Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

There's a pretty good section on this in Applied Cryptography. Still an incredible book for a field that supposedly moves pretty fast.


It's a good almanac. It's never been a good reference. It's extremely outdated now, and has been for at least a decade and a half.


For explaining the concepts, maybe. Please don’t implement any protocols from that book!


It's pretty bad on the concepts, too.

There are good books on the concepts that won't blow your head off; two of them are JP Aumasson's "Serious Cryptography" and David Wong's "Real World Cryptography".


Can you give an example of such a bad concept explained in Applied Cryptography vs Serious Cryptography?

Because, out of curiosity, I just downloaded both books, skimmed on both of them (having read in the past Applied Cryptography it took me less time for it of course) through first chapters (classic crypto, randomness and RSA chapters) and found that they are very similar.

So, again, do you have a proof of your statement or are you just another Schneier hater?


https://sockpuppet.org/blog/2013/07/22/applied-practical-cry...

Even Schneier himself wouldn't make the claim you just did.


I don't remember there being anything downright wrong in Applied Cryptography, at least at the time it was published, although it doesn't convey a lot of the nuance that is required in implementing secure systems. But it now 30 years out of date.




Consider applying for YC's Summer 2026 batch! Applications are open till May 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: