Automotive Holiday Deals Books Gift Guide Books Gift Guide Shop Men's Athletic Shoes Learn more nav_sap_SWP_6M_fly_beacon Indie for the Holidays egg_2015 All-New Amazon Fire TV Luxury Beauty Gifts Under $50 May The Best Garden Be Yours Amazon Gift Card Offer bf15 bf15 bf15 $30 Off Amazon Echo $15 Off All-New Fire Kindle Black Friday Deals Nintendo Digital Games Shop Now DOTD

Enter your mobile number or email address below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.

  • Apple
  • Android
  • Windows Phone
  • Android

To get the free app, enter your email address or mobile phone number.

Cryptography Decrypted 1st Edition

45 customer reviews
ISBN-13: 078-5342616477
ISBN-10: 0201616475
Why is ISBN important?
This bar-code number lets you verify that you're getting exactly the right version or edition of a book. The 13-digit and 10-digit formats both work.
Scan an ISBN with your phone
Use the Amazon App to scan ISBNs and compare prices.
Sell yours for a Gift Card
We'll buy it for $2.25
Learn More
Trade in now
Have one to sell? Sell on Amazon
Buy used On clicking this link, a new layer will be open
$24.95 On clicking this link, a new layer will be open
Buy new On clicking this link, a new layer will be open
$38.06 On clicking this link, a new layer will be open
More Buying Choices
19 New from $35.95 31 Used from $9.99
Free Two-Day Shipping for College Students with Amazon Student Free%20Two-Day%20Shipping%20for%20College%20Students%20with%20Amazon%20Student

$38.06 FREE Shipping. Only 9 left in stock (more on the way). Ships from and sold by Gift-wrap available.

Frequently Bought Together

  • Cryptography Decrypted
  • +
  • Principles of Computer Security: CompTIA Security+ and Beyond [With CDROM] (Official Comptia Guide)
Total price: $118.16
Buy the selected items together

Special Offers and Product Promotions

  • Take an Extra 30% Off Any Book: Use promo code HOLIDAY30 at checkout to get an extra 30% off any book for a limited time. Excludes Kindle eBooks and Audible Audiobooks. Restrictions apply. Learn more | Shop now

Editorial Reviews

From the Back Cover

Fundamental security concepts like cryptography and digital signatures are becoming as much a part of our everyday lives as megabytes and the Internet. Anyone working with computer security--security professionals, network administrators, IT managers, CEOs, and CIOs--need to have a comfortable understanding of the cryptographic concepts in this book.

Cryptography Decrypted shows you how to safeguard digital possessions. It is a clear, comprehensible, and practical guide to the essentials of computer cryptography, from Caesar's Cipher through modern-day public key. Cryptographic capabilities like detecting imposters and stopping eavesdropping are thoroughly illustrated with easy-to-understand analogies, visuals, and historical sidebars.

You need little or no background in cryptography to read Cryptography Decrypted. Nor does it require technical or mathematical expertise. But for those with some understanding of the subject, this book is comprehensive enough to solidify knowledge of computer cryptography and challenge those who wish to explore the high-level math appendix.

Divided into four parts, the book explains secret keys and secret key methods like DES, public and private keys, and public key methods like RSA; how keys are distributed through digital certificates; and three real-world systems. Numerous graphics illustrate and clarify common cryptographic terminology throughout.

You will find coverage of such specific topics as:
  • Secret key and secret key exchanges
  • Public and private keys
  • Digital signatures
  • Digital certificates, Public Key Infrastructure (PKI), and PGP
  • Hashes and message digests
  • Secure e-mail, secure socket layer (SSL), and Internet Protocol Security (IPsec)
  • Protecting keys
  • Cryptographic attacks
  • Authentication, confidentiality, integrity, and nonrepudiation

"Even after ten years working in the field of information protection for a major electronics manufacturing company, I learned a lot from this book. I think you will too."

--From the Foreword by John Kinyon


About the Author

H.X. Mel consults and develops computer systems for organizations such as Lucent, Xerox, MIT, the U.S. Government, Motorola, Goldman Sachs, and PricewaterhouseCoopers. Doris Baker is a freelance technical writer and editor.



Hero Quick Promo
Holiday Deals in Kindle Books
Save up to 85% on more than 1,000 Kindle Books. These deals are valid until November 30, 2015. Learn more

Product Details

  • Paperback: 384 pages
  • Publisher: Addison-Wesley Professional; 1 edition (December 31, 2000)
  • Language: English
  • ISBN-10: 0201616475
  • ISBN-13: 978-0201616477
  • Product Dimensions: 7.3 x 0.8 x 9.1 inches
  • Shipping Weight: 1.3 pounds (View shipping rates and policies)
  • Average Customer Review: 4.7 out of 5 stars  See all reviews (45 customer reviews)
  • Amazon Best Sellers Rank: #674,006 in Books (See Top 100 in Books)

More About the Authors

Discover books, learn about writers, read author blogs, and more.

Customer Reviews

Most Helpful Customer Reviews

30 of 31 people found the following review helpful By Linda Zarate on December 17, 2001
Format: Paperback
This book clearly explains the foundation of cryptography, numbers, and the techniques that have emerged to provide modern security technologies. The book starts with Part I, that sets the context by introducing terms and the basics, including ciphers, data encryption standard (DES) and secret keys. The authors did a remarkable job by making complex concepts easy to understand. The next two parts go into more detail about public keys and digital certificates. While these are relatively simple to learn on the surface, the details have always eluded me until I read this book because more papers and books on the subject get too deep into details too fast and assume knowledge of advanced math on the part of the reader. Not so this book - the authors make it easy through clear writing, illustrations that illuminate the textual descriptions and a knack for explaining the complex in simple and easily digestible chunks.
I especially liked Part IV, which covers secure electronic commerce because it covered the full spectrum of technologies and the information is immediately useful to all IT and security professionals. Like in the first three parts of this book I came away with a complete understanding of how everything works.
This book epitomizes clear writing. Moreover, it is simply amazing how much knowledge can be relatively painlessly gained from reading this book. Although I am sure the authors intended to make the inner workings of cryptography accessible to non-security professionals (which they unquestionably accomplished), they also set a standard of excellence in technical writing by producing a book that is, in my opinion, near perfect in its ability to seamlessly use lively prose and well thought out illustrations to convey highly technical information. If you need to learn cryptography but are challenged by the math and the impenetratable writing of other books on the subject, start with this one.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
20 of 22 people found the following review helpful By Richard Bejtlich on March 30, 2001
Format: Paperback
I am a senior engineer for managed network security operations. I administer systems which use cryptographic tools and processes (SSH, IPSec VPNs, etc.) and have seen cryptography hinder my network-based intrusion detection activities. I read this book to gain basic familiarity with the nuts and bolts of cryptography. I wanted a lively text which addressed modern issues, since computer books can be quickly overtaken by technological advances. This book delivers at all levels and belongs on every computer security professional's bookshelf.
I thoroughly enjoyed this book. It was energetic, clear, well-organized, fully illustrated, and comprehensive. I believe it's THE book to read if you want an introduction to one of the major enablers of modern computing. Furthermore, because the book's goal is to explain the foundations of both secret and public key cryptography, it should stay relevant for many years.
"Cryptography Decrypted" does not spare any effort to ensure the reader understands the subject. Concepts are clarified and reinforced through text and diagrams on nearly every page. The authors know many readers are not attracted to mathematics, so they move the "heavy lifting" to an appendix. Even then, for readers willing to apply a little effort, the appendix is understandable and enlightening. At every stage of writing this book, the authors must have remembered to keep the non-cryptographer reader in mind. Kudos to their editors for keeping them on track!
The only disappointment was the book's failure to mention the Secure Shell (SSH). Because the authors believed it important to discusses popular implementations of cryptography (IPSec, SSL, PGP), I had hoped that SSH would be included.
Read more ›
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
11 of 11 people found the following review helpful By Mike Tarrani HALL OF FAMETOP 50 REVIEWER on March 16, 2001
Format: Paperback
The primary audience for this book is anyone who has to quickly get up-to-speed in security infrastructure and cryptology. If you are working in health care and are overwhelmed with the technical requirements imposed by the Health Insurance Portability and Accountability Act (HIPAA), then you are going to love this book. If you are involved in e-commerce you will definitely find this book essential reading and the key to understanding the underpinnings of web and e-commerce security.
There is another audience for this book: technical writers. The authors set the highest standards in document design, clear writing and integration of prose and illustration. They have managed to explain a complex, difficult subject easy to understand.
Part I of the book lays the foundation by explaining the basics: defining terms, the evolution of ciphers and how they worked, and the fundamentals of the data encryption standard (DES) and secret keys. I found this part of the book to be fascinating because the authors used easy-to-follow examples that were augmented by visual depictions of how everything works. For example, a quick explanation of Polybius square numbers and how to transpose them to diffuse a cipher was not only something completely new to me, but was something I was able to thoroughly understand after reading less than three pages of this book! I am sure that a professional cryptographer would find this material basic. I found it empowering because I began to see a larger picture of this obscure science unfold while learning some interesting numerical manipulation techniques. For the first time I really understood this stuff to the degree that I could explain it to non-technical people. The authors also used historical anecdotes to make the subject interesting.
Read more ›
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse

Most Recent Customer Reviews

Set up an Amazon Giveaway

Amazon Giveaway allows you to run promotional giveaways in order to create buzz, reward your audience, and attract new followers and customers. Learn more
Cryptography Decrypted
This item: Cryptography Decrypted
Price: $38.06
Ships from and sold by