// Comparison
Crypto Dictionary vs Real-World Cryptography: Which Should You Read?
Two cybersecurity books on Cryptography, compared honestly: who each is for, what each does best, and which to read first.
500 Tasty Tidbits for the Curious Cryptographer
Jean-Philippe Aumasson
Jean-Philippe Aumasson's alphabetical, opinionated reference on cryptographic terms, primitives, attacks and folklore. Snack-format companion to Serious Cryptography.
David Wong's hands-on tour of the cryptographic primitives, protocols and pitfalls that show up in actual production systems, with deliberate attention to TLS, Noise, modern AEAD, and post-quantum.
Read this if
Skip this if
Key takeaways
- Aumasson's opinionated entries ("don't use", "use this instead", "avoid for this reason") condense decades of practitioner judgment into one-paragraph verdicts.
- Term coverage spans symmetric, asymmetric, hash, post-quantum, side-channel, and crypto-folklore; few references this small are this comprehensive.
- The book's value compounds over time: every paper or write-up sends you back to it.
- Most crypto vulnerabilities are misuse, not broken primitives; Wong's framing of "what to use, what to avoid" is the cleanest in print.
- TLS 1.3, Noise, and Signal-style protocols compose primitives in patterns engineers should recognise on sight, this book teaches the patterns.
- Post-quantum cryptography is no longer optional reading; the book introduces the lattice and hash-based constructions you'll be deploying within a few years.
How they compare
We rate Real-World Cryptography higher (5/5 against 4/5 for Crypto Dictionary). For most readers, that means Real-World Cryptography is the primary pick and Crypto Dictionary is a useful follow-up.
Crypto Dictionary is pitched at beginner level. Real-World Cryptography is pitched at intermediate level. Read the easier one first if you're not yet comfortable with the topic.
Crypto Dictionary and Real-World Cryptography both cover Cryptography, so reading them in sequence reinforces the same material from different angles.
Keep reading
Real-World Cryptography
→ Alternatives to Real-World Cryptography→ What to read after Real-World Cryptography