- Hardcover: 592 pages
- Publisher: Prentice Hall; 4 edition (November 26, 2005)
- Language: English
- ISBN-10: 0131873164
- ISBN-13: 978-0131873162
- Product Dimensions: 6.5 x 1.2 x 10 inches
- Shipping Weight: 2.6 pounds
- Average Customer Review: 3.1 out of 5 stars See all reviews (9 customer reviews)
- Amazon Best Sellers Rank: #126,442 in Books (See Top 100 in Books)
Enter your mobile number or email address below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.
To get the free app, enter your email address or mobile phone number.
Cryptography and Network Security (4th Edition) 4th Edition
Use the Amazon App to scan ISBNs and compare prices.
There is a newer edition of this item:
Customers Who Bought This Item Also Bought
More About the Author
Top Customer Reviews
On the other hand, it is a relatively "polished" book, without too many errors or typos. Most of the time, it gives gives enough information to implement the algorithms it talks about. But it certainly doesn't give you enough to become a cryptographer, or to evaluate the security of a new algorithm, or things like that.
Unlike some other books on cryptography, here considerable space is also given to hash functions. These can sometimes be used as an alternative to a full encrypt/decrypt approach. If you are designing a system, you should ponder carefully whether a hashing approach might suffice. Usually if you only need to authenticate a message or item. Since, as the book relates, for all the complexity of the various hash algorithms, hashing is far simpler and faster than public key encryption. And there is no problem with key revocation. Another great simplification.
The book covers the latest work on hashing. It appears that the 160 bit hash methods, like SHA-1, can now have collisions induced, as found by researchers at Tsinghua University. (Though the text doesn't appear to credit them.) Suggesting a migration to longer bit methods or to a more intricate method.
One surprising feature of this 4th edition is that PKI is mentioned here, unlike earlier editions. PKI has been around long enough and is important enough that I would've thought the 3rd edition of the book would have covered it.
The last sections of the book, on network and system security, are less mathematical. But to offset this, as it were, they require somewhat of a background in understanding the Internet Protocol and in the systems administration of a subnet of computers. Maybe the simplest advice to understand and implement is for a sysadmin to install and regularly run a password checker against the users' passwords.
Most Recent Customer Reviews
The "Cryptography and Network Security (4th Edition)" book that I bought through Amazon was delivered timely. The book was also in the good condition that was said of it.Published on November 14, 2009 by George Taku
I found the material mostly interesting if not occassionaly difficult to read. However, I found it infurating that the review questions and problems asked at the end of the... Read morePublished on October 7, 2006 by G.S. Smith