Bibliography of Cryptography
Here are some documents that you may find helpful in understanding
cryptography:
NonTechnical and beginning technical books
• "Cryptography for the Internet," by Philip R. Zimmermann. Scientific
American, October 1998. This article, written by PGP's creator, is a tutorial
on various cryptographic protocols and algorithms, many of which happen
to be used by PGP.
• "Privacy on the Line," by Whitfield Diffie and Susan Eva Landau. MIT Press;
ISBN: 0262041677. This book is a discussion of the history and policy
surrounding cryptography and communications security. It is an excellent
read, even for beginners and nontechnical people, and contains
information that even a lot of experts don't know.
• "The Codebreakers," by David Kahn. Scribner; ISBN: 0684831309. This book
is a history of codes and code breakers from the time of the Egyptians to the
end of WWII. Kahn first wrote it in the sixties, and published a revised
edition in 1996. This book won't teach you anything about how
cryptography is accomplished, but it has been the inspiration of the whole
modern generation of cryptographers.
• "Network Security: Private Communication in a Public World," by Charlie
Kaufman, Radia Perlman, and Mike Spencer. Prentice Hall; ISBN:
0130614661. This is a good description of network security systems and
protocols, including descriptions of what works, what doesn't work, and
why. Published in 1995, it doesn't have many of the latest technological
advances, but is still a good book. It also contains one of the most clear
descriptions of how DES works of any book written.
Intermediate books
• "Applied Cryptography: Protocols, Algorithms, and Source Code in C," by Bruce
Schneier, John Wiley & Sons; ISBN: 0471128457. This is a good beginning
technical book on how a lot of cryptography works. If you want to become
an expert, this is the place to start.
• "Handbook of Applied Cryptography," by Alfred J. Menezes, Paul C. van
Oorschot, and Scott Vanstone. CRC Press; ISBN: 0849385237. This is the
technical book you should read after Schneier's book. There is a lot of
heavyduty math in this book, but it is nonetheless usable for those who do
not understand the math.
• "Internet Cryptography," by Richard E. Smith. AddisonWesley Pub Co;
ISBN: 0201924803. This book describes how many Internet security
protocols work. Most importantly, it describes how systems that are
designed well nonetheless end up with flaws through careless operation.
This book is light on math, and heavy on practical information.
• "Firewalls and Internet Security: Repelling the Wily Hacker," by William R.
Cheswick and Steven M. Bellovin. AddisonWesley Pub Co; ISBN:
0201633574. This book is written by two senior researchers at AT&T Bell
Labs and is about their experiences maintaining and redesigning AT&T's
Internet connection. Very readable.
Advanced books
• "A Course in Number Theory and Cryptography," by Neal Koblitz.
SpringerVerlag; ISBN: 0387942939. An excellent graduatelevel
mathematics textbook on number theory and cryptography.
• "Differential Cryptanalysis of the Data Encryption Standard," by Eli Biham and
Adi Shamir. SpringerVerlag; ISBN: 0387979301. This book describes the
technique of differential cryptanalysis as applied to DES. It is an excellent
book for learning about this technique.
adapted by Rafal Swiecki, p. eng. email
November, 2004
This document is in the public domain.
