Programming Books C Java PHP Python Learn more Browse Programming Books
  • List Price: $152.67
  • Save: $125.92 (82%)
Rented from apex_media
To Rent, select Shipping State from options above
Due Date: Dec 21, 2014
FREE return shipping at the end of the semester. Access codes and supplements are not guaranteed with rentals.
Used: Good | Details
Sold by Renttext
Condition: Used: Good
Comment: Ships quick from Amazon
Access codes and supplements are not guaranteed with used items.
Add to Cart
Qty:1
  • List Price: $152.67
  • Save: $28.33 (19%)
Only 5 left in stock (more on the way).
Ships from and sold by Amazon.com.
Gift-wrap available.
Add to Cart
Trade in your item
Get a $59.26
Gift Card.
Have one to sell? Sell on Amazon
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more
See this image

Introduction to Cryptography with Coding Theory (2nd Edition) Hardcover – July 25, 2005

ISBN-13: 978-0131862395 ISBN-10: 0131862391 Edition: 2nd

Buy New
Price: $124.34
Rent
Price: $26.75
47 New from $99.00 55 Used from $66.54
Rent from Amazon Price New from Used from
Hardcover
"Please retry"
$26.75
$124.34
$99.00 $66.54
Paperback
"Please retry"
$59.00 $50.00

Free%20Two-Day%20Shipping%20for%20College%20Students%20with%20Amazon%20Student



Frequently Bought Together

Introduction to Cryptography with Coding Theory (2nd Edition) + The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography
Price for both: $134.17

Buy the selected items together

NO_CONTENT_IN_FEATURE

Shop the new tech.book(store)
New! Introducing the tech.book(store), a hub for Software Developers and Architects, Networking Administrators, TPMs, and other technology professionals to find highly-rated and highly-relevant career resources. Shop books on programming and big data, or read this week's blog posts by authors and thought-leaders in the tech industry. > Shop now

Product Details

  • Hardcover: 592 pages
  • Publisher: Pearson; 2 edition (July 25, 2005)
  • Language: English
  • ISBN-10: 0131862391
  • ISBN-13: 978-0131862395
  • Product Dimensions: 9.4 x 7.2 x 1 inches
  • Shipping Weight: 2.2 pounds (View shipping rates and policies)
  • Average Customer Review: 3.9 out of 5 stars  See all reviews (16 customer reviews)
  • Amazon Best Sellers Rank: #208,397 in Books (See Top 100 in Books)

Editorial Reviews

From the Back Cover

This book assumes a minimal background in programming and a level of math sophistication equivalent to a course in linear algebra. It provides a flexible organization, as each chapter is modular and can be covered in any order. Using Mathematica, Maple, and MATLAB, computer examples included in an Appendix explain how to do computation and demonstrate important concepts. A full chapter on error correcting codes introduces the basic elements of coding theory. Other topics covered: Classical cryptosystems, basic number theory, the data encryption standard, AES: Rijndael, the RSA algorithm, discrete logarithms, digital signatures, e-commerce and digital cash, secret sharing schemes, games, zero knowledge techniques, key establishment protocols, information theory, elliptic curves, error correcting codes, quantum cryptography. For professionals in cryptography and network security. --This text refers to an out of print or unavailable edition of this title.

Excerpt. © Reprinted by permission. All rights reserved.

This book is based on a course in cryptography at the upper level undergraduate and beginning graduate level that has been given at the University of Maryland since 1997. When designing the course, we decided on the following requirements.


* The course should be up-to-date and cover a broad selection of topics from a mathematical point of view.
* The material should be accessible to mathematically mature students having little background in number theory and computer programming.
* There should be examples involving numbers large enough to demonstrate how the algorithms really work.

We wanted to avoid concentrating solely on RSA and discrete logarithms, which would have made the course mostly a number theory course. We also did not want to teach a course on protocols and how to hack into friends' computers. That would have made the course less mathematical than desired.

There are numerous topics in cryptology that can be discussed in an introductory course. We have tried to include many of them. The chapters represent, for the most part, topics that were covered during the different semesters we taught the course. There is certainly more material here than could be treated in most one-semester courses. The first eight chapters represent the core of the material. The choice of which of the remaining chapters are used depends on the level of the students.

The chapters are numbered, thus giving them an ordering. However, except for Chapter 3 on number theory, which pervades the subject, the chapters are fairly independent of each other and can be covered in almost any reasonable order. Although we don't recommend doing so, a daring reader could possibly read Chapters 4 through 17 in reverse order, with only having to look ahead/behind a few times.

The chapters on Information Theory, Elliptic Curves, (quantum Methods, and Error Correcting Codes are somewhat more mathematical than the others. The chapter on Error Correcting Codes was included, at the suggestion of several reviewers, because courses that include introductions to both cryptology and coding theory are fairly common.

Computer examples. Suppose you want to give an example for RSA. You could choose two one-digit primes and pretend to be working with fifty-digit primes, or you could use your favorite software package to do an actual example with large primes. Or perhaps you are working with shift ciphers and are trying to decrypt a message by trying all 26 shifts of the ciphertext. This should also be done on a computer. At the end of the book are appendices containing Computer Examples written in each of Mathematica®, Maple®, and MATLAB® that show how to do such calculations. These languages were chosen because they are user friendly and do not require prior programming experience. Although the course has been taught successfully without computers, these examples are an integral part of the book and should be studied, if at all possible. Not only do they contain numerical examples of how to do certain computations but also they demonstrate important ideas and issues that arise. They were placed at the end of the book because of the logistic and aesthetic problems of including extensive computer examples in three languages at the ends of chapters.

Programs available in each of the three languages can be downloaded from the Web site
prenhall/washington

In a classroom, all that is needed is a computer (with one of the languages installed) and a projector in order to produce meaningful examples as the lecture is being given. Homework problems (the Computer Problems in various chapters) based on the software allow students to play with examples individually. Of course, students having more programming background could write their own programs instead.
--This text refers to an out of print or unavailable edition of this title.


More About the Author

Discover books, learn about writers, read author blogs, and more.

Customer Reviews

3.9 out of 5 stars
Share your thoughts with other customers

Most Helpful Customer Reviews

1 of 1 people found the following review helpful By Michelle Jones on February 10, 2013
Format: Hardcover Verified Purchase
The book presents modern cryptography in a way that anyone can understand and makes even the most difficult of subjects easy to learn. It does present in depth math analysis of various ciphers, so read it thoroughly is a must!
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
Format: Hardcover
Trappe and Washington give us a very up to date education in cryptography, circa 2005. The discourse is for a sophisticated maths student who, however, need never have encountered cryptography before. The level of mathematical treatment is good and rigourous. With theorems stated and proved at a level that should satisfy even a picky mathematician.

The recent nature of the book is reflected in several places. Notably where it explains the Advanced Encryption Standard, or Rijndael. This is significant because it is endorsed by the US National Institute of Standards and Technology as the replacement for DES, in such contexts as electronic commerce. (DES is also covered by the book.)

Interestingly, the authors offer a short chapter on digital cash. A fascinating look at a possible future direction of a (physically) cashless society. Other texts on cryptography rarely cover the topic, so it's good to see it here. Yes, the first implementations of digital cash largely died in the dot com crash. But the idea lives on, and may yet take fruit. It has solid intellectual foundations, as shown by the book.

Then there is an even more speculative chapter on quantum cryptography. Radically different from the symmetric and public key cryptosystems described in the rest of the book. Who knows how quantum cryptography will turn out? Some very hard physical problems need to be solved.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
By bilal on July 11, 2014
Format: Hardcover Verified Purchase
Worst experience ever!
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
By N. Mansouri on April 28, 2011
Format: Hardcover Verified Purchase
This an excellant reference text-book for cryptography students and teachers, and could be by far the most comprehensive introductory level cryptography text-book. A welcome addition for every math/computer-science major's personal library.

Nema
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
Format: Hardcover
Hi. This is a very good book for university studies or also for personal use too. Easy to read and understand. There are few mathematical details (this is a negative feature) but it explains very well all arguments. The only really negative thing is the cost, a little much ...
Otherwise, i suggest you this book.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
3 of 5 people found the following review helpful By A reader on March 19, 2006
Format: Hardcover Verified Purchase
If more mathematics textbooks were written like this one, the number of mathematicians/scientists in the world would be much greater.

The book is an absolute pleasure to read. The discoursive style makes what surely can be considered as a hard subject smooth and easily flowing.

The subject is very well covered and the structure of the book is just fine, even for self-study.

Algorithms, encryption methods, mathematical theorems are nicely and elegantly explained and no previous knowledge is necessary in any of the fields.

At the end of many explanations or proofs I found myself stunned by the brevity and beauty of the argument.

I enjoyed also the nice software support and exercise coming with the books.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
7 of 11 people found the following review helpful By Steven Levine on September 3, 2002
Format: Hardcover
Knowing very little about cryptography when I started, I found this book taught me the fundamentals of cryptography with useful examples as it walked me through the material. In addition, it was a useful reference for applying this newfound knowledge to the actual practice in use today, especically on the internet. This book is a must-have for anyone needing an understanding of cryptography.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
5 of 8 people found the following review helpful By Patrick O'Sullivan on February 9, 2006
Format: Hardcover
I've read (or skimmed, as the case may be) some other writings on cryptography and none of them are really as clear as Trappe and Washington's book. Applied Cryptography comes somewhat close, but doesn't include enough math. Intro. to Cryptography with Coding Theory comes as close to the right balance between math and cryptography as possible. Right now, I'm taking one of Prof. Trappe's classes and I always am confident that if I feel I'm not going to remember the part of the lecture, I can easily refer to the book. The book is actually good enough to discourage me from taking notes and just pay attention instead. Not only that, but the code that's provided is offered in Maple, MATLAB, and Mathematica. Could you ask for more?
1 Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again

Customer Images

Search