// Comparison

Cryptography Engineering vs Real-World Cryptography: Which Should You Read?

Two cybersecurity books on Cryptography, compared honestly: who each is for, what each does best, and which to read first.

Intermediate
4/52010
Cryptography Engineering

Design Principles and Practical Applications

Niels Ferguson, Bruce Schneier, Tadayoshi Kohno

A working engineer's introduction to cryptography that takes implementation pitfalls more seriously than most.

Intermediate
5/52021
Real-World Cryptography

David Wong

David Wong's hands-on tour of the cryptographic primitives, protocols and pitfalls that show up in actual production systems, with deliberate attention to TLS, Noise, modern AEAD, and post-quantum.

Read this if

Engineers who need to evaluate cryptographic choices in real systems and want intuition for why the standard advice exists.
Working engineers who need to make crypto decisions in real systems: AEAD ciphers, key exchange, signatures, password hashing, PKI, end-to-end encryption, post-quantum migration. The new modern default and the book we recommend first to almost anyone touching cryptography in production.

Skip this if

Researchers needing rigor, for that, read Boneh/Shoup or Katz/Lindell. Also dated on TLS 1.3, modern AEAD norms, and post-quantum.
Cryptography researchers or readers wanting full mathematical proofs. The math is bounded to what an engineer needs to evaluate choices, not full constructions. For the next layer of depth read Serious Cryptography after this.

Key takeaways

  • Almost every cryptographic disaster is an integration failure, not a primitive failure.
  • Don't roll your own, but understand enough to recognize when the library you're using is wrong.
  • Side channels are not exotic; they are the default mode of failure.
  • Most crypto vulnerabilities are misuse, not broken primitives; Wong's framing of "what to use, what to avoid" is the cleanest in print.
  • TLS 1.3, Noise, and Signal-style protocols compose primitives in patterns engineers should recognise on sight, this book teaches the patterns.
  • Post-quantum cryptography is no longer optional reading; the book introduces the lattice and hash-based constructions you'll be deploying within a few years.

How they compare

We rate Real-World Cryptography higher (5/5 against 4/5 for Cryptography Engineering). For most readers, that means Real-World Cryptography is the primary pick and Cryptography Engineering is a useful follow-up.

Both books target intermediate-level readers, so the choice is about topic, not difficulty.

Cryptography Engineering and Real-World Cryptography both cover Cryptography, AppSec, so reading them in sequence reinforces the same material from different angles.

Keep reading

Related topics