Curator's Library

Further Reading

Curated bibliography for serious students of cryptography — books, journals, scholars, and archives

Note: The Cipher Museum does not sell, endorse, or affiliate with any publisher or retailer. All links go to official author pages, publisher pages, or open-access repositories. No affiliate codes are used. ISBNs are provided to help you locate copies through your preferred library or bookseller.

Canonical Histories

The five books cited most often throughout this museum. If you read nothing else, read these.

History · Essential
The Codebreakers
David Kahn
1967 · revised 1996 · ISBN 978-0684831305

The foundational history of cryptology from ancient Egypt to the NSA. 1,200 pages. Kahn coined the modern academic vocabulary of the field, interviewed surviving WWII codebreakers while their work was still classified, and created the discipline of cryptological history. Every serious subsequent work cites this one. The 1996 revised edition adds chapters on the computer age and public-key revolution and is the edition to buy.

Publisher page → EssentialHistory
Popular Science · Essential
The Code Book
Simon Singh
1999 · ISBN 978-0385495325

The best single-volume introduction to cryptography for a general reader. Singh traces ciphers from Mary Queen of Scots through quantum cryptography with rigorous accuracy and excellent narrative pacing. His explanations of public-key cryptography and the history of Enigma are particularly clear. Includes a £10,000 cipher challenge (ten stages, all solved by 2000); the companion website's educational resources remain excellent.

Author site → EssentialIntroductory
Academic · Historical Cryptanalysis
Secret History: The Story of Cryptology
Craig P. Bauer
2nd ed. 2021 · ISBN 978-1138061231

The college-level textbook that bridges history and mathematics most cleanly. Includes worked cryptanalysis exercises, an unsolved-ciphers chapter, cipher puzzles with solutions, and coverage of non-Western cryptographic traditions. The second edition adds sections on Copiale, the Mary Stuart letters, Beale context updates, and Voynich radiocarbon dating, and is notably better than the first.

Publisher page → TextbookMathematics
Academic · Technical History
Decrypted Secrets: Methods and Maxims of Cryptology
Friedrich L. Bauer
4th ed. 2007 · ISBN 978-3540426745

The deepest single technical history of classical cipher systems. Bauer (a German computer scientist) provides full mathematical treatment of every major cipher family from Alberti through Hagelin and Enigma — including detailed cryptanalytic methods, formal definitions of period, key length, redundancy, and unicity distance. Denser than Kahn, more historically grounded than Stinson. The standard graduate-level reference for classical cryptanalysis.

Springer page → ReferenceCryptanalysis
Illustrated Overview · Browsable
The Story of Codes: The History of Secret Communication
Stephen Pincock & Mark Frary
2019 · ISBN 978-1782747444 · originally Codebreaker, Walker & Co. 2006

A richly illustrated popular survey covering roughly thirty cipher episodes from Egyptian hieroglyphs through quantum cryptography. Strong on visual material — facsimiles of the Mary Stuart letters, Voynich folios, Beale ciphertexts, Dorabella, the Phaistos Disc, Kryptos — and on framing each cipher with the historical anecdote that gives it weight. Not a primary scholarly source: the technical detail is shallower than Singh and far shallower than Kahn or Bauer, and a few characterisations (e.g. of the "Bible code") would not survive academic scrutiny. Best treated as a gift-book introduction or a quick visual reference for instructors building cipher exhibits — exactly the use case this museum was built around. Reissued in 2019 with a new cover but unchanged content.

Goodreads → IllustratedIntroductory
Engineering Reference
Cryptography Engineering
Niels Ferguson, Bruce Schneier, Tadayoshi Kohno
2010 · ISBN 978-0470474242

The successor to Schneier's Applied Cryptography (1996), updated for the world after AES, SHA-2, and the protocol disasters of the early 2000s. Where Applied Cryptography was a catalogue of algorithms, this is a guide to building secure systems with them — covering side channels, key management, protocol composition, and the design of TLS-like protocols. The current standard practitioner reference.

Author page → TechnicalModern

Modern Cryptography Textbooks

For readers who want to follow the historical thread into rigorous modern cryptography. The first two are the standard graduate references; the third is a free, comprehensive open-access alternative.

Graduate Textbook
Introduction to Modern Cryptography
Jonathan Katz & Yehuda Lindell
3rd ed. 2020 · ISBN 978-0815354369

The standard graduate textbook for provable-security cryptography. Develops the modern definitional framework — semantic security, IND-CPA, IND-CCA, authenticated encryption — from first principles, with full proofs. Covers symmetric primitives, hash functions, public-key encryption, signatures, and key exchange. Used in cryptography courses worldwide. The book that defines what "modern" means in modern cryptography.

Authors' page → GraduateProvable Security
Free Online Textbook
A Graduate Course in Applied Cryptography
Dan Boneh & Victor Shoup
Draft v0.6, 2023 · Free PDF

A free, ~900-page graduate textbook by two of the most influential cryptographers of the post-AES era. Covers the same provable-security ground as Katz–Lindell with deeper treatment of public-key topics (lattices, pairings, post-quantum), real-world protocols (TLS 1.3, Signal), and zero-knowledge proofs. The companion text to Boneh's Stanford Cryptography I Coursera course. Continually revised; cite the version.

Free PDF → FreeOpen Access
Foundational Textbook
Cryptography: Theory and Practice
Douglas R. Stinson & Maura B. Paterson
4th ed. 2018 · ISBN 978-1138197015

The classic mathematics-first cryptography textbook, now in a thoroughly revised fourth edition co-authored with Maura Paterson. Strongest book for the classical-to-modern transition: Shannon's information-theoretic security, perfect secrecy, the AES design rationale, and number-theoretic foundations of public-key cryptography are all covered with full mathematical detail and exercises.

Publisher page → TextbookMathematical
History · Public-Key Era
Crypto: How the Code Rebels Beat the Government
Steven Levy
2001 · ISBN 978-0140244328

The narrative history of the public-key revolution and the Crypto Wars of the 1990s — Diffie, Hellman, Merkle, Rivest–Shamir–Adleman, Zimmermann's PGP, the Clipper Chip, the export-control fight. Levy interviewed every major participant. The standard popular history of how civilian cryptography escaped the NSA's monopoly. Essential for anyone reading the museum's modern-era exhibits.

Publisher page → HistoryModern

Biography & Narrative History

Biography
Alan Turing: The Enigma
Andrew Hodges
1983 · centenary ed. 2014 · ISBN 978-0691164724

The standard biography of Turing, written by a mathematician who treats the technical material seriously. Covers Bletchley Park in depth, Turing's contributions to the Bombe design, his postwar computing and morphogenesis work, and his prosecution and death. The centenary edition includes a new preface and updated bibliographic notes. The basis of the (significantly less accurate) film The Imitation Game.

Author site → BiographyWWII
Biography
The Woman Who Smashed Codes
Jason Fagone
2017 · ISBN 978-0062430489

Reconstruction of Elizebeth Smith Friedman's career from Riverbank Laboratories through the Coast Guard and WWII Abwehr work, drawing on her papers at the Marshall Library (opened 2008) and Coast Guard records. The definitive account of the FBI's deliberate erasure of her contribution and the restoration of the historical record. Essential companion to the Elizebeth Friedman exhibit.

Author site → BiographyWomen in Crypto
Memoir
Between Silk and Cyanide
Leo Marks
1998 · ISBN 978-0684864228

Marks's memoir of running SOE's codes section from 1942 to 1945. Uniquely combines insider technical detail about agent cipher systems (poem codes, silk one-time pads, worked-out keys) with vivid character writing. The best first-person account of operational cryptography under wartime pressure. Sold as literary memoir; the technical accuracy is impeccable. Companion to the Leo Marks exhibit.

MemoirSOEWWII
Popular History
Seizing the Enigma
David Kahn
1991 · revised 2012 · ISBN 978-1591146650

Kahn's focused account of Allied capture operations against German naval Enigma material — pinches from weather ships, trawlers, and submarines. Explains why physical capture of key material was as important as mathematical cryptanalysis and how the two combined in the Battle of the Atlantic. A shorter, more readable Kahn than The Codebreakers.

HistoryNavalWWII
Popular History
Battle of Wits
Stephen Budiansky
2000 · ISBN 978-0684859323

The best single-volume Allied codebreaking history of WWII — Bletchley Park, Arlington Hall, OP-20-G, the Pacific war, and the cooperation between them. Budiansky integrates the Polish, British, and American contributions to Enigma in a way Hinsley's official history could not, and treats Friedman's Purple solution and JN-25 work with equal weight. Highly readable; rigorously sourced.

HistoryWWII
Modern Intelligence History
GCHQ: The Uncensored Story of Britain's Most Secret Intelligence Agency
Richard J. Aldrich
2010 · ISBN 978-0007278473

The standard scholarly history of GCHQ from its 1919 origins as GC&CS through the Cold War, the UKUSA agreement, and the Snowden era. Aldrich is the first historian granted substantive access to the GCHQ archives. Covers Bletchley's transition into Eastcote and Cheltenham, the development of British SIGINT alliances, and the public-key cryptography work of Ellis, Cocks, and Williamson at GCHQ in the 1970s.

Intelligence HistoryCold War

Specialist Histories

Deeper dives into specific institutions, programs, and cipher families.

Bletchley Park · Insider Account
Codebreakers: The Inside Story of Bletchley Park
F. H. Hinsley & Alan Stripp (eds.)
1993 · ISBN 978-0192802132

Thirty first-person essays by Bletchley veterans — Welchman, Milner-Barry, Tutte, Good, Joan Murray (Clarke), and others — written when most were in their seventies, with declassification finally permitting honesty. The single best primary-source compilation on Hut 6, Hut 8, and the Newmanry. Hinsley's introduction is the most concise authoritative summary of Bletchley's organizational history available.

Primary SourceBletchley
Bletchley Park · Memoir
The Hut Six Story
Gordon Welchman
1982 · revised 1997 · ISBN 978-0947712341

Welchman's account of organizing and running Hut 6 (army and air-force Enigma). Explains the diagonal-board addition to the Bombe — his single most important technical contribution — and the production-line approach to traffic analysis that made daily Enigma decryption possible. Publication caused him serious legal trouble with GCHQ and NSA; the book is the reason later memoirs were possible.

MemoirBletchley
Polish Enigma History
Enigma: How the Poles Broke the Nazi Code
Władysław Kozaczuk & Jerzy Straszak
2004 · ISBN 978-0781809412

The standard English-language account of the Polish Cipher Bureau's break of Enigma in 1932 and the work of Rejewski, Różycki, and Zygalski through the July 1939 Warsaw meeting that handed the solution to the British and French. Corrects decades of British accounts that minimized the Polish contribution. Includes Rejewski's own technical appendices on the cyclometer and the original Bomba.

PolishWWII
Pacific Theatre · Codebreaking
Combined Fleet Decoded
John Prados
1995 · ISBN 978-1557504319

The standard Pacific-war SIGINT history. Covers JN-25 and the work of OP-20-G, FRUMEL, and Station HYPO from Pearl Harbor through the surrender. Prados integrates the codebreaking with the operational decisions it informed (Coral Sea, Midway, Yamamoto shoot-down) more rigorously than the popular Pacific war literature. Companion reading for the museum's JN-25 and Purple exhibits.

PacificSIGINT
Cold War SIGINT · VENONA
Venona: Decoding Soviet Espionage in America
John Earl Haynes & Harvey Klehr
1999 · ISBN 978-0300084627

The first scholarly history written after the 1995 VENONA declassification. Walks through what the 2,900 partially decrypted Soviet intelligence cables actually showed about the Rosenbergs, Alger Hiss, the Cambridge Five, the Manhattan Project penetrations, and OSS infiltration. The standard reference for what VENONA proved and — equally important — what it did not. Pair with Wright's Spycatcher for the British end.

Cold WarVENONA
History of Intelligence
Spycatcher
Peter Wright
1987 · ISBN 978-0670821556

MI5 officer Peter Wright's controversial memoir covers Cold War SIGINT, the VENONA investigation's British end, and the unmasking of Roger Hollis. Legally suppressed in the UK, published in Australia. Wright's technical descriptions of the VENONA process and the Cambridge Five investigation are primary-source material, though his conspiratorial conclusions about Hollis are disputed. Use for VENONA context; evaluate conclusions critically.

Intelligence HistoryCold War

Academic Journals & Proceedings

Peer-Reviewed Journal
Cryptologia
Taylor & Francis · Founded 1977

The principal peer-reviewed journal covering the history and mathematics of cryptology. Publishes historical cipher analyses, biographies of cryptologists, NSA and GCHQ declassification reviews, and mathematical studies of classical cipher security. Many landmark cipher solutions (Copiale, Mary Queen of Scots nomenclators, Dorabella analyses) appeared here first. Articles from 1977–2015 are partially open-access via JSTOR.

Journal page → Peer-ReviewedHistoryMathematics
Conference Proceedings · Open Access
HistoCrypt
Annual conference · First held 2018

The annual conference on historical cryptology — the world's only dedicated academic venue for classical cipher research. Proceedings are open-access via the Linköping Electronic Conference Proceedings. Covers unsolved cipher attacks, historical document analysis, digital humanities approaches to manuscript decipherment, and new archival discoveries. The Lasry–Biermann–Tomokiyo Mary Stuart paper and the Voynich radiocarbon context papers both presented here.

Conference site → Open AccessConference
Academic Project · Open Access
DECODE — Decipherment of Coded Manuscripts
Uppsala University · EU-funded

An EU-funded database of undeciphered or recently deciphered historical manuscripts, maintained at Uppsala University. Includes the most comprehensive catalogue of known historical cipher manuscripts currently available — over 75,000 documented items. Researchers can submit new discoveries. The primary scholarly database for anyone working on historical cipher manuscripts.

DECODE database → DatabaseOpen Access
Modern Cryptography Journal
Journal of Cryptology
Springer · IACR · Founded 1988

The flagship journal of the International Association for Cryptologic Research, the publication of record for modern cryptographic theory. Many foundational results — definitional frameworks for security, lattice-based cryptography, zero-knowledge proofs — were first published here. Open-access companion to the IACR ePrint Archive: most papers eventually appear in both venues.

Journal page → Modern CryptoPeer-Reviewed
Journal of Record
IEEE Annals of the History of Computing
IEEE · Founded 1979

The IEEE's history of computing journal regularly publishes material on code-breaking machines (Colossus, Bombe, ENIGMA reconstruction), early NSA computing, and Cold War SIGINT machinery. The Colossus reconstruction team's authoritative papers appeared here. Essential for the mechanical and electronic cipher machine histories.

Journal page → Computing HistoryMachines
IACR Conferences
Crypto · Eurocrypt · Asiacrypt
IACR · Annual

The three flagship IACR conferences are where modern cryptographic research is announced. All proceedings are freely available through the IACR digital library. Reading even the abstracts of recent years gives a sense of where the field is moving — currently dominated by lattice-based and post-quantum schemes, multi-party computation, and applied protocol analysis.

IACR home → Modern CryptoOpen Access

Scholar Profiles — Active Researchers

  • George Lasry
    Cryptanalyst · Co-author, Mary Queen of Scots nomenclator decipherment (2022)

    Lasry's papers combine automated hill-climbing search with historical cryptanalysis to attack unsolved historical ciphers at scale. His work on the Mary Stuart Castelnau letters (with Norén and Tomokiyo, Cryptologia 2023) is the most significant historical cipher decipherment of the 2020s. His solver toolkit and papers are openly published. See the Lasry exhibit for fuller context on his methods and results.

    Publications → ActiveHistorical Cryptanalysis
  • Beáta Megyesi
    Professor, Uppsala University · Lead, DECODE project

    Computational linguist who leads the DECODE database project and co-directs HistoCrypt. Her primary research applies NLP and statistical methods to historical cipher manuscript analysis. Co-author on the Copiale cipher solution (2011) and the Mary Stuart Castelnau letters (2023). The DECODE database she maintains is the primary scholarly resource for manuscript cipher research globally.

    Faculty page → ActiveNLP · Computational
  • Satoshi Tomokiyo
    Independent researcher · Historical cipher manuscripts

    A Japanese independent researcher who has published extensively on Renaissance and early-modern cipher systems via his long-running personal research website and Cryptologia. Co-author on the Mary Stuart Castelnau paper. His online catalogue of European nomenclators, papal diplomatic ciphers, and Argenti family cipher manuscripts is the most extensive single resource of its kind in any language.

    Cryptiana research site → ActiveRenaissance Ciphers
  • Nick Pelling
    Researcher · Voynich manuscript; historical unsolved ciphers

    Author of The Curse of the Voynich (2006) and one of the field's most thorough Voynich analysts. Pelling's blog Cipher Mysteries is the most comprehensive tracking resource for active unsolved cipher research — covering Rongorongo, Dorabella, McCormick, Zodiac, and Voynich in systematic depth. His analytical standards on dating, provenance, and methodological honesty are higher than most academic work in this space.

    Cipher Mysteries blog → ActiveUnsolved Ciphers
  • Klaus Schmeh
    Cryptanalyst · Co-author, Codebreaking: A Practical Guide (2023)

    German cryptologist whose blog Cipherbrain (English) and earlier Klausis Krypto Kolumne (German) document hundreds of historical cipher cases, from greeting-card postcards to long-unsolved mysteries. Co-author with Elonka Dunin of the practical cryptanalysis textbook used by many European university courses. Frequent Cryptologia contributor and HistoCrypt presenter.

    Cipherbrain blog → ActivePractical Cryptanalysis
  • James Gillogly
    Cryptanalyst · Beale Papers, Chaocipher mechanism, historical cipher solutions

    Retired computer scientist and cryptanalyst who has published landmark analyses of major unsolved ciphers: the earliest serious statistical analysis of the unbroken Beale Papers ciphers (B1 and B3), the reconstruction of Chaocipher's mechanism from the Byrne estate papers, and analysis of the McCormick cipher. His papers in Cryptologia are models of rigorous statistical approach to historical cipher problems.

    ActiveStatistical Analysis
  • Elonka Dunin
    Cryptanalyst · Kryptos, Cicada 3301 pioneer; co-author, Codebreaking: A Practical Guide

    Game-industry veteran turned professional cipher researcher. Maintains the definitive list of famous unsolved ciphers, co-authored the CIA Kryptos FOIA disclosure campaign, and wrote Codebreaking: A Practical Guide (with Klaus Schmeh, 2023). Dunin is the primary public interface between the cryptanalysis community and mainstream media on Kryptos and similar challenges. See the Dunin exhibit.

    Personal site → ActiveKryptosAdvocacy

Primary Source Archives

  • NSA Center for Cryptologic History
    Fort Meade, Maryland

    The NSA's public history arm publishes declassified monographs, oral history transcripts, and the back issues of the internal Cryptolog journal. The VENONA documents (2,900 decrypted messages), the Friedman Documents collection, and the technical histories of SIGABA, SIGSALY, and early NSA computing are free downloads. The single richest primary-source archive for 20th-century American cryptologic history.

    nsa.gov/history → Primary SourcesFree
  • Bletchley Park Trust Archive
    Milton Keynes, UK

    The Bletchley Park Trust maintains an archive of personal papers, photographs, oral histories, and technical documents from the WWII codebreaking operation. The on-site museum exhibits the working Bombe and Colossus reconstructions. The Trust's Roll of Honour database documents nearly all 10,000 wartime staff and is the definitive prosopographic resource on the operation.

    bletchleypark.org.uk → Primary SourcesWWII
  • UK National Archives — HW Series
    Kew, London

    The HW (“Historical Working”) record series at TNA holds the declassified GC&CS / GCHQ files, including ULTRA decrypts (HW 1, HW 5), Enigma technical files (HW 25), Lorenz / Tunny material (HW 50), and Hinsley's official-history working papers. Most files are free to read on-site; many are now available as digital downloads through Discovery.

    Discovery search → Primary SourcesWWII
  • US National Archives — Record Group 457
    College Park, Maryland

    RG 457 is the primary NSA / ASA / AFSA record group — the largest collection of US SIGINT materials available to researchers. Contains VENONA working papers, original MAGIC (“Purple”) intercept files, raw WWII intercept traffic, and NSA's own historical studies of major programs. Many materials require FOIA requests; others are open access. The definitive first stop for primary-source American SIGINT research.

    RG 457 finding aid → Primary SourcesSIGINT
  • Friedman Collection — George C. Marshall Foundation
    Virginia Military Institute, Lexington, VA

    The William F. and Elizebeth S. Friedman papers, the largest single archive on the founding generation of American cryptanalysis. Includes Riverbank Laboratories materials, Coast Guard case files, court testimony from the Prohibition rum-runner trials, William's NSA-era technical manuscripts, and Elizebeth's WWII Abwehr South America files. Substantial portions are now digitized and free to download.

    Marshall Foundation → Primary SourcesBiography
  • Voynich Manuscript — Beinecke MS 408
    Yale University Library

    Full high-resolution scans of every page of the Voynich Manuscript are freely available through the Beinecke Rare Book and Manuscript Library. The standard research corpus. Researchers should also consult René Zandbergen's voynich.nu, the most thorough public source on provenance, hand identification, and transcript history — in more depth than any single publication.

    Beinecke digital scans → Primary SourcesUnsolvedFree
  • Crypto Museum
    Paul Reuvers & Marc Simons · Eindhoven, Netherlands · cryptomuseum.com

    The most comprehensive online archive of cipher machines, spy radios, burst encoders, and intelligence-related communications equipment. Detailed technical reconstructions, photographs, and operator documentation for hundreds of cipher machines from the early 1900s through the Cold War. The Cipher Museum's Hagelin family sidebar (M-209 exhibit) and SIGSALY exhibit cite Crypto Museum Foundation documentation directly. Cipher Museum is listed in Crypto Museum's Virtual Museums directory (April 2026).

    cryptomuseum.com → Peer InstitutionHardwareFree

Web Resources & Software

Analysis Software · Open Source
CrypTool 2
CrypTool Project

The most comprehensive open-source cryptanalysis workbench. Visual, plugin-based architecture. Implements every classical cipher in this museum plus modern algorithms, statistical analysis tools (IoC, Kasiski, chi-square, n-gram fitness), and historical cipher-specific plugins. Runs on Windows; all algorithms open source. The standard first tool for anyone working on historical cipher texts.

cryptool.org → SoftwareFree
Browser-based Toolkit
CyberChef
GCHQ · Open Source

GCHQ's open-source data-analysis web application: 300+ cipher, encoding, hashing, and parsing operations chainable into recipes that run entirely in the browser. The fastest tool for quick classical-cipher experiments and for the encoding-stack analysis common in CTFs and ARG research. No data leaves the page.

CyberChef app → SoftwareFree
Research Website
Cipher Mysteries
Nick Pelling

The most comprehensive independent tracking site for unsolved cipher research. Covers Voynich, Rongorongo, Dorabella, McCormick, Zodiac Z-340, and dozens of smaller cases with academic rigor. Pelling documents his methodology, cites primary sources, and regularly updates when new scholarship appears. The best single website for following active unsolved cipher research.

ciphermysteries.com → WebsiteUnsolved Ciphers
Voynich Reference
voynich.nu
René Zandbergen

The most thorough public reference on the Voynich Manuscript: full provenance from Rudolf II to Yale, statistics on the Voynichese script, transcription history (EVA, v101, FSG), every documented hand and bifolio, and ongoing radiocarbon and material analyses. Maintained by an ESA engineer who has worked the manuscript for 30+ years. The standard online reference.

voynich.nu → WebsiteVoynich
Challenge Platform
MysteryTwister
CrypTool Project

A structured cipher challenge platform with hundreds of cryptanalysis puzzles graded by difficulty (1–4 stars, plus X-class open challenges). Each challenge has a scoring system, hint structure, and verified solution checking. The X-class challenges are genuine research-grade problems — some unsolved for years. The best learning platform that bridges educational puzzles and real cryptanalysis skill.

mysterytwister.org → ChallengesFree
Academic Preprints
Cryptology ePrint Archive
IACR

The International Association for Cryptologic Research's preprint server — the first place new cryptographic results appear. Hosts 25,000+ papers on modern cryptography, post-quantum algorithms, zero-knowledge proofs, and formal security proofs. Not typically historical, but essential for anyone following the modern side of the field that leads from classical cipher principles.

eprint.iacr.org → PreprintsModern CryptoFree
Free Online Course
Stanford Cryptography I & II
Dan Boneh · Coursera

The standard free online introduction to modern cryptography, taught by one of the field's most influential researchers. Cryptography I covers symmetric encryption, message integrity, key exchange, and public-key foundations; Cryptography II covers signatures, identification, zero-knowledge, and protocols. Companion text is Boneh & Shoup's free Graduate Course in Applied Cryptography. The most direct path from classical-cipher curiosity to modern theory.

Coursera → CourseFree
Reference · Federal
NIST Computer Security Resource Center
National Institute of Standards and Technology

The authoritative source for current US cryptographic standards: AES (FIPS 197), SHA-2 / SHA-3 (FIPS 180-4 / 202), the post-quantum standards ML-KEM, ML-DSA, and SLH-DSA (FIPS 203/204/205, finalized 2024), and the SP 800 guidance series. The historical archive of NIST's cipher competitions — AES, SHA-3, post-quantum — is itself an unmatched primary-source record of how modern cipher standards are made.

csrc.nist.gov → StandardsFree
Commentary
Schneier on Security
Bruce Schneier

Schneier's blog has been continuously published since 2004 and is the longest-running serious commentary on cryptography, security policy, and the social context in which both operate. The monthly Crypto-Gram newsletter aggregates the same material by email. Essential for anyone who wants to follow the policy and culture of cryptography alongside its technical history.

schneier.com → CommentaryPolicy