Get Free Shipping on orders over $79
Introduction to Modern Cryptography : Chapman & Hall/Crc Cryptography and Network Security - Jonathan Katz

Introduction to Modern Cryptography

By: Jonathan Katz, Yehuda Lindell

Hardcover | 21 December 2020 | Edition Number 3

At a Glance

Hardcover


RRP $242.00

$233.75

or 4 interest-free payments of $58.44 with

 or 
In Stock and Ships in 1-2 business days

Now the most used texbook for introductory cryptography courses in both mathematics and computer science, the Third Edition builds upon previous editions by offering several new sections, topics, and exercises. The authors introduce the core principles of modern cryptography, with an emphasis on formal definitions, clear assumptions, and rigorous proofs of security. The book begins by focusing on private-key cryptography. The second half covers public-key cryptography, beginning with a self-contained introduction to the number theory needed to understand the RSA, Diffie-Hellman, and El Gamal cryptosystems (and others), and adds coverage of post-quantum cryptograpy to this edition.

Industry Reviews

The organization is quite natural, and aligns well with my course. My course covers the topics in exactly the same order as in Katz and Lindell, except that we skip some sections due to time constraints. I actually find Chapter 1 (Introduction) among the strongest aspects of this book. It does an excellent job discussing historical cryptography, explaining the motivation behind "modern cryptography," and introducing the non-expert to some of the basic concepts on which the rest of the contents of the book are built. I think this is an excellent textbook, and I can find very little fault with it. As I mentioned above, a possible suggestion is to add some more modern topics (lattice crypto, code-based crypto, FHE, obfuscation etc.) On the other hand, as an introductory textbook, it is perhaps also fine without those more advanced and more modern topics. - Gorjan Alagic

I find Chapters 2 and 5 to be the best. Both for its clarity. Chapter 2 is clear on certain details that, in my view, make the material much easier to understand than other treatments I have come across. E.g., clearly clarifying that when we consider the notion of "secret," we address the case only that one single message is sent. Not multiple messages. This really helps one quickly understand the technical details and proofs. Similarly, Chapter 5 on hash functions, in my view, is tricky to present. E.g., it must be clear that one is not dealing with a particular instance of a collision, but really finding collisions. This distinction is made very clearly in this book.- Mahesh Tripunitara

More in Operating Systems

macOS Tahoe For Dummies : For Dummies (Computer/Tech) - Guy Hart-Davis
Microsoft Power BI Step by Step - Jose Escalante
Principles of Operating Systems - Kate Summers
Linux All-In-One For Dummies : For Dummies (Computer/Tech) - Richard Blum
Windows 11 For Dummies, 2nd Edition : Windows 11 For Dummies - Alan Simpson
Windows 11 All-in-One For Dummies, 2nd Edition : For Dummies - Ciprian Adrian Rusen
iPad & iPad Pro for Dummies : 2024-2025 Edition - Paul McFedries

RRP $49.95

$38.75

22%
OFF
Modern Operating Systems, Global Edition : 5th Edition - Andrew Tanenbaum
UNIX and Linux System Administration Handbook : 5th Edition - Ben Whaley
Git : Pocket Guide : A Working Introduction - Richard Silverman

RRP $47.75

$26.75

44%
OFF
The Site Reliability Workbook : Practical ways to implement SRE - Betsy Beyer
TCP/IP Network Administration 3e : O'Reilly Ser. - Craig Hunt

RRP $104.50

$50.75

51%
OFF
Understanding the Linux Kernel : O'Reilly Ser. - Daniel P. Bovet

RRP $133.00

$64.75

51%
OFF