Automotive Holiday Deals Books Gift Guide Books Gift Guide Shop Men's Athletic Shoes Learn more nav_sap_SWP_6M_fly_beacon Prime Music Sweepstakes egg_2015 All-New Amazon Fire TV Grooming Deals Gifts for Her Amazon Gift Card Offer cm15 cm15 cm15 $30 Off Amazon Echo $30 Off Fire HD 6 Kindle Cyber Monday Deals Classics and Essentials in CDs & Vinyl Shop Now HTL

Enter your mobile number or email address below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.

  • Apple
  • Android
  • Windows Phone
  • Android

To get the free app, enter your email address or mobile phone number.

Introduction to Modern Cryptography: Principles and Protocols (Chapman & Hall/CRC Cryptography and Network Security Series) 1st Edition

10 customer reviews
ISBN-13: 978-1584885511
ISBN-10: 1584885513
Why is ISBN important?
This bar-code number lets you verify that you're getting exactly the right version or edition of a book. The 13-digit and 10-digit formats both work.
Scan an ISBN with your phone
Use the Amazon App to scan ISBNs and compare prices.
Sell yours for a Gift Card
We'll buy it for $24.65
Learn More
Trade in now
Have one to sell? Sell on Amazon
More Buying Choices
10 New from $77.71 26 Used from $40.00 1 Collectible from $62.50

Get Up to 80% Back Rent Textbooks

Special Offers and Product Promotions

  • Take an Extra 30% Off Any Book: Use promo code HOLIDAY30 at checkout to get an extra 30% off any book for a limited time. Excludes Kindle eBooks and Audible Audiobooks. Restrictions apply. Learn more | Shop now

Editorial Reviews


This book is a comprehensive, rigorous introduction to what the authors name ‘modern’ cryptography … a novel approach to how cryptography is taught, replacing the older, construction-based approach. … The concepts are clearly stated, both in an intuitive fashion and formally. … I would heartily recommend this book to anyone who is interested in cryptography. … the exercises are challenging and interesting, and can benefit readers of all academic levels. …
―IACR book reviews, January 2010

Over the past 30 years, cryptography has been transformed from a mysterious art into a mathematically rigorous science. The textbook by Jonathan Katz and Yehuda Lindell finally makes this modern approach to cryptography accessible to a broad audience. Readers of this text will learn how to think precisely about the security of protocols against arbitrary attacks, a skill that will remain relevant and useful regardless of how technology and cryptography standards change. The book uses just enough formalism to maintain precision and rigor without obscuring the development of ideas. It manages to convey both the theory's conceptual beauty and its relevance to practice. I plan to use it every time I teach an undergraduate course in cryptography.
―Salil Vadhan, Harvard University, Cambridge, Massachusetts, USA

… the greatest attribute is the fact that the material is presented in such a unified way. These are not just a collection of topics from cryptography, thrown together at random. One topic leads effortlessly to the next. As such, this is a virtually indispensible resource for modern cryptography.
―Donald L. Vestal, South Dakota State University, MAA Online, July 2008

… gives an excellent introduction to the theoretical background of cryptography. It would be a fine textbook for an advanced undergraduate (or graduate) course in theoretical computer science for students who have already seen the rudiments of cryptography. It will be a valuable reference for researchers in the field …
―Steven D. Galbraith, Mathematical Reviews, 2009b

The book is highly recommended as a textbook in cryptography courses at graduate or advanced undergraduate levels … covers in a splendid way the main notions of current cryptography from the point of view of information-theoretical security. This corresponds indeed to a modern cryptography approach.
―Guillermo Morales-Luna, Zentralblatt MATH, Vol. 1143

About the Author

University of Maryland, College Park, USA Bar-Ilan University, Ramat Gan, Israel

Hero Quick Promo
Holiday Deals in Kindle Books
Save up to 85% on more than 1,000 Kindle Books. These deals are valid until November 30, 2015. Learn more

Product Details

  • Series: Chapman & Hall/CRC Cryptography and Network Security Series
  • Hardcover: 552 pages
  • Publisher: Chapman and Hall/CRC; 1 edition (August 31, 2007)
  • Language: English
  • ISBN-10: 1584885513
  • ISBN-13: 978-1584885511
  • Product Dimensions: 9.5 x 6.5 x 1.3 inches
  • Shipping Weight: 2 pounds
  • Average Customer Review: 4.5 out of 5 stars  See all reviews (10 customer reviews)
  • Amazon Best Sellers Rank: #656,928 in Books (See Top 100 in Books)

More About the Authors

Discover books, learn about writers, read author blogs, and more.

Customer Reviews

Most Helpful Customer Reviews

38 of 39 people found the following review helpful By Vincenzo on September 25, 2007
Format: Hardcover
I used this book for a course on modern cryptography held by Prof. Persiano of the University of Salerno, Italy.
I read, consulted, and studied other books about cryptography, but 'INTRODUCTION TO MODERN CRYPTOGRAPHY' by Katz and Lindell is in my humble opinion THE BEST.
The book has a theoretical flavor, it is mathematically rigorous, but it is very readable and fluent, and presents the motivating discussions beneath each topic.
The book is fully self-contained, and gives the necessary background for each topic (for example there is a lot of basic computational number theory necessary for introducing the topic of 'public key').
The beauty of the book is in that the authors don't present a collection of protocols, with no links each other, but the flow is sequential and motivated (in contrast to books which present topics only for filling the pages).
All the theorems are proved and the treatment is rigorous, but the theory is developed from scratch, and the book is oriented to beginner students, though it presents also advanced stuff and is one of the most advanced book for beginners.
The main contents of the book are:

1) Perfect security and Shannon's theorem (information theoretic security)
2) Computational security, indistinguishability, CPA
3) Pseudorandomness
4) One-way functions, hard-core predicate, Levin's theorem
5) Message Authentication Codes
6) Costructions of Pseudorandom objects, AES, Substitution-Permutation networks
7) Relation between Private-Key, one-way functions and pseudrandomness.
Read more ›
1 Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
Format: Hardcover Verified Purchase
It was very nice to see how security would be possibly defined in a sense different from (and more relaxed than) information-theoretic secrecy. It was nice to see how different definitions would lead to different levels of security, or in other words, each definition gives a guarantee of security against a certain class of real-life security threats (or attacks) and takes also into account very practical issues like dealing with computationally bounded adversaries. Moreover, introducing the notion of security using those definitions made the whole setting, not only mathematically rigorous, but also coherent, structured, and well-founded, without losing contact with practical concerns and real-life scenarios. Even more, this setting gave a neat and mathematically sound way to attain a proven notion of security rather than just introducing or suggesting schemes that show "good" performance in practice without being able to say anything, or quantify the security they provide on a more fundamental level. Another thing I also liked very much and is related to the point above, is how the book moves on to the point where it was shown that the provable security of almost (if not all) the encryption schemes (either private-key or public-key based) as well as authentication codes and signature schemes is based on the corner stone assumption of existence of one-way functions (one-way permutations). It was very elegant the way a one-way function (permutation) was defined and the way it is used to prove security in one sense or the other. It fits in very well in the development of the theory and made the whole structure very homogeneous.Read more ›
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
11 of 15 people found the following review helpful By tech book reader on April 19, 2009
Format: Hardcover
This is a fantastic book, it was mandatory reading as part of my Masters in Information Security. I found it invaluable in understanding this seemingly 'mind-bending' subject.

I've bought numerous books on Crypto - however, this is the only one I've found that gets the balance between the maths and core principles/motivations spot on! I can't recommend this book enough, IMHO it's essential reading if you're pursuing a career in Information Security.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
1 of 1 people found the following review helpful By traveler on March 24, 2014
Format: Hardcover Verified Purchase
It is not a casual read. It does not have little pieces of code you can program. It will change how you think.

This was a recommended optional book for a class I took on cryptography. The class was really challenging and changed how I look at things. The class was like a super compressed version of this book. For this reason it is nice to have.

Even though the class is over I am still working through the book.

You will discover that in modern cryptography there are a number of constructs that a useful encryption system must pass. When looked at in this way a number of encryption schemes are vulnerable and you will understand why. You will discover standards are not all good; that good standards can be are flawed by poor usage; and that you do not want to write your own.

You will gain confidence in how your data is encrypted. Best of all when you read someone's paper you will know what they are saying with all those little symbols and theorems.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
1 of 1 people found the following review helpful By Evgeniy on June 21, 2012
Format: Hardcover Verified Purchase
This is very interesting and useful book especially for students and other people who wanna know about Provable Security (and Information Theory) approach in modern cryptography.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse

Want to discover more products? Check out these pages to see more: cb mods, merchant credit card processing, algorithms ciphers, intro engineering & computing