Buy new:
$99.65
FREE delivery Thursday, July 25
Ships from: PEANUT BOOKS
Sold by: PEANUT BOOKS
Kindle app logo image

Download the free Kindle app and start reading Kindle books instantly on your smartphone, tablet, or computer - no Kindle device required.

Read instantly on your browser with Kindle for Web.

Using your mobile phone camera - scan the code below and download the Kindle app.

QR code to download the Kindle App

Follow the authors

Something went wrong. Please try your request again later.

Introduction to Modern Cryptography: Principles and Protocols (Chapman & Hall/CRC Cryptography and Network Security Series) 1st Edition


Save 10% at checkout Shop items
{"desktop_buybox_group_1":[{"displayPrice":"$99.65","priceAmount":99.65,"currencySymbol":"$","integerValue":"99","decimalSeparator":".","fractionalValue":"65","symbolPosition":"left","hasSpace":false,"showFractionalPartIfEmpty":true,"offerListingId":"nxr6fMotdht29t%2FeYHPaQbl8X3ch0ilPJZBuQVyrEe4IBr67xO5U8gz1DI4tIaca4Uaw%2FBEr3OvcWCCSfcO8ws1HKDQO0%2Bm5iqKLDei5ndZtG9AXjHm5JsVmGSgYYgfaOZeawGv4Erx0waWA5cH5pO0pAEZeu5zXzrEpbevFF37AKS6RG6B6VT7RaM7x1ZCp","locale":"en-US","buyingOptionType":"NEW","aapiBuyingOptionIndex":0}, {"displayPrice":"$32.99","priceAmount":32.99,"currencySymbol":"$","integerValue":"32","decimalSeparator":".","fractionalValue":"99","symbolPosition":"left","hasSpace":false,"showFractionalPartIfEmpty":true,"offerListingId":"nxr6fMotdht29t%2FeYHPaQbl8X3ch0ilP%2Fo7FlKrzUitXk69smmg1eli%2FOPCbXLlMNPaAU97926QwydbTqwGz%2BBvrAlgZ9Joqld%2BtKuWlET7vqaUqsgT8KjNsD%2FC3hZQpScF1meoW050hQXPCKeQoo%2Bi69Is95b5K9ibhO95mZno0ZHoL93bsrY9FCVH%2Bn7LB","locale":"en-US","buyingOptionType":"USED","aapiBuyingOptionIndex":1}]}

Purchase options and add-ons

Cryptography plays a key role in ensuring the privacy and integrity of data and the security of computer networks. Introduction to Modern Cryptography provides a rigorous yet accessible treatment of modern cryptography, with a focus on formal definitions, precise assumptions, and rigorous proofs.

The authors introduce the core principles of modern cryptography, including the modern, computational approach to security that overcomes the limitations of perfect secrecy. An extensive treatment of private-key encryption and message authentication follows. The authors also illustrate design principles for block ciphers, such as the Data Encryption Standard (DES) and the Advanced Encryption Standard (AES), and present provably secure constructions of block ciphers from lower-level primitives. The second half of the book focuses on public-key cryptography, beginning with a self-contained introduction to the number theory needed to understand the RSA, Diffie-Hellman, El Gamal, and other cryptosystems. After exploring public-key encryption and digital signatures, the book concludes with a discussion of the random oracle model and its applications.

Serving as a textbook, a reference, or for self-study, Introduction to Modern Cryptography presents the necessary tools to fully understand this fascinating subject.

Amazon First Reads | Editors' picks at exclusive prices

Editorial Reviews

Review

This book is a comprehensive, rigorous introduction to what the authors name ‘modern’ cryptography … a novel approach to how cryptography is taught, replacing the older, construction-based approach. … The concepts are clearly stated, both in an intuitive fashion and formally. … I would heartily recommend this book to anyone who is interested in cryptography. … the exercises are challenging and interesting, and can benefit readers of all academic levels. …
―IACR book reviews, January 2010

Over the past 30 years, cryptography has been transformed from a mysterious art into a mathematically rigorous science. The textbook by Jonathan Katz and Yehuda Lindell finally makes this modern approach to cryptography accessible to a broad audience. Readers of this text will learn how to think precisely about the security of protocols against arbitrary attacks, a skill that will remain relevant and useful regardless of how technology and cryptography standards change. The book uses just enough formalism to maintain precision and rigor without obscuring the development of ideas. It manages to convey both the theory's conceptual beauty and its relevance to practice. I plan to use it every time I teach an undergraduate course in cryptography.
―Salil Vadhan, Harvard University, Cambridge, Massachusetts, USA

… the greatest attribute is the fact that the material is presented in such a unified way. These are not just a collection of topics from cryptography, thrown together at random. One topic leads effortlessly to the next. As such, this is a virtually indispensible resource for modern cryptography.
―Donald L. Vestal, South Dakota State University,
MAA Online, July 2008

… gives an excellent introduction to the theoretical background of cryptography. It would be a fine textbook for an advanced undergraduate (or graduate) course in theoretical computer science for students who have already seen the rudiments of cryptography. It will be a valuable reference for researchers in the field …
―Steven D. Galbraith,
Mathematical Reviews, 2009b

The book is highly recommended as a textbook in cryptography courses at graduate or advanced undergraduate levels … covers in a splendid way the main notions of current cryptography from the point of view of information-theoretical security. This corresponds indeed to a modern cryptography approach.
―Guillermo Morales-Luna,
Zentralblatt MATH, Vol. 1143

Product details

  • Publisher ‏ : ‎ Chapman and Hall/CRC; 1st edition (August 31, 2007)
  • Language ‏ : ‎ English
  • Hardcover ‏ : ‎ 552 pages
  • ISBN-10 ‏ : ‎ 1584885513
  • ISBN-13 ‏ : ‎ 978-1584885511
  • Item Weight ‏ : ‎ 2 pounds
  • Dimensions ‏ : ‎ 6.25 x 1.5 x 9.5 inches
  • Customer Reviews:

About the authors

Follow authors to get new release updates, plus improved recommendations.

Customer reviews

4 out of 5 stars
4 out of 5
21 global ratings

Top reviews from the United States

Reviewed in the United States on May 16, 2011
It was very nice to see how security would be possibly defined in a sense different from (and more relaxed than) information-theoretic secrecy. It was nice to see how different definitions would lead to different levels of security, or in other words, each definition gives a guarantee of security against a certain class of real-life security threats (or attacks) and takes also into account very practical issues like dealing with computationally bounded adversaries. Moreover, introducing the notion of security using those definitions made the whole setting, not only mathematically rigorous, but also coherent, structured, and well-founded, without losing contact with practical concerns and real-life scenarios. Even more, this setting gave a neat and mathematically sound way to attain a proven notion of security rather than just introducing or suggesting schemes that show "good" performance in practice without being able to say anything, or quantify the security they provide on a more fundamental level. Another thing I also liked very much and is related to the point above, is how the book moves on to the point where it was shown that the provable security of almost (if not all) the encryption schemes (either private-key or public-key based) as well as authentication codes and signature schemes is based on the corner stone assumption of existence of one-way functions (one-way permutations). It was very elegant the way a one-way function (permutation) was defined and the way it is used to prove security in one sense or the other. It fits in very well in the development of the theory and made the whole structure very homogeneous. That is why Chapter 6, in my opinion, was one of the most important chapters that set the foundations of attaining provable security and build the bridge between assumptions and theory (one-way functions and hardcore predicates) on one side and practice on the other (pseudo-random generators and pseudo-random functions).Finally, public-key encryption schemes and digital signatures are also, definitely, on my long favorites list of this book. It was very exciting and intellectually stimulating to read how these schemes work and how they are (or most of them at least) shown to be secure in one sense or the other (i.e., attaining provable security ). Actually, it was useful to me to know all these practical issues related to these schemes like implementation and design issues of El Gamal and the (padded) RSA schemes, as well as the practical considerations that set many differences between private and public key encryption schemes. The same is also true with digital signatures. Also, discussing various real-life attacks (especially those against schemes that are widely used in cryptographic standards like the padded RSA and El Gamal schemes) was a very important ingredient that made the whole material in this book interesting and very engaging.
3 people found this helpful
Report
Reviewed in the United States on March 24, 2014
It is not a casual read. It does not have little pieces of code you can program. It will change how you think.

This was a recommended optional book for a class I took on cryptography. The class was really challenging and changed how I look at things. The class was like a super compressed version of this book. For this reason it is nice to have.

Even though the class is over I am still working through the book.

You will discover that in modern cryptography there are a number of constructs that a useful encryption system must pass. When looked at in this way a number of encryption schemes are vulnerable and you will understand why. You will discover standards are not all good; that good standards can be are flawed by poor usage; and that you do not want to write your own.

You will gain confidence in how your data is encrypted. Best of all when you read someone's paper you will know what they are saying with all those little symbols and theorems.
2 people found this helpful
Report
Reviewed in the United States on May 31, 2016
Great introduction. The material is not easy, and requires some familiarity with set notation and other late-high-school/early college math. Some familiarity with comp-sci concepts like P vs NP is also useful.

I purchased this to go along with prof Katz' Coursera course on encryption, and it's been a helpful study aid.
One person found this helpful
Report
Reviewed in the United States on December 16, 2011
I just finished a course in cryptography with this as the textbook, and I'm very pleased with it. I feel as though it strikes a good balance between rigor and clarity, especially in the exposition of basic abstract algebra and number theory. I am starting an extended research project in cryptography next semester, and this book will be a valuable resource for me.
Reviewed in the United States on August 27, 2013
The authors are honest enough to inform you that they assume that you have a rather high attainment in math in this book. It is heavy going in where discussions are made about pseudorandom numbers and such like. If you are doing (or thinking of doing ) a course in cryptology, however, this is a good book to start with. Not recommended for the casual reader.
Reviewed in the United States on October 12, 2010
If you are looking for a book that will facilitate self learning in cryptography then this is the right book. It helps you understand the concepts easily and has a good number of exercise problems that will help you through your concepts.
4 people found this helpful
Report
Reviewed in the United States on June 21, 2012
This is very interesting and useful book especially for students and other people who wanna know about Provable Security (and Information Theory) approach in modern cryptography.
One person found this helpful
Report
Reviewed in the United States on November 19, 2015
Good book,its like new book

Top reviews from other countries

Pedro Bibiloni Serrano
5.0 out of 5 stars Great explanations
Reviewed in the United Kingdom on November 3, 2013
It does not include all the specification's details, but there are rigurous explanations about almost everything related to cryptography. It has really helped me in a MSc degree.
dkl
5.0 out of 5 stars Gute mathematische Einführung in die Kryptographie
Reviewed in Germany on February 19, 2013
Es gibt viele Textbücher über Kryptographie - leider gibt es darunter auch viele mäßge Bücher mit Fehlern. Zum Beispiel wird in vielen Büchern das naive RSA-Verfahren ohne Warnung präsentiert.

Das Buch gibt eine recht mathematiklastige Einführung und beschäftigt sich insbesondere mit mathematischen Sicherheitsnachweisen, setzt dabei aber nur sehr grundlegende Mathematikkenntnisse voraus, und führt den Leser zu Anfang recht behutsam in das Thema ein. Man merkt die didaktische Erfahrung der Autoren.

Der Fokus liegt definitiv auf der Theorie. Als Einführung in das Thema bzw. vorlesungsbegleitendes Material ist dieses Buch sicher gut geeignet. Praktische Aspekte, wie zum Beispiel Implementationen und Netzwerkprotokolle werden nicht thematisiert, es werden aber entsprechende Referenzen genannt. Für Interessierte empfiehlt es sich also gegebenenfalls zusätzlich ein Buch über Netzwerksicherheit. Vermisst habe ich weiterhin ein Kaptiel ueber elliptische Kurven.

Insgesamt 5 von 5 Sternen, da nach meinem Kenntnisstand kein besseres einführendes Material zur Kryptographie existiert.
One person found this helpful
Report
Arash
2.0 out of 5 stars Slow!
Reviewed in the United Kingdom on February 3, 2012
The book is really slow in explaining things! I use it just because I should do for my module! it's really complex at the same time.. there are many other which I think are much more better for the field!
One person found this helpful
Report
ELo
5.0 out of 5 stars Gut, dass es das auch in Gebraucht und damit günstiger gibt.
Reviewed in Germany on July 3, 2015
Sehr hilfreiches Buch, insbesondere wenn die Vorlesung genau darauf aufbaut. Und auch wenn es schon ein paar Jahre alt ist noch nicht veraltet.
Hao Wang
5.0 out of 5 stars Five Stars
Reviewed in the United Kingdom on December 14, 2014
fantastic book for crypto student