// Comparison
Real-World Cryptography vs Serious Cryptography: Which Should You Read?
Two cybersecurity books on Cryptography, compared honestly: who each is for, what each does best, and which to read first.
David Wong's hands-on tour of the cryptographic primitives, protocols and pitfalls that show up in actual production systems, with deliberate attention to TLS, Noise, modern AEAD, and post-quantum.
A Practical Introduction to Modern Encryption
Jean-Philippe Aumasson
Jean-Philippe Aumasson's working introduction to modern cryptography, written for engineers who need both intuition and enough mathematical depth to evaluate the choices a library is making for them.
Read this if
Skip this if
Key takeaways
- Most crypto vulnerabilities are misuse, not broken primitives; Wong's framing of "what to use, what to avoid" is the cleanest in print.
- TLS 1.3, Noise, and Signal-style protocols compose primitives in patterns engineers should recognise on sight, this book teaches the patterns.
- Post-quantum cryptography is no longer optional reading; the book introduces the lattice and hash-based constructions you'll be deploying within a few years.
- Modern primitives can be understood by engineers, given the right framing — Aumasson's choice to bound the math is the book's defining design decision.
- The 2nd edition (2024) covers post-quantum cryptography (Kyber, Dilithium, SPHINCS+) at the depth a deploying engineer actually needs.
- The chapters on hash-function attacks (length extension, multi-collisions) are the clearest in print and explain why half of the production bugs in HMAC-adjacent code happen.
How they compare
Real-World Cryptography and Serious Cryptography are both rated 5/5 in our catalog. Pick by topic preference and reading style rather than by rating.
Both books target intermediate-level readers, so the choice is about topic, not difficulty.
Real-World Cryptography and Serious Cryptography both cover Cryptography, so reading them in sequence reinforces the same material from different angles.
Keep reading
Real-World Cryptography
→ Alternatives to Real-World Cryptography→ What to read after Real-World Cryptography