Programming Books C Java PHP Python Learn more Browse Programming Books
Buy New
$77.85
Qty:1
  • List Price: $85.95
  • Save: $8.10 (9%)
In Stock.
Ships from and sold by Amazon.com.
Gift-wrap available.
Introduction to Modern Cr... has been added to your Cart
Trade in your item
Get a $31.05
Gift Card.
Have one to sell? Sell on Amazon
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more
See all 2 images

Introduction to Modern Cryptography: Principles and Protocols (Chapman & Hall/CRC Cryptography and Network Security Series) Hardcover – August 31, 2007

ISBN-13: 978-1584885511 ISBN-10: 1584885513 Edition: 1st

Buy New
Price: $77.85
41 New from $63.17 22 Used from $62.01
Rent from Amazon Price New from Used from
eTextbook
"Please retry"
$18.01
Hardcover
"Please retry"
$77.85
$63.17 $62.01

There is a newer edition of this item:

Free%20Two-Day%20Shipping%20for%20College%20Students%20with%20Amazon%20Student


Frequently Bought Together

Introduction to Modern Cryptography: Principles and Protocols (Chapman & Hall/CRC Cryptography and Network Security Series) + Handbook of Applied Cryptography (Discrete Mathematics and Its Applications) + Applied Cryptography: Protocols, Algorithms, and Source Code in C
Price for all three: $193.54

Buy the selected items together

NO_CONTENT_IN_FEATURE
Shop the new tech.book(store)
New! Introducing the tech.book(store), a hub for Software Developers and Architects, Networking Administrators, TPMs, and other technology professionals to find highly-rated and highly-relevant career resources. Shop books on programming and big data, or read this week's blog posts by authors and thought-leaders in the tech industry. > Shop now

Product Details

  • Series: Chapman & Hall/CRC Cryptography and Network Security Series
  • Hardcover: 552 pages
  • Publisher: Chapman and Hall/CRC; 1 edition (August 31, 2007)
  • Language: English
  • ISBN-10: 1584885513
  • ISBN-13: 978-1584885511
  • Product Dimensions: 9.5 x 6.5 x 1.3 inches
  • Shipping Weight: 2 pounds (View shipping rates and policies)
  • Average Customer Review: 4.4 out of 5 stars  See all reviews (9 customer reviews)
  • Amazon Best Sellers Rank: #335,651 in Books (See Top 100 in Books)

Editorial Reviews

Review

This book is a comprehensive, rigorous introduction to what the authors name ‘modern’ cryptography … a novel approach to how cryptography is taught, replacing the older, construction-based approach. … The concepts are clearly stated, both in an intuitive fashion and formally. … I would heartily recommend this book to anyone who is interested in cryptography. … the exercises are challenging and interesting, and can benefit readers of all academic levels. …
—IACR book reviews, January 2010

Over the past 30 years, cryptography has been transformed from a mysterious art into a mathematically rigorous science. The textbook by Jonathan Katz and Yehuda Lindell finally makes this modern approach to cryptography accessible to a broad audience. Readers of this text will learn how to think precisely about the security of protocols against arbitrary attacks, a skill that will remain relevant and useful regardless of how technology and cryptography standards change. The book uses just enough formalism to maintain precision and rigor without obscuring the development of ideas. It manages to convey both the theory's conceptual beauty and its relevance to practice. I plan to use it every time I teach an undergraduate course in cryptography.
—Salil Vadhan, Harvard University, Cambridge, Massachusetts, USA

… the greatest attribute is the fact that the material is presented in such a unified way. These are not just a collection of topics from cryptography, thrown together at random. One topic leads effortlessly to the next. As such, this is a virtually indispensible resource for modern cryptography.
—Donald L. Vestal, South Dakota State University, MAA Online, July 2008

… gives an excellent introduction to the theoretical background of cryptography. It would be a fine textbook for an advanced undergraduate (or graduate) course in theoretical computer science for students who have already seen the rudiments of cryptography. It will be a valuable reference for researchers in the field …
—Steven D. Galbraith, Mathematical Reviews, 2009b

The book is highly recommended as a textbook in cryptography courses at graduate or advanced undergraduate levels … covers in a splendid way the main notions of current cryptography from the point of view of information-theoretical security. This corresponds indeed to a modern cryptography approach.
—Guillermo Morales-Luna, Zentralblatt MATH, Vol. 1143

About the Author

University of Maryland, College Park, USA Bar-Ilan University, Ramat Gan, Israel

More About the Authors

Discover books, learn about writers, read author blogs, and more.

Customer Reviews

4.4 out of 5 stars
5 star
5
4 star
3
3 star
1
2 star
0
1 star
0
See all 9 customer reviews
I used this book for a course on modern cryptography held by Prof.
Vincenzo Iovino
I feel as though it strikes a good balance between rigor and clarity, especially in the exposition of basic abstract algebra and number theory.
pg1989
I can't recommend this book enough, IMHO it's essential reading if you're pursuing a career in Information Security.
tech book reader

Most Helpful Customer Reviews

33 of 34 people found the following review helpful By Vincenzo Iovino on September 25, 2007
Format: Hardcover
I used this book for a course on modern cryptography held by Prof. Persiano of the University of Salerno, Italy.
I read, consulted, and studied other books about cryptography, but 'INTRODUCTION TO MODERN CRYPTOGRAPHY' by Katz and Lindell is in my humble opinion THE BEST.
The book has a theoretical flavor, it is mathematically rigorous, but it is very readable and fluent, and presents the motivating discussions beneath each topic.
The book is fully self-contained, and gives the necessary background for each topic (for example there is a lot of basic computational number theory necessary for introducing the topic of 'public key').
The beauty of the book is in that the authors don't present a collection of protocols, with no links each other, but the flow is sequential and motivated (in contrast to books which present topics only for filling the pages).
All the theorems are proved and the treatment is rigorous, but the theory is developed from scratch, and the book is oriented to beginner students, though it presents also advanced stuff and is one of the most advanced book for beginners.
The main contents of the book are:

1) Perfect security and Shannon's theorem (information theoretic security)
2) Computational security, indistinguishability, CPA
3) Pseudorandomness
4) One-way functions, hard-core predicate, Levin's theorem
5) Message Authentication Codes
6) Costructions of Pseudorandom objects, AES, Substitution-Permutation networks
7) Relation between Private-Key, one-way functions and pseudrandomness.
Read more ›
1 Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
3 of 3 people found the following review helpful By PST on November 7, 2012
Format: Hardcover
The book offers a clear understanding, what cryptography means, and what the issues involved are.
Once this is understood, and once one has understood the numerous (obviously necessary!) definitons the mathematics involved becomes a bit boring.
None of the proofs would possibly qualify for "The Book" of Paul Erdos, they are just too boring.....
( As this was my first book on the subject, I cannot judge whether this is intrinsically so, or whether the authors, in their attempt to keep the math at a very low level, chose such proofs)

The mathematical prerequisites are minimal. I guess that a good grasp of high school math would be sufficient.

Overall this is an excellent introduction to the principles of cryptography - but once this is understood, the book becomes a bit boring.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
Format: Hardcover Verified Purchase
It was very nice to see how security would be possibly defined in a sense different from (and more relaxed than) information-theoretic secrecy. It was nice to see how different definitions would lead to different levels of security, or in other words, each definition gives a guarantee of security against a certain class of real-life security threats (or attacks) and takes also into account very practical issues like dealing with computationally bounded adversaries. Moreover, introducing the notion of security using those definitions made the whole setting, not only mathematically rigorous, but also coherent, structured, and well-founded, without losing contact with practical concerns and real-life scenarios. Even more, this setting gave a neat and mathematically sound way to attain a proven notion of security rather than just introducing or suggesting schemes that show "good" performance in practice without being able to say anything, or quantify the security they provide on a more fundamental level. Another thing I also liked very much and is related to the point above, is how the book moves on to the point where it was shown that the provable security of almost (if not all) the encryption schemes (either private-key or public-key based) as well as authentication codes and signature schemes is based on the corner stone assumption of existence of one-way functions (one-way permutations). It was very elegant the way a one-way function (permutation) was defined and the way it is used to prove security in one sense or the other. It fits in very well in the development of the theory and made the whole structure very homogeneous.Read more ›
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
9 of 13 people found the following review helpful By tech book reader on April 19, 2009
Format: Hardcover
This is a fantastic book, it was mandatory reading as part of my Masters in Information Security. I found it invaluable in understanding this seemingly 'mind-bending' subject.

I've bought numerous books on Crypto - however, this is the only one I've found that gets the balance between the maths and core principles/motivations spot on! I can't recommend this book enough, IMHO it's essential reading if you're pursuing a career in Information Security.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
Format: Hardcover Verified Purchase
It is not a casual read. It does not have little pieces of code you can program. It will change how you think.

This was a recommended optional book for a class I took on cryptography. The class was really challenging and changed how I look at things. The class was like a super compressed version of this book. For this reason it is nice to have.

Even though the class is over I am still working through the book.

You will discover that in modern cryptography there are a number of constructs that a useful encryption system must pass. When looked at in this way a number of encryption schemes are vulnerable and you will understand why. You will discover standards are not all good; that good standards can be are flawed by poor usage; and that you do not want to write your own.

You will gain confidence in how your data is encrypted. Best of all when you read someone's paper you will know what they are saying with all those little symbols and theorems.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again