19 Best Cryptography Books Must Read in 2023

What is Cryptography?

Crypto as a word is inspired by the Ancient Greek “κρυπτός” / “kryptós” which means “hidden, secret”. Cryptography is the practice and study of secure communication techniques to prevent third parties from the ability of understanding/reading a private message.

Cryptography can be used to keep secrets between two people, like when you send someone a message on WhatsApp or Telegram. It can also be used to protect data from being accessed by third parties who don't have permission to see it--for example, when you use encryption on your computer or phone so that only you can read files that are stored there. 

 

Finally, cryptography can be used in combination with other security measures such as authentication systems (like passwords) to ensure that only authorized users can access encrypted data.

In the modern computerized environment, cryptography is a crucial instrument for information security. Cryptography can be a challenging concept to understand despite its importance.

Top Cryptography Books 

We have selected below the best books that must-read in cryptography.

1- Algebra for Cryptologists

This book provides an introduction to modern cryptography based on mathematics. It is self-contained and a good self-study in preparation for the postgraduate study in cryptology. 

 

The book covers not only public key cryptography, the glamorous component of modern cryptology but also pays considerable attention to secret key cryptography, its workhorse in practice.

 

About the Author: 

Alko R. Meijer

Alko R. Meijer is a renowned cryptologist with a career spanning over 30 years. After beginning his journey in academia, where he spent 18 years as a professor of mathematics and applied mathematics at the University of Natal, he made a transition into the field of cryptology. 

 

Today, he serves as the director of Ciphertec c.c., a company that specializes in providing consultation services and in-house training on communication and data storage security. 

 

Alko R. Meijer has also held key positions such as president of the South African Mathematical Society and representative of South Africa at international standards committee meetings related to cryptology. His extensive knowledge and experience in the field make him a valuable asset to the industry.

 

Get the Book 

 

2- Break the Code: Cryptography for Beginners

In addition to describing the various methods of secret writing, cryptographer Bud Johnson also demonstrates how to create and decipher six distinct types of codes, including simple letter grouping, reverse trail, shift code, keyword code, date shift code, and twisted route code. You'll even discover techniques to write your own private messages!

 

With funny drawings and helpful guidelines to help you decode secret messages, and also solutions can be found at the end of the book.

 

 

About the Author

Bud Johnson

 

Get the Book

 

3- Cryptography Made Simple

This book teaches the important concepts of cryptography.

 

It adopts a contemporary strategy in which defining what is meant by "secure" is just as crucial as developing a product that accomplishes that objective.

 

It is intended for advanced undergraduate and graduate computer science, mathematics, and engineering students as well as for self-study for information security experts.

 

Although the majority of the necessary fundamental algebra and notation is summarized in the appendix, it is assumed that the reader is familiar with discrete mathematics, probability, and elementary calculus.

 

About the Author

Nigel Smart

He is a professor of cryptography at the University of Bristol, UK. He is known for his research in the field of cryptography, specifically in the areas of applied cryptography, elliptic curve cryptography, and secure protocols. 

 

He has published numerous papers in these areas and has also co-authored a book called "Cryptography Made Simple" which is an introduction to the basic concepts of cryptography aimed at a general audience. 

 

He has also been involved in the development of cryptographic software and has given many invited talks on cryptography and its applications.

 

Get the Book

 

4- Bent Functions: Results and Applications to Cryptography

 

It covers proofs of various results, including the automorphism group of bent functions, the lower bound for the number of bent functions, and more, and is useful for both beginning and advanced researchers.

 

About the Author:  

Natalia Tokareva
She is a researcher in the field of Cryptography, and she has published papers on various topics in the field such as Boolean functions and their properties, algebraic structures in cryptography, and combinatorial properties of permutations. 

 

Get the Book

 

5- Handbook of Applied Cryptography

 

The book provides a broad introduction to the field of cryptography and covers a wide range of topics, including classical cryptosystems, number theory, algebra, coding theory, and modern cryptographic techniques.

The book is intended for researchers, practitioners, and students in the field of cryptography and computer security, and it is widely used as a textbook in graduate-level courses on cryptography.

About the Author: 

Alfred J. Menezes 

He is a professor of computer science at the University of Waterloo, Canada. He is a leading researcher in the field of cryptography, and his research interests include elliptic curve cryptography, pairing-based cryptography, and the design and analysis of cryptographic protocols.

Paul C. Van Oorschot 

He is a professor of computer science at Carleton University, Canada. He is a leading researcher in the field of computer security, and his research interests include password-based authentication, web security, and the design and analysis of cryptographic protocols.

Scott A. Vanstone 

He is a professor of mathematics and computer science at the University of Waterloo, Canada. He is a leading researcher in the field of cryptography and coding theory, and his research interests include algebraic coding theory, elliptic curve cryptography, and the design and analysis of cryptographic protocols.

Get the Book

6- Serious Cryptography: A Practical Introduction to Modern Encryption

The book is aimed at developers and security engineers who want to learn about modern encryption techniques and how to use them in practice. It covers a wide range of topics, from symmetric and asymmetric encryption to secure key exchange and authenticated encryption.

The book also provides a detailed explanation of how to use popular cryptographic libraries such as OpenSSL and NaCl, and it includes practical examples of how to use these libraries to encrypt and decrypt data.

About the Author: 

Jean-Philippe Aumasson

He is a Swiss computer security expert, best known for his contributions to the field of cryptography, particularly in the area of authenticated encryption, hash functions, and stream ciphers. He has a Ph.D. in cryptography from EPFL, Switzerland, and has worked as a researcher and engineer at various organizations, including Kudelski Security, and currently is the CTO at a blockchain security company. 

 

He also has published multiple books and articles on cryptography and is a frequent speaker at security conferences and workshops.


Get the Book

7- BigNum Math: Implementing Cryptographic Multiple Precision Arithmetic

This book is for students learning mathematics and cryptography as well as the practitioner who needs a reference for any of the algorithms documented within.

 

It begins by introducing the idea of bignum algorithms before going on to construct a whole library of functionality from scratch.

 

The book discusses each and every algorithm that is included in a contemporary bignum library using theory, pseudo-code, and actual deployed C source code.

 

About the Author: 

Tom St Denis 

is a well-known figure in the field of cryptography and computer security. He is an expert in the field of Cryptography and has written several books on the subject, including "Introduction to Modern Cryptography" and "Understanding Cryptography: A Textbook for Students and Practitioners". 

 

He has also written many articles and papers on various topics in cryptography and computer security, including number theory, elliptic curve cryptography, and cryptographic protocols. He is also the founder of a company named "st.denis" that develops cryptographic libraries and tools.

 

Get the Book

8- Mastering Blockchain: A technical reference guide to what’s under the hood of blockchain, from cryptography to DeFi and NFTs, 4th Edition

It is a technical reference guide that provides an in-depth look at the underlying technologies and principles of blockchain, from cryptography to decentralized finance (DeFi) and non-fungible tokens (NFTs).

The fourth edition of the book is an updated version that covers the latest developments and advancements in the blockchain field. The book is intended for developers, engineers, and technical professionals who want to understand how blockchain works and how to build decentralized applications.

About the Author: 

Imran Bashir 

is a blockchain expert, author, and consultant. He has a background in computer science and has been working in the blockchain field for many years. 

 

He has written several books on blockchain and cryptocurrency, and he is a frequent speaker at blockchain conferences and events. He also provides consultancy services to organizations and companies looking to leverage blockchain technology.

 

Get the Book

9- Cryptography for Kids: So you want to be a Spy?

The book aims to introduce children to the basics of cryptography in a fun and engaging way. The book provides a series of hands-on activities and puzzles that help children understand the concepts of encryption and decryption, secret codes, and historical ciphers. 

 

It is designed to be accessible to children of different ages and levels of mathematical understanding, and it is intended to be used as a tool for parents, teachers, and educators to help children learn about cryptography in a fun and interactive way.

 

About the Author: 

Jennifer Brady 

She is an author who specializes in children's books on science and technology. She has written several books on a variety of topics, including cryptography, coding, and robotics, with the goal of making these subjects fun and accessible to children.

 

Get the Book

10- Go Cryptography

If you are a GO programmer or a student who is starting his way into cryptography programming, this book will be a good option for you.

 

You will learn; Encoding and decoding, Random Number generation, Blake Hashing, RIPEMD160 Hashing, HKDF, PBKDF2, Argon2, Scrypt, Bcrypt, RSA Encryption/Decryption Sign and Verify, and much more.

 

About the Author: 

Anish Nath

He works as Security Advocate for a Product company with 12+ years of IT experience, Performing ethical hacking through Official HackerOne & Bugcrowd Channel.

 

Get the Book

11- Cryptography Engineering: Design Principles and Practical Applications

The book provides a comprehensive introduction to the field of cryptography and covers a wide range of topics, including symmetric and asymmetric encryption, secure key exchange, and cryptographic protocols.

 

 It is intended for professionals and practitioners in cryptography and computer security, and it is widely used as a reference and textbook in graduate-level courses on cryptography.

 

About the Author: 

Bruce Schneier 

He is a well-known figure in the field of cryptography and computer security. He is a cryptographer, computer security professional, privacy specialist, and author. He has written numerous books and articles on cryptography, computer security, and privacy, and is a frequent speaker at security conferences and workshops.

Niels Ferguson 

He is a security researcher and cryptographer. He has published numerous papers on various topics in the field of cryptography, including secure key exchange, authentication, and cryptographic protocols. He has also been involved in the development of cryptographic software and is widely recognized for his contributions to the field.

Tadayoshi Kohno 

He is a professor of computer science and engineering at the University of Washington, USA. He is a leading researcher in the field of computer security, and his research interests include network security, applied cryptography, and security for embedded systems.

Ken Thompson 

He is an American pioneer of computer science. He is best known for his work on Unix, and his invention of the B programming language (the direct predecessor to the C programming language). He also made significant contributions to the field of computer security, including the design of the Unix operating system's authentication scheme and the creation of the first version of the Unix shell.

Get the Book

12- "Introduction to Modern Cryptography: Third Edition (Chapman & Hall/CRC Cryptography and Network Security Series) 3rd Edition”

The book provides a comprehensive introduction to the field of cryptography and covers a wide range of topics, including symmetric and asymmetric encryption, secure key exchange, cryptographic protocols, and more advanced topics such as zero-knowledge proof, homomorphic encryption, and secure multi-party computation.

 

The book is intended for students and practitioners in cryptography, computer science, and engineering, and it is widely used as a textbook in graduate-level courses on cryptography.

 

About the Author: 

Jonathan Katz is a professor of computer science at the University of Maryland, USA. He is a leading researcher in the field of cryptography, and his research interests include the design and analysis of cryptographic protocols, secure multi-party computation, and the theory of cryptography.

Yehuda Lindell is a professor of computer science at Bar-Ilan University, Israel. He is a leading researcher in the field of cryptography, and his research interests include secure multi-party computation, homomorphic encryption, and the theory of cryptography. He has also developed several cryptographic libraries and tools that are widely used in practice.

Get the Book

13- "The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography"

The book is a historical and scientific journey through the world of codes and code-breaking, from ancient hieroglyphs and the Caesar Cipher to modern RSA encryption and the Enigma machine. It covers the history of cryptography and its role in shaping the course of history, as well as the mathematical principles behind modern encryption.

 

The book is written for a general audience and is a fascinating and accessible read for anyone interested in the history and science of cryptography.

 

About the Author: 

Simon Singh 

He is a British author and television presenter, who has written several books on mathematics, science, and cryptography, including "Fermat's Last Theorem" and "The Simpsons and Their Mathematical Secrets". 

 

He has also presented several BBC documentaries on mathematics, science, and cryptography, and is known for making complex subjects accessible to a general audience.

 

Get the Book

 

14- Understanding Cryptography: A Textbook for Students and Practitioners

 

The book is a comprehensive introduction to the field of cryptography and covers a wide range of topics, including symmetric and asymmetric encryption, secure key exchange, cryptographic protocols, and more advanced topics such as side-channel attacks, and implementation of cryptographic systems.

 

The book is intended for students and practitioners in computer science and engineering, and it is widely used as a textbook in graduate-level courses on cryptography.

 

The authors concentrate on communicating the essentials while minimizing the mathematical content, and they swiftly transition from laying out the theoretical underpinnings to outlining actual implementations. 

 

Recent topics like lightweight ciphers for RFIDs and mobile devices as well as current key-length recommendations are also covered.

 

About the Author: 

Christof Paar 

He is a professor of electrical engineering and computer science at the Ruhr-Universität Bochum, Germany. 

He is a leading researcher in the field of cryptography, and his research interests include hardware security, embedded systems security, and the design and analysis of cryptographic protocols.

Jan Pelzl 

He is a researcher and lecturer in the field of computer science, cryptography, and IT security. He is known for his work on the design and analysis of cryptographic protocols, and the development of cryptographic libraries and tools.

He has also been involved in multiple research projects and industry collaborations on various topics in the field of cryptography and IT security, and he has published several papers and books on cryptography, including "Understanding Cryptography".

Get the Book

15- The Mathematics of Secrets: Cryptography from Caesar Ciphers to Digital Encryption

The author demonstrates how mathematical concepts underlie how various codes and ciphers operate by using a wide range of historical narratives and practical examples.

 

He analyzes the majority of the known ancient and modern ciphers while concentrating on both code creation and code-breaking.

 

About the Author: 

Dr. Joshua Holden is a mathematician who specializes in number theory and its applications to cryptography. 

 

He has a Ph.D. in number theory from the University of California, Berkeley, and has published several papers on the topic of numbers, theory, and cryptography.

He is also known for giving talks, lectures, and training in cryptography and number theory to academic and industrial audiences.

 

Get the Book

 

16- "Cryptography and Network Security: Principles and Practice 8th Edition"

The book provides a comprehensive introduction to the field of cryptography and network security, covering a wide range of topics, including symmetric and asymmetric encryption, secure key exchange, cryptographic protocols, and more advanced topics such as Public Key Infrastructure, digital signature, and web security. 

 

The book also covers the latest developments and standards in the field of cryptography, including blockchain and quantum-safe cryptography. 

 

The book is intended for students and practitioners in the field of computer science and engineering and it is widely used as a textbook in graduate-level courses on cryptography and network security.

 

About the Author:
William Stallings 

He is a well-known figure in the field of cryptography and computer security. He is an author, lecturer, and consultant, with over 30 years of experience in the field. 

 

He has written numerous books and articles on cryptography, computer security, and networking, and is widely recognized for his contributions to the field. He also provides consulting services to organizations and companies looking to improve their security posture.

 

Get the Book

17- Handbook of Elliptic and Hyperelliptic Curve Cryptography (Discrete Mathematics and Its Applications)

The Handbook of Elliptic and Hyperelliptic Curve Cryptography introduces the theory and algorithms involved in curve-based cryptography.

 

After a very detailed exposition of the mathematical background, it provides ready-to-implement algorithms for the group operations and computation of pairings.

 

It explores methods for point counting and constructing curves with the complex multiplication method and provides the algorithms in an explicit manner.

 

About the Author: 

Henri Cohen 

He is a French mathematician and computer scientist, and an Emeritus Professor at the University of Bordeaux. He is known for his work on number theory, algebraic number theory, and computer algebra, and in particular for his contributions to the development of the computer algebra system PARI/GP.

Gerhard Frey 

He is a German mathematician and cryptographer. He is known for his work on elliptic curves and their applications to cryptography. He is currently a professor at the Technical University of Darmstadt, Germany.

Roberto Avanzi 

He is an Italian mathematician and computer scientist. He is known for his work on coding theory and cryptography, particularly on algebraic codes and elliptic curve cryptography. He is currently a researcher at Italy's National Research Council.

Christophe Doche 

He is a French mathematician and computer scientist. He is known for his work on elliptic curve cryptography and the design and analysis of cryptographic protocols. He is currently a researcher at the French National Center for Scientific Research.

Tanja Lange 

is a German mathematician and computer scientist. She is known for her work on elliptic curve cryptography and the design and analysis of cryptographic protocols. She is currently a professor at the Eindhoven University of Technology, Netherlands.

Get the Book

18. "Post-Quantum Cryptography"

The book provides an overview of the research on cryptography that would be secure against attacks by quantum computers.

 

The book covers a wide range of topics, including mathematical backgrounds, such as the theory of lattices, the design and analysis of post-quantum cryptographic systems, and implementing these systems.

 

The book is intended for researchers, practitioners, and graduate students in cryptography, computer science, and mathematics.

 

It covers a broad range of post-quantum cryptographic schemes, including lattice-based, code-based, multivariate, and supersingular isogeny-based cryptosystems. It also provides an extensive analysis of the security of these schemes and their implementation in practice.

 

About the Author: 

Douglas Stebila 

He is a researcher in cryptography and computer science, and a professor in the Department of Combinatorics and Optimization at the University of Waterloo, Canada.

 

Get the Book

 

19- Encyclopedia of Cryptography and Security

It is a comprehensive reference work that covers a wide range of topics in the field of cryptography and security. 

 

The book provides in-depth explanations of various cryptographic techniques, security protocols, and mathematical concepts, as well as practical applications of cryptography and security in various areas such as computer networks, electronic commerce, and secure communications. 

 

The book is intended for researchers, practitioners, and students in the fields of cryptography, computer science, and information security.

 

About the Author: 

Henk C.A. van Tilborg 

He is a Dutch computer scientist and cryptographer, who is known for his expertise in the field of cryptography and information security. 

 

He has published numerous papers and books on these topics and has held various positions in academia, industry, and government. 

He is currently a professor at the Technical University of Eindhoven, Netherlands, and has been involved in numerous international research projects and standardization activities in the field of cryptography and security.

Sushil Jajodia 

He is a computer scientist and security expert known for his research on a wide range of topics in the field of information security and cryptography. He is currently a professor at the Center for Secure Information Systems (CSIS) at George Mason University, USA. 

He has published extensively in the field and has served in various roles in professional organizations, including as the Editor-in-Chief of the IEEE Transactions on Dependable and Secure Computing. He has also served as a consultant to a number of government agencies and private companies.


Get the Book

Here are Some Answers for FAQs about Cryptography:

1- What are the 4 principles of Cryptography?

  • Confidentiality: Making sure information is restricted to certain people/ organization 
  • Data integrity: Protecting data from manipulation/ changes 
  • Authentication: A process by which we make sure that the data is claimed by the correct user
  • Non-repudiation: Ensuring that a person or party involved in a transaction or communication cannot contest the veracity of their signature on the document or the transmission of a message.

2- Is Cryptography hard to learn?

Since it significantly draws from the concepts found in mathematics and computer science, cryptography is not difficult to understand if you have a background in those fields. It may be difficult for someone without a background in computer science or mathematics to learn cryptography.

3- Can I teach myself Cryptography?

In the era of the internet, nothing is impossible, as we mentioned earlier the common books in this field which can be used as a self-study without an instructor.

 

Most of the famous crypto guys you know were at the same point where you are now, and with dedication and passion to learn new things they achieved their own progress.

 

Moreover, practical knowledge is key to maintaining your studies, so here are some of the tips that can help you to break through this field:

  • Pick a resource/or a book to study from.
  • Practice your studies by writing programs or breaking crypto codes.
  • Write articles/blogs about what you have learned and share them with your community.

Additional Resources: 

4- Do Cryptographers use Math?

Mathematics forms the basis of cryptography. Therefore, you should be adept at math concepts and applications to pursue a cryptology career. 

Many types of encryption, including abstract algebra, are substantially based on number theory.

 

There isn't a lot of use for calculus and trigonometry. Asymptotic analysis of algorithms, information theory, and probability (including fundamental combinatorics) need also be thoroughly understood.

5- Who is the best Cryptologist?

Although the science is about sharing and adding to previous contributions, there are some figures that can be considered the most famous in this field.

 

Taher Elgamal (born 18 August 1955) is an Egyptian cryptographer. In 1985, Elgamal published a paper titled "A Public Key Cryptosystem and A Signature Scheme based on Discrete Logarithms" in which he proposed the design of the ElGamal discrete log cryptosystem and of the ElGamal signature scheme.

 


 

The latter scheme became the basis for the Digital Signature Algorithm (DSA) adopted by the National Institute of Standards and Technology (NIST) as the Digital Signature Standard (DSS). 

 

He also participated in the "SET" credit card payment protocol, plus a number of Internet payment schemes.

6- What's the difference between a Cryptographer and a Cryptologist?

To understand the difference between a cryptographer and a cryptologist, we need to understand the difference between cryptography, cryptology, and cryptanalysis.

  • Cryptology is the study of codes, both creating and solving them.
  • Cryptography is the art of creating codes.
  • Cryptanalysis is the art of surreptitiously revealing the contents of coded messages, breaking codes, that were not intended for you as a recipient.

7- How to become a Cryptographer?

While a degree isn't necessarily required for cybersecurity professions, the majority of cryptographers think that attending college is a good method to gain the technical abilities required and qualify for entry-level positions that lead to cryptography careers.

a- Consider earning a degree in cybersecurity or computer science.

b- Try to join any internship or entry-level job in information security and work on the following skill set:

 

Technical skills

  • Linear algebra, number theory, and combinatorics
  • Programming (Python, Java, or C++)
  • Operating systems
  • Security software and hardware
  • Computer architecture

Soft skills

  • Critical thinking
  • Self-directed and adaptable: Encryption technology and cybersecurity threats are always changing, so you'll benefit from being adaptable and self-directed in keeping up with the latest trends and technologies.

c- Get certified

Some common certifications among cryptographers include:

  • Certified Encryption Specialist (ECES)
  • Certified Information Systems Security Professional (CISSP)
  • CompTIA Security +

Conclusion

Finally, you will have to choose one resource to start your studies with, however, keep in mind that being updated with the new technologies and security protocols has become an essential part of this field.

Enhance your Technical Skills in Cryptography with CyberTalents 

At CyberTalents platform, we offer different cryptography challenges to practice on and boost your skills. Start Now!

 

Read more articles:

Maximizing Security with AES Encryption: A Comprehensive Guide

What are the Different Types of Encryption? List you must Know

 

Share