- Handbook of Applied
Cryptography, Menezes, van Oorschot, Vanstone, CRC 1997. (Comprehensive
treatment of modern cryptography).
Cryptography Engineering, Ferguson, Schneier, Kohno, Wiley, 2010.
(Cryptography in the context of security.)
Decrypted Secrets, Bauer, Springer, 2007
(Extremely comprehensive treatment of classical cryptology up to the end of
- Modern Cryptography. Theory & Practice, Wenbo Mao, Prentice-Hall, 2004.
(Excellent text on cryptography, solid mathematical
(field manual, released by the army; many similar books are available at
Aegan Park Press).
Applied Cryptanalysis, Stamp, Low 2007. (Fine collection a
material on attacks on many of the well-known cryptosystems including
classica, block, stream and asymmetric ciphers as well as hash-functions and
Ross Anderson, Wiley, 2008 (2nd edition). (Standard text on the subject.
Partially available online.)
Understanding Cryptography, Paar, Pelzl, Springer, 2010.(Good
elementary introduction, partially visible online, including nice
introduction to modular arithmetic and other mathematical topics.)
Historical and Popular Books
- The Codebreakers, David Kahn, Sribner, 1996.
(Comprehensive history of cryptology.)
- Between Silk and Cyanide: A Codemaker's War, 1941-1945, Leo Marks, Free
Press, 2000. (Cliffhanger account of Marks code-making work for British spies in
Europe; compelling reading. Check out interview
- The American Black Chamber, Yardley, Aegean Park Press.
(Yardley was in charge of the American Black chamber which existed from 1917 to
1929. There also is a recent biography of Yardley by David Kahn entitled The
Reader of Gentlemen's Mail).
- The Code Book, Simon Singh, Anchor, 2000. (Popular historical
account of cryptology, with a fair amount of technical detail.)
- The Cuckoo's Egg, Cliff Stoll, Pocket Books, 1990. (Real life account of
Stoll tracking down a hacker. Better than James Bond.)
Cryptonomicon, Neal Stephenson, Harper, 2000.
(Occasionally long-winded novel, containing accurate technical details.)
- The Man Who Broke Purple, Ronald Clark, Little Brown, 1977. (Biography of
William Friedman, the father of modern American cryptography, and the story of
how he broke Purple.)
- The Puzzle Palace, James Bamford, Viking, 1983. (The
early history of the National Security Agency (NSA)).
The Shadow Factory,
James Bamford, Random House, 2009. (Bamford continues his story of the NSA
How to Estalblish a Private Code on a Public Network, by Goldwasser,
Micali, Tong, 1982
declassified letter by John Nash on cryptography and complexity theory
Ron was wrong, Whit is right
(attack on RSA)
Hellman's Time-Memory Trade-Off (by Mark Stamp)
documents on public-key cryptography
Attacks on RSA
(survey paper by Dan Boneh)
Polynomials in the
Nation's Service, Susan Landau, 2004.
Matt Blaze's papers on
weaknesses in master key systems,
Conditionally-Perfect Secrecy and a Provably-Secure Randomized Cipher
communications (as written up by Schneier)
Diffie on information security
- Long-term perspectives in Cryptography
representations of hash functions
tutorial on linear and differential cryptanalysis (by Howard Heys)
A hash of hash
functions (by Türker
How you can build an eavesdropper for a quantum cryptosystem
Factorization of a 768-bit RSA
- The Uneasy
Relationship between Mathematics and Cryptography; controversial article
by Neal Koblitz
The Brave New
World of Bodacious Assumptions in Cryptography, another article, by
Koblitz and Menezes, bound to stir controvery
They Cracked This 250-Year-Old Code, and Found a Secret Society Inside,
Noah Shachtman, Wirde, 2012.
Simulators and other Tools
Last updated: January 3rd, 2013.