Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Introduction to cryptography: principles and applications (3rd ed.)
Delfs H., Knebl H., Springer Publishing Company, Incorporated, New York, NY, 2015. 508 pp. Type: Book (978-3-662479-73-5)
Date Reviewed: Mar 16 2016

Cryptography is the foundation of any secure communication. It is essential for and enables e-commerce, the digitization of information, cloud computing, and the list goes on. Cryptography uses mathematical functions to scramble messages so that they become indistinguishable from random bit strings. To date, many cryptographic algorithms have been shown to be very effective, and they have become the backbone of modern computing. Also, cryptographic algorithms, because of their mathematical nature, can be proven to be correct; if implemented correctly, they are universally trusted.

Delfs and Knebl in this book focus on the mathematical aspects of cryptography. They are not concerned with the implementation of its algorithms, but instead attempt to teach the user the mathematical background of cryptography and then to prove the correctness of its algorithms. Because of its purely theoretical focus, I believe that this book is best suited for a graduate course in mathematics.

The book is organized in two parts. The first part has 11 chapters that cover the following topics: symmetric key cryptography, public-key cryptography, general cryptographic protocols, probabilistic algorithms, one-way functions, bit-security of one-way functions and pseudorandomness, provably secure encryption, unconditional security of cryptosystems, and provable secure digital signatures. This provides an overview over the main cryptographic algorithms and includes proofs of their correctness. The second part, the appendix, covers the mathematical background needed to understand the first part. Nevertheless, since the appendix with its mathematical theorems is separate from the rest of the book, a reader with little mathematical background would have to continuously go back and forth, making it very hard to read this book.

Because of this setup, I feel that this book is best suited for readers who already have the necessary background in number theory, abstract algebra, probability, and information theory. Since the appendix does not directly connect its material to the content of the main chapters, novice readers could become frustrated very easily. A mixed approach might have been better, where the mathematical background is covered just in time to explain a particular cryptographic algorithm. Because of this, I can really only recommend this book for readers with strong mathematical backgrounds who are interested in the foundations of the field.

Reviewer:  Burkhard Englert Review #: CR144237 (1606-0376)
Bookmark and Share
  Reviewer Selected
Featured Reviewer
 
 
Data Encryption (E.3 )
 
 
Number-Theoretic Computations (F.2.1 ... )
 
 
Reference (A.2 )
 
Would you recommend this review?
yes
no
Other reviews under "Data Encryption": Date
ESA/390 integrated cryptographic facility
Yeh P., Ronald M. S. IBM Systems Journal 30(2): 192-205, 1991. Type: Article
Feb 1 1992
Design and implementation of an RSA cryptosystem using multiple DSP chips
Er M., Wong D., Sethu A., Ngeow K. Microprocessors & Microsystems 15(7): 369-378, 1991. Type: Article
Nov 1 1993
An introduction to cryptography
Diffie W. (ed), Hellman M., John Wiley & Sons, Inc., New York, NY, 1984. Type: Book (9780471262336)
Feb 1 1986
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy