Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Introduction to modern cryptography (2nd ed.)
Katz J., Lindell Y., Chapman & Hall/CRC, Boca Raton, FL, 2014. 603 pp. Type: Book (978-1-466570-26-9)
Date Reviewed: Oct 7 2015

Introduction to modern cryptography offers its readers an in-depth, rigorous account of history, formal concepts, and definitions used today in the field of cryptography. Unlike other introductory texts, the authors strongly emphasize the importance of the mathematical foundations of cryptography.

The book is divided into three parts. The first part explores background and some basic formal definitions and principles about cryptography. Some of the basic mathematical foundations are described along with some of the most famous ciphers.

The second part of the book focuses on symmetric or private-key encryption. The authors formally define the concept of computational security, present alternatives to constructing secure encryption schemes, and then proceed to define secrecy and integrity, analyzing the construction of authentication codes and binding these concepts to encryption. Furthermore, in chapter 5 the reader gets important insights to the challenges of hash functions and their applications. When reaching the final chapters of this section, the authors have provided the reader with a complete set of definitions, theorems, proofs, and algorithms: enough to understand the dynamics of symmetric-key encryption.

The main topic of the third part is private-key or asymmetric encryption. This section handles public-key encryption with the same level of rigor and detail as the rest of the book. The first chapters present some background concepts, along with factoring problems and applications. Then, key management issues are introduced, before covering the schemes most common to public-key encryption and digital signatures.

The authors commit themselves to reinforcing the material presented in their text by offering challenging and insightful exercises at the end of each chapter. As a lone reader, I wish there were a forum for discussing the exercises and exchanging ideas with other readers. I could imagine that being part of a classroom could provide the sort of discussions that excite the student’s intellect.

The book is mostly suited for people seriously interested in cryptography. It is adequate for advanced undergraduate and graduate courses in the fields of computer science and mathematics. Although the authors try to explain the topic in a simple, comprehensible manner, a strong mathematical background is required to get the most out of the concepts, schemes, and strategies presented.

More reviews about this item: Amazon

Reviewer:  Carla Sánchez Aguilar Review #: CR143829 (1601-0019)
Bookmark and Share
  Reviewer Selected
 
 
Data Encryption (E.3 )
 
 
Number-Theoretic Computations (F.2.1 ... )
 
Would you recommend this review?
yes
no
Other reviews under "Data Encryption": Date
ESA/390 integrated cryptographic facility
Yeh P., Ronald M. S. IBM Systems Journal 30(2): 192-205, 1991. Type: Article
Feb 1 1992
Design and implementation of an RSA cryptosystem using multiple DSP chips
Er M., Wong D., Sethu A., Ngeow K. Microprocessors & Microsystems 15(7): 369-378, 1991. Type: Article
Nov 1 1993
An introduction to cryptography
Diffie W. (ed), Hellman M., John Wiley & Sons, Inc., New York, NY, 1984. Type: Book (9780471262336)
Feb 1 1986
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy