie's Survival Guide to Cyber Security and Privacy

From my list on to help you protect your personal information.

Why am I passionate about this?

I have been an information technology and cybersecurity professional for over two decades. I’ve learned over and over again that “people are the weakest link.” You can build the most secure system in the world, with stringent password requirements. But if the user writes their password down and leaves it where someone else can see it, system security is irrelevant! The easiest way to gain access to a system is via “social engineering” – to trick a human being into giving you the access you need, rather than trying to hack the system itself. The books on this list will help the reader lower their chances of being exploited like this.

Eric's book list on to help you protect your personal information

Eric J. Rzeszut Why Eric loves this book

Cybersecurity is Everybody’s Business is a great book that focuses not only on the how to keep your data safe, but on the very critical why this is important. Author Scott Schober suffered a grievous cyberattack in a previous business, and he brings his experience to the forefront in this guide. Joined by his brother as co-author, they focus on cybersecurity for the home and small business – environments that are unlikely to employ full-time cybersecurity professionals. (That’s why these places are often targets for the bad guys!)

By Scott N. Schober , Craig W. Schober ,

Why should I read it?

1 author picked Cybersecurity Is Everybody's Business as one of their favorite books, and they share why you should read it.

What is this book about?

Since publication of his first book, HACKED AGAIN, Scott Schober has dedicated himself to educating anyone who would listen by telling his own story of being hacked in the hope that others can learn from his own mistakes. Now joined by his brother Craig, the two have set their sights on the biggest target of all, small businesses.

There are 30 million small businesses currently operating in the United States. Some of them are single owner/operated while others collectively employ hundreds of millions. This book is for all of them and anyone who makes it their business to stay safe…


If you love Real-World Cryptography...

Ad

Book cover of Trusting Her Duke

Trusting Her Duke by Arietta Richmond,

A Duke with rigid opinions, a Lady whose beliefs conflict with his, a long disputed parcel of land, a conniving neighbour, a desperate collaboration, a failure of trust, a love found despite it all.

Alexander Cavendish, Duke of Ravensworth, returned from war to find that his father and brother had…

Book cover of Mathematical Ideas in Biology

Marc Mangel Author Of Fighting The Virus

From my list on helpful books to get you ready to apply disease modeling to enhance cybersecurity.

Why am I passionate about this?

I became enthused about using mathematical models to understand the natural world as an undergraduate, got trained to do so, and spent my career working on a wide variety of applications. Most recently, I translated ideas from disease modeling to understand cyber variability and security.

To maximize success when applying mathematics to the natural or (for cyber) operational world, one needs to master the appropriate mathematical tools and have a deep knowledge of the subject matter. My recommendations are three really great books that will help you gain proficiency in the needed mathematical tools and how to apply them, and two equally great books on cyber systems.

Marc's book list on helpful books to get you ready to apply disease modeling to enhance cybersecurity

Marc Mangel Why Marc loves this book

This is a classic! I have had (and worn through copies) since 1969.

There is no explicit mention of disease in Maynard Smith’s book, but the two chapters on population regulation will give you all the tools you need to start applying ideas from disease biology.

As with the Feynman lectures, there is mathematics in this book – but it begins with arithmetic. I recommend it for much the same reason that I recommend Feynman because it will show you how mathematical reasoning can illuminate biology and was written by one the great mathematical biologists of the 20th century.

The book is written for biologists and has the same quality as Feynman’s lectures of having plenty of words that bring the mathematics to life.

By J. Maynard Smith ,

Why should I read it?

1 author picked Mathematical Ideas in Biology as one of their favorite books, and they share why you should read it.

What is this book about?

This is a lucid introduction to some of the mathematical ideas which are useful to biologists. Professor Maynard Smith introduces the reader to the ways in which biological problems can be expressed mathematically, and shows how the mathematical equations which arise in biological work can be solved. Each chapter has a number of examples which present further points of biological and mathematical interest. interest. Professor Maynard Smith's book is written for all biologists, from undergraduate level upwards, who need mathematical tools. Only an elementary knowledge of mathematics is assumed. Since there are already a number of books dealing with statistics…


Book cover of Computer Security: Art and Science

Nancy R. Mead Author Of Cyber Security Engineering: A Practical Approach for Systems and Software Assurance

From my list on software security engineering.

Why am I passionate about this?

As a kid, I used to do all the math problems in my textbooks just for fun, even if they weren’t part of a homework assignment. My grandchildren cringe when I tell them this. I am a researcher and educator in secure software engineering and have enjoyed a productive career in software development and management, software engineering and software security research, and software and secure software engineering education.  

Nancy's book list on software security engineering

Nancy R. Mead Why Nancy loves this book

Although strictly speaking, this book is not on software security, it is so well-known in the field as a general reference that it deserves to be on this list. It discusses the important issues of computer security and can be used as either a textbook or a reference. No doubt that many, if not most, students of computer security are familiar with this book.

By Matt Bishop ,

Why should I read it?

1 author picked Computer Security as one of their favorite books, and they share why you should read it.

What is this book about?

Today, everyone recognizes the importance of safeguarding computer systems and networks from vulnerability, attack, and compromise. But computer security is neither an easy art nor a simple science: its methodologies and technologies require rigorous study, and a deep grounding in principles that can be applied even as technologies change. Moreover, practitioners must understand how to align concepts with real policies, and then actually implement those policies -- managing inevitable tradeoffs such as "How secure do our devices really need to be, and how much inconvenience can we accept?"



In his extensively updated Computer Security: Art and Science, 2nd Edition, University…


Book cover of Beyond Lanchester

Marc Mangel Author Of Fighting The Virus

From my list on helpful books to get you ready to apply disease modeling to enhance cybersecurity.

Why am I passionate about this?

I became enthused about using mathematical models to understand the natural world as an undergraduate, got trained to do so, and spent my career working on a wide variety of applications. Most recently, I translated ideas from disease modeling to understand cyber variability and security.

To maximize success when applying mathematics to the natural or (for cyber) operational world, one needs to master the appropriate mathematical tools and have a deep knowledge of the subject matter. My recommendations are three really great books that will help you gain proficiency in the needed mathematical tools and how to apply them, and two equally great books on cyber systems.

Marc's book list on helpful books to get you ready to apply disease modeling to enhance cybersecurity

Marc Mangel Why Marc loves this book

This is a short (about 100 pages) and relatively new (2020) book showing how mathematical modeling of the dynamics of populations can be used to give new insights to the classic experiments by the scientist Georgy Gause on predation by one kind of single-celled organism called Didinium on another single celled organism Paramecium (which may sound familiar from high school biology), where the populations are the numbers of the two species and to the outcomes of classical military battles like Trafalgar, where the populations are the sizes of the forces of each side.

McCue’s book is very well written and most of it is accessible with relatively simple mathematics. It will also show you how we can include the randomness that is inherent to nature (and to all operational situations) in models.   

McCue is a top flight operations analyst; as with Feynman and Maynard Smith, reading this book  even…

By Brian McCue ,

Why should I read it?

1 author picked Beyond Lanchester as one of their favorite books, and they share why you should read it.

What is this book about?

F.W. Lanchester famously reduced the mutual erosion of attrition warfare to simple mathematical form, resulting in his famous "Square Law," and also the "Linear Law." Followers have sought to fit real-world data to Lanchester's equations, and/or to elaborate them in order to capture more aspects of reality.In Beyond Lanchester, Brian McCue--author of the similarly quantitative U-Boats In The Bay Of Biscay--focusses on a neglected shortcoming of Lanchester's work: its determinism. He shows that the mathematics of the Square Law contain instability, so that the end-state it predictes is actually one of the least likely outcomes.This mathematical truth is connected to…


If you love David Wong...

Ad

Book cover of Aggressor

Aggressor by FX Holden,

It is April 1st, 2038. Day 60 of China's blockade of the rebel island of Taiwan.

The US government has agreed to provide Taiwan with a weapons system so advanced that it can disrupt the balance of power in the region. But what pilot would be crazy enough to run…

Book cover of Software Security: Building Security in

Nancy R. Mead Author Of Cyber Security Engineering: A Practical Approach for Systems and Software Assurance

From my list on software security engineering.

Why am I passionate about this?

As a kid, I used to do all the math problems in my textbooks just for fun, even if they weren’t part of a homework assignment. My grandchildren cringe when I tell them this. I am a researcher and educator in secure software engineering and have enjoyed a productive career in software development and management, software engineering and software security research, and software and secure software engineering education.  

Nancy's book list on software security engineering

Nancy R. Mead Why Nancy loves this book

Gary McGraw has been an advocate for the importance of developing secure software during the more than 15 years that I have known him, and before that! He has written a number of books, but this one captures his philosophy on how to develop secure software. It’s an excellent resource for practitioners and management.

By Gary McGraw ,

Why should I read it?

1 author picked Software Security as one of their favorite books, and they share why you should read it.

What is this book about?

"When it comes to software security, the devil is in the details. This book tackles the details."
--Bruce Schneier, CTO and founder, Counterpane, and author of Beyond Fear and Secrets and Lies



"McGraw's book shows you how to make the 'culture of security' part of your development lifecycle."
--Howard A. Schmidt, Former White House Cyber Security Advisor



"McGraw is leading the charge in software security. His advice is as straightforward as it is actionable. If your business relies on software (and whose doesn't), buy this book and post it up on the lunchroom wall."
--Avi Rubin, Director of the NSF…


Book cover of The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography
Book cover of Foundations of Cryptography: Volume 1, Basic Tools
Book cover of Security Engineering: A Guide to Building Dependable Distributed Systems

Share your top 3 reads of 2025!

And get a beautiful page showing off your 3 favorite reads.

1,210

readers submitted
so far, will you?

5 book lists we think you will like!

Interested in computer security, cryptography, and cryptocurrency?

Cryptography 32 books
Cryptocurrency 28 books