Technical Books (Modern)
- Handbook of Applied
Cryptography, Menezes, van Oorschot, Vanstone, CRC 1997. (Comprehensive
treatment of modern cryptography).
Cryptography Engineering, Ferguson, Schneier, Kohno, Wiley, 2010.
(Cryptography in the context of security.)
- Understanding Cryptography, Paar, Pelzl, Springer, 2010.(Good
elementary introduction, partially visible online, including nice
introduction to modular arithmetic and other mathematical topics.)
Cryptanalysis, Joux, 2015. Advanced text on algorithmic methods in
cryptanalsyis. Excellent book, but requires solid math and CS.
Applied Cryptanalysis, Stamp, Low 2007. (Fine collection a
material on attacks on many of the well-known cryptosystems including
classical, block, stream and asymmetric ciphers as well as hash-functions and
Ross Anderson, Wiley, 2008 (2nd edition). (Standard text on the subject.
Partially available online.)
Technical Books (Classical)
A riddle wrapped in an Enigma,
Kobliz, Menezes, 2015 (also see cyrptography engineering
blog post on this)
Weak Diffie-Hellman and the LogJam attack,
Diffie on information security
declassified letter by John Nash on cryptography and complexity theory
Ron was wrong, Whit is right
(attack on RSA)
Relationship between Mathematics and Cryptography; controversial article
by Neal Koblitz
The Brave New
World of Bodacious Assumptions in Cryptography, another article, by
Koblitz and Menezes, bound to stir controvery
They Cracked This 250-Year-Old Code, and Found a Secret Society Inside,
Noah Shachtman, Wirde, 2012.
Attacks on RSA
(survey paper by Dan Boneh)
Polynomials in the
Nation's Service, Susan Landau, 2004.
How to Estalblish a Private Code on a Public Network, by Goldwasser,
Micali, Tong, 1982
Hellman's Time-Memory Trade-Off (by Mark Stamp)
documents on public-key cryptography
Matt Blaze's papers on
weaknesses in master key systems,
Conditionally-Perfect Secrecy and a Provably-Secure Randomized Cipher
communications (as written up by Schneier)
Long-term perspectives in Cryptography
representations of hash functions
tutorial on linear and differential cryptanalysis (by Howard Heys)
A hash of hash
functions (by Türker
How you can build an eavesdropper for a quantum cryptosystem
Factorization of a 768-bit RSA
Historical and Popular Books
- The Codebreakers, David Kahn, Sribner, 1996.
(Comprehensive history of cryptology.)
- Between Silk and Cyanide: A Codemaker's War, 1941-1945, Leo Marks, Free
Press, 2000. (Cliffhanger account of Marks code-making work for British spies in
Europe; compelling reading. Check out interview
- The American Black Chamber, Yardley, Aegean Park Press.
(Yardley was in charge of the American Black chamber which existed from 1917 to
1929. There also is a recent biography of Yardley by David Kahn entitled The
Reader of Gentlemen's Mail).
- The Code Book, Simon Singh, Anchor, 2000. (Popular historical
account of cryptology, with a fair amount of technical detail.)
- The Cuckoo's Egg, Cliff Stoll, Pocket Books, 1990. (Real life account of
Stoll tracking down a hacker. Better than James Bond.)
Cryptonomicon, Neal Stephenson, Harper, 2000.
(Occasionally long-winded novel, containing accurate technical details.)
- The Man Who Broke Purple, Ronald Clark, Little Brown, 1977. (Biography of
William Friedman, the father of modern American cryptography, and the story of
how he broke Purple.)
- The Puzzle Palace, James Bamford, Viking, 1983. (The
early history of the National Security Agency (NSA)).
The Shadow Factory,
James Bamford, Random House, 2009. (Bamford continues his story of the NSA
Last updated: November 19th, 2015.