Jean-Philippe Aumasson’s Serious Cryptography is a classic (and serious) introduction to the field. Arranged as alphabetical dictionary definitions with occasional supplementary details, his Crypto Dictionary: 500 Tasty Tidbits for the Curious Cryptographer is a rather less serious, but surprisingly comprehensive, collection of nuggets of information about cryptography that will make you smile, and occasionally scratch your head. Sometimes the writing is pithy: Base64 is simply labelled “not encryption”, while the fundamental cryptocurrency concept Proof of work is (accurately) defined as “cryptography’s contribution to environmental problems”. Sometimes it’s both pithy and helpful: as well as calling blockchain “both a blessing and a curse”, the book offers an even-handed discussion of the drawbacks and benefits of so much interest in the technology. Not all of the jokes are funny (or appropriate), with some being so cryptic that they will escape anyone who isn’t an expert (although it’s well worth researching why the author refers to Time AI as “the Fyre Festival of cryptography”). The author can’t resist the odd hobbyhorse that doesn’t contribute much, and you’ll need some mathematical knowledge and a passing acquaintance with cryptography basics to get the most out of the more technical definitions. SEE: Security Awareness and Training policy (TechRepublic Premium) But there are also plenty of genuinely useful entries with helpful explanations, from the basics of Diffie-Hellman encryption to Bruce Schneier’s famous warning signs for spotting cryptography systems that are more marketing hype than actual security. Crypto Dictionary covers standards, conferences, key websites, historical references and anecdotes – like the infamous banking representative asking for the fundamental principles of TLS 1.3 to be changed when the standard was all but decided – making it as much of a compendium as a dictionary. Crypto Dictionary won’t teach you how to do cryptography or how to judge if something is cryptographically sound. But if you want to look up a specific cryptography cipher, technique or protocol, know what rainbow tables are and how they help crack passwords, or read about the difference between quantum and post-quantum cryptography (the former being both post-quantum but also not part of the latter), then this book is an ideal starting point. It will also probably pique your interest in some other concept as you turn to the relevant page. RECENT AND RELATED CONTENT How quantum networking could transform the internet [Status Report] Qrypt’s cloud service will distribute entropy for better cryptography Samsung’s new Galaxy Quantum 2 uses quantum cryptography to secure apps Quantum computing breaking into real-world biz, but not yet into cryptography Crypto miners look beyond China as government threatens crackdown Read more book reviews
People Count, book review: Technology, data, privacy and contact-tracing appsAtlas of AI, book review: Mapping out the total cost of artificial intelligenceSilicon Values, book review: A history of online censorship in the Big Tech eraThe Hype Machine, book review: Inside the ‘social media industrial complex’The Hidden Power of Systems Thinking, book review: Reinventing governance