Enjoy fast, free delivery, exclusive deals, and award-winning movies & TV shows.
Buy new:
-12% $51.00
FREE delivery Thursday, July 10
Ships from: Amazon
Sold by: Apex_media
$51.00 with 12 percent savings
List Price: $58.00
FREE Returns
FREE delivery Thursday, July 10
Or Prime members get FREE delivery Tuesday, July 8. Order within 10 hrs 9 mins.
Only 1 left in stock - order soon.
$$51.00 () Includes selected options. Includes initial monthly payment and selected options. Details
Price
Subtotal
$$51.00
Subtotal
Initial payment breakdown
Shipping cost, delivery date, and order total (including tax) shown at checkout.
Ships from
Amazon
Amazon
Ships from
Amazon
Payment
Secure transaction
Your transaction is secure
We work hard to protect your security and privacy. Our payment security system encrypts your information during transmission. We don’t share your credit card details with third-party sellers, and we don’t sell your information to others. Learn more
$12.23
Get Fast, Free Shipping with Amazon Prime FREE Returns
Book is in good condition and may include underlining highlighting and minimal wear. The book can also include From the library of labels. May not contain miscellaneous items toys dvds etc. . We offer 100% money back guarantee and 24 7 customer service. Free 2-day shipping with Amazon Prime! Book is in good condition and may include underlining highlighting and minimal wear. The book can also include From the library of labels. May not contain miscellaneous items toys dvds etc. . We offer 100% money back guarantee and 24 7 customer service. Free 2-day shipping with Amazon Prime! See less
FREE delivery on orders over $35 shipped by Amazon.
Only 1 left in stock - order soon.
$$51.00 () Includes selected options. Includes initial monthly payment and selected options. Details
Price
Subtotal
$$51.00
Subtotal
Initial payment breakdown
Shipping cost, delivery date, and order total (including tax) shown at checkout.
Access codes and supplements are not guaranteed with used items.
Kindle app logo image

Download the free Kindle app and start reading Kindle books instantly on your smartphone, tablet, or computer - no Kindle device required.

Read instantly on your browser with Kindle for Web.

Using your mobile phone camera - scan the code below and download the Kindle app.

QR code to download the Kindle App

Follow the authors

See all
Something went wrong. Please try your request again later.

Cryptography Engineering: Design Principles and Practical Applications 1st Edition

4.6 out of 5 stars 203 ratings

{"desktop_buybox_group_1":[{"displayPrice":"$51.00","priceAmount":51.00,"currencySymbol":"$","integerValue":"51","decimalSeparator":".","fractionalValue":"00","symbolPosition":"left","hasSpace":false,"showFractionalPartIfEmpty":true,"offerListingId":"au%2FMDRB6hlGdbUoSujDPLtIRPIq4g%2FAGyeWzDGNeHxWvQKq7%2Bq03eHihBpGUj9sdiF2dnv6%2FiiCzYVTgr1%2FDloh5nVrO2Qak3OFTcYpVijygOovygum9BetREvoYm8Ft1erkjt9CXxnebuhRWkA6rZoLc3yMeCvU%2BYTNl5U%2FJeq7%2ByNUarMPEA%3D%3D","locale":"en-US","buyingOptionType":"NEW","aapiBuyingOptionIndex":0}, {"displayPrice":"$12.23","priceAmount":12.23,"currencySymbol":"$","integerValue":"12","decimalSeparator":".","fractionalValue":"23","symbolPosition":"left","hasSpace":false,"showFractionalPartIfEmpty":true,"offerListingId":"au%2FMDRB6hlGdbUoSujDPLtIRPIq4g%2FAGGbox03Ji7yJ7zU1Lvgk%2B39nP2O9JPEPzvLljmmPbPvdf8Hrfy8e5aSaraCSs4Yv66tyqIsOugNqaJwnS5499GgR78K7wMM7aiTSagShvoryiBXjT1hBokyRKEi0M6KIbUOzHCApqbr5Gwp61gwgcnfM%2FHbNvRbj9","locale":"en-US","buyingOptionType":"USED","aapiBuyingOptionIndex":1}]}

Purchase options and add-ons

The ultimate guide to cryptography, updated from an author team of the world's top cryptography experts.

Cryptography is vital to keeping information safe, in an era when the formula to do so becomes more and more challenging. Written by a team of world-renowned cryptography experts, this essential guide is the definitive introduction to all major areas of cryptography: message security, key negotiation, and key management. You'll learn how to think like a cryptographer. You'll discover techniques for building cryptography into products from the start and you'll examine the many technical changes in the field.

After a basic overview of cryptography and what it means today, this indispensable resource covers such topics as block ciphers, block modes, hash functions, encryption modes, message authentication codes, implementation issues, negotiation protocols, and more. Helpful examples and hands-on exercises enhance your understanding of the multi-faceted field of cryptography.

  • An author team of internationally recognized cryptography experts updates you on vital topics in the field of cryptography
  • Shows you how to build cryptography into products from the start
  • Examines updates and changes to cryptography
  • Includes coverage on key servers, message security, authentication codes, new standards, block ciphers, message authentication codes, and more

Cryptography Engineering gets you up to speed in the ever-evolving field of cryptography.

Frequently bought together

This item: Cryptography Engineering: Design Principles and Practical Applications
$39.35
Get it Jul 14 - 21
In stock
Usually ships within 2 to 3 days.
Ships from and sold by indoobestsellers.
+
$51.98
Get it Jul 23 - 29
Usually ships within 8 to 9 days
Ships from and sold by SuperBookDeals---.
+
$20.88
Get it as soon as Thursday, Jul 10
Only 1 left in stock - order soon.
Sold by PLUTO FINDS and ships from Amazon Fulfillment.
Total price: $00
To see our price, add these items to your cart.
Details
Added to Cart
Some of these items ship sooner than the others.
Choose items to buy together.

Editorial Reviews

From the Inside Flap

Learn to build cryptographic protocols that work in the real world

Knowing how a camera works does not make you a great photographer. Knowing what cryptographic designs are and how existing cryptographic protocols work does not give you proficiency in using cryptography. You must learn to think like a cryptographer.

That is what this book will teach you. Dive deeply into specific, concrete cryptographic protocols and learn why certain decisions were made. Recognize the challenges and how to overcome them. With this book, which is suitable for both classroom and self-study, you will learn to use cryptography effectively in real-world systems.

  • Understand what goes into designing cryptographic protocols

  • Develop an understanding of the interface between cryptography and the surrounding system, including people, economics, hardware, software, ethics, policy, and other aspects of the real world

  • Look beyond the security protocol to see weaknesses in the surrounding system

  • Thwart the adversary by understanding how adversaries think

  • Learn how to build cryptography into new products

From the Back Cover

Learn to build cryptographic protocols that work in the real world

Knowing how a camera works does not make you a great photographer. Knowing what cryptographic designs are and how existing cryptographic protocols work does not give you proficiency in using cryptography. You must learn to think like a cryptographer.

That is what this book will teach you. Dive deeply into specific, concrete cryptographic protocols and learn why certain decisions were made. Recognize the challenges and how to overcome them. With this book, which is suitable for both classroom and self-study, you will learn to use cryptography effectively in real-world systems.

  • Understand what goes into designing cryptographic protocols

  • Develop an understanding of the interface between cryptography and the surrounding system, including people, economics, hardware, software, ethics, policy, and other aspects of the real world

  • Look beyond the security protocol to see weaknesses in the surrounding system

  • Thwart the adversary by understanding how adversaries think

  • Learn how to build cryptography into new products

Product details

  • Publisher ‏ : ‎ Wiley
  • Publication date ‏ : ‎ March 15, 2010
  • Edition ‏ : ‎ 1st
  • Language ‏ : ‎ English
  • Print length ‏ : ‎ 384 pages
  • ISBN-10 ‏ : ‎ 0470474246
  • ISBN-13 ‏ : ‎ 978-0470474242
  • Item Weight ‏ : ‎ 2.31 pounds
  • Dimensions ‏ : ‎ 7.4 x 0.9 x 9.1 inches
  • Customer Reviews:
    4.6 out of 5 stars 203 ratings

About the authors

Follow authors to get new release updates, plus improved recommendations.

Customer reviews

4.6 out of 5 stars
203 global ratings

Review this product

Share your thoughts with other customers

Customers say

Customers find this cryptography book to be a valuable resource, providing a wonderful introduction to the subject while building practical engineering understanding of real-world security problems. Moreover, the book is readable and easy to understand, with one customer noting that the math is worked out with clear commentary.

18 customers mention "Value for money"18 positive0 negative

Customers find the book to be worth the money, with one mentioning it provides great best-practice recommendations.

"...It's a "middle ground" book and probably the one you should start with if you are interested in practical cryptography...." Read more

"...Possible attack scenarios are covered as well. The book does an excellent job looking at how to build a secure system and how malicious actors can..." Read more

"Outstanding book on this topic. Recent publication (as of this writing). Great background on advanced topics from leading public minds...." Read more

"...I thought the book was excellent, though I would have appreciated a chapter on gnupg, or PGP...." Read more

17 customers mention "Cryptography"17 positive0 negative

Customers praise the book's cryptography content, describing it as a wonderful introduction that builds practical engineering understanding of real-world security problems.

"...Block ciphers, hashing, and authentication are covered in depth. Possible attack scenarios are covered as well...." Read more

"...It explains the building blocks and guides you through constructing complex cryptographic systems with them...." Read more

"...pretty well, I believe; it was an enjoyable read, with enough theory to be interesting but mostly lots of discussion on real use cases...." Read more

"...Recent publication (as of this writing). Great background on advanced topics from leading public minds...." Read more

14 customers mention "Readability"14 positive0 negative

Customers find the book readable and well-written, with one customer noting it serves excellently as a self-study resource.

"...I thought this was a good decision by the authors so that the book remained readable and did not get lost in theory...." Read more

"...Content of the book is amazing. I just finished Applied Cryptography (also by Schneier), and I have to say I like this book a lot more...." Read more

"...This book covers the gap pretty well, I believe; it was an enjoyable read, with enough theory to be interesting but mostly lots of discussion on..." Read more

"...and the exercises at the end of the chapters are actually fun and interesting." Read more

10 customers mention "Ease of understanding"7 positive3 negative

Customers find the book easy to understand, with one mentioning that the math is worked out with clear commentary.

"...highly technical in some places, the writing was thoughtful and easy to understand...." Read more

"...The is also a little math that helps to understand the algorithms." Read more

"...cryptographic principles and techniques, but is a little light on technical details and the underlying mathematics...." Read more

"...Everything is clearly explained, the math is worked out with clear commentary so it is easy to follow along and understand, and the exercises at..." Read more

Top reviews from the United States

  • Reviewed in the United States on March 12, 2010
    Format: PaperbackVerified Purchase
    I just got the book, skimmed over it and compared it with the 1st edition (Practical Cryptography).

    First of all, if you don't have the 1st edition, this is an excellent buy. It's a "middle ground" book and probably the one you should start with if you are interested in practical cryptography. Then, depending on your interests and needs, you could proceed to a technically and mathematically much deeper (but somewhat obsolete) Applied Cryptography: Protocols, Algorithms, and Source Code in C, Second Edition or to some other direction using the foundation laid down in this book and then getting other book(s) about "hard-core" mathematics of cryptography or about "softer" methods of social engineering and real-life security.

    I will now assume you know what the book is all about and that you are considering upgrading it so here are some quick things I hope to help you deciding:

    - first of all, obviously, the errata from the 1st edition is incorporated into the text (there is no errata for the 2nd edition yet but keep checking on the book's home page [ [..] ]) which also contains the links from the book so you don't have to type them yourself while investigating
    - the algorithms, protocols and formulas look the same but they might have minor tweaks, most of the stuff I looked up is the same as in the 1st edition
    - the 2nd edition has 60 pages less and that's because the line spacing is smaller (the text is more dense) and not because some material has been omitted (at least I could not find anything significant being removed)
    - one (really small) speculative mathematical subchapter has been removed (4.5.6 in 1st edition: Equation Solving Attacks); I guess the attack/math did not turn out to work
    - the new addition to the team of the authors is a university professor and, as a result of that, the book has more of a textbook feel: exercises at the end of each chapter are added and the preface now contains example syllabi subchapter with three course proposals (6, 10 and 12 week) based on the book; it is also mentioned in the preface that the book is now "more suited for a self-study"
    - the chapter layout is exactly the same as in 1st edition but off by one since "Our Design Philosophy" from the 1st edition has been presented a bit later as a subchapter of another chapter
    - there are more references at the end (130 vs 97)
    - minor: the cover is more boring, it really looks and, with the denser text inside, feels like a textbook while the 1st edition looked more like an engineering/hacking book

    These are my very first quick and most likely incomplete and biased impressions, I might come back and update the review if I find anything significant.
    96 people found this helpful
    Report
  • Reviewed in the United States on January 30, 2017
    Format: PaperbackVerified Purchase
    Cryptography Engineering discusses building cryptographic systems from the ground up. The focus is on the engineering and security aspect, rather than the theoretical or mathematical. While the book is highly technical in some places, the writing was thoughtful and easy to understand.

    Part One of the book looks at the building blocks of cryptography and security. Block ciphers, hashing, and authentication are covered in depth. Possible attack scenarios are covered as well. The book does an excellent job looking at how to build a secure system and how malicious actors can try and bypass the security.

    Common examples uses Alice and Bob in diagrams, and 'Eve' is used to represent eavesdroppers or attackers. The diagrams helped me a lot in understanding some situations.

    The mid-sections of the book examine some exisiting cryptographic protocols. The focus in on how they are engineered. While there is some math, the more complex math is left as a reference. I thought this was a good decision by the authors so that the book remained readable and did not get lost in theory.

    There is an extensive section on Public Key Infrastructure and managing secret keys. The authors tended to focus more on security concerns in this area.

    Generally the book does a great job discussing cryptography and security. The three authors are clearly experts and convey their experience in a single voice throughout the book. If you are looking to build a system with cryptography, definitely get this book.
    16 people found this helpful
    Report
  • Reviewed in the United States on January 8, 2020
    Format: PaperbackVerified Purchase
    4 stars because the book is far from perfect condition.

    Content of the book is amazing. I just finished Applied Cryptography (also by Schneier), and I have to say I like this book a lot more.

    It’s not necessarily totally up to date with current date, but it’s a wonderful introduction to cryptography. It explains the building blocks and guides you through constructing complex cryptographic systems with them.

    There is much less outdated content in this one, so I for one will now start recommending this book over Applied Cryptography!
    3 people found this helpful
    Report
  • Reviewed in the United States on November 28, 2015
    Format: PaperbackVerified Purchase
    Most books focus on the mathematics behind cryptography. While really cool (and important to know if you plan on fooling with cryptography), those books tend to leave you a little lost in terms of recommendations on how to properly use cryptography in your own applications. This book covers the gap pretty well, I believe; it was an enjoyable read, with enough theory to be interesting but mostly lots of discussion on real use cases. I would recommend this book to anyone new-ish to cryptography that wants recommendations on which crypto algorithms or methods to use. If you want deeper understanding of how it works, you'd probably want to pick a different book to supplement however.
    13 people found this helpful
    Report
  • Reviewed in the United States on July 25, 2015
    Format: KindleVerified Purchase
    Outstanding book on this topic. Recent publication (as of this writing). Great background on advanced topics from leading public minds.

    I highly recommend this as a basis for a practical understanding if you missed these topics in school. I cannot imagine a better treatment of cryptography engineering.

    Includes chapters that delve into the details of the foundational mathematical framework for current cryptography.
    3 people found this helpful
    Report
  • Reviewed in the United States on May 31, 2018
    Format: PaperbackVerified Purchase
    Great book about cryptography.

    Most cryptography books focus mostly on math. This book is different - it builds practical engineering understanding of real-world security problems and how cryptography solves it. The is also a little math that helps to understand the algorithms.
    5 people found this helpful
    Report
  • Reviewed in the United States on May 24, 2014
    Format: PaperbackVerified Purchase
    This book does a great job explaining cryptographic principles and techniques, but is a little light on technical details and the underlying mathematics. That can either be a pro or a con depending on what you are looking for. This book will stay on my shelf for many years.
    2 people found this helpful
    Report

Top reviews from other countries

Translate all reviews to English
  • Cliente de Amazon
    4.0 out of 5 stars Good introduction to cryptography
    Reviewed in Mexico on July 13, 2019
    Format: PaperbackVerified Purchase
    A good reference for the basic concepts of cryptography and some topics about security, if you are new in this topic this book is a good option.
  • Aravinth Raj
    5.0 out of 5 stars Superb
    Reviewed in Germany on March 24, 2025
    Format: PaperbackVerified Purchase
    Tolles Buch, um Kryptographie zu verstehen! Es ist klar und leicht zu folgen, mit praktischen Beispielen. Gibt gute Einblicke in die Prinzipien und Anwendungen der Kryptographie. Sehr zu empfehlen, wenn man sich für Sicherheit oder Informatik interessiert.
    Report
  • KIAMPI JEAN BOSCO
    5.0 out of 5 stars Excellent livre
    Reviewed in France on July 9, 2018
    Format: PaperbackVerified Purchase
    Pour une compréhension des principes des contraintes et de l'ingénierie cryptographique, ce livre est très édifiant. J'ai apprécié et encourage toute personne qui souhaite comprendre les enjeux et les différentes solutions de le lire
  • Sahadeo Padhye
    4.0 out of 5 stars Four Stars
    Reviewed in India on July 15, 2015
    Format: PaperbackVerified Purchase
    a good book..
  • SpeedUp
    4.0 out of 5 stars Ottima rassegna di crittografia
    Reviewed in Italy on August 1, 2011
    Format: PaperbackVerified Purchase
    Il libro e' molto interessante e ben fatto.
    Verte su come creare un sistema sicuro sotto ogni aspetto, dalla codifica dei dati all'autenticazione degli utenti fino alla previsione di ogni possibile potenziale attacco o debolezza (Il tuo processore usa Static RAM per la cache? I dati rimangono memorizzati anche dopo lo spegnimento... !!!)

    Non approfondisce l'implementazione dei singoli componenti, ma spiega con sufficiente dettaglio i concetti teorici che stanno alla base della crittografia; l'uso improprio di sofisticati strumenti matematici conduce alla creazione di sistemi apparentemente indistruttibili, ma irrimediabilmente insicuri.
    La sezione dei riferimenti bibliografici e' ricchissima ed elenca libri, minute di convegni, siti web, standard internazionali, rende insomma possibile approfondire qualsiasi tematica in autonomia.

    In definitiva una ottima lettura per chi conosce gia' gli elementi di un sistema sicuro; senza un minimo di conoscienze di base la lettura puo' risultare molto dubbia in quanto gli autori presuppongono come noti molti concetti e molte pratiche.