Cryptography Engineering discusses building cryptographic systems from the ground up The focus is on the engineering and security aspect, rather than the theoretical or mathematical While the book is highly technical in some places, the writing was thoughtful and easy to understand.
Part One of the book looks at the building blocks of cryptography and security Block ciphers, hashing, and authentication are covered in depth Possible attack scenarios are covered as well The book does an excellent job looking at how to build a secure system and how malicious actors can try and bypass the security.
Common examples uses Alice and Bob in diagrams, and Eve is used to represent eavesdroppers or attackers The diagrams helped me a lot in understanding some situations.
The mid sections of the book examine some exisiting cryptographic protocols The focus in on how they are engineered While t ☆ Cryptography Engineering: Design Principles and Practical Applications ¾ Great book about cryptography.
Most cryptography books focus mostly on math This book is different it builds practical engineering understanding of real world security problems and how cryptography solves it The is also a little math that helps to understand the algorithms.
Most books focus on the mathematics behind cryptography While really cool and important to know if you plan on fooling with cryptography , those books tend to leave you a little lost in terms of recommendations on how to properly use cryptography in your own applications This book covers the gap pretty well, I believe it was an enjoyable read, with enough theory to be interesting but mostly lots of discussion on real use cases I would recommend this book to anyone new ish to cryptography that wants recommendations on which crypto algorithms or methods to use If you want deeper understanding of how it works, you d probably want to pick a different book to supplement however.
I just got the book, skimmed over it and compared it with the 1st edition Practical Cryptography.
First of all, if you don t have the 1st edition, this is an excellent buy It s a middle ground book and probably the one you should start with if you are interested in practical cryptography Then, depending on your interests and needs, you could proceed to a technically and mathematically much deeper but somewhat obsolete Applied Cryptography Protocols, Algorithms, and Source Code in C, Second Editionor to some other direction using the foundation laid down in this book and then getting other book s about hard core mathematics of cryptography or about softer methods of social engineering and real life security.
I will now assume you know what the book is all about and that you are considering upgrading it so here are some quick things I hope to help you deciding first of a