Skip to main content

Modern Cryptography Primer

Theoretical Foundations and Practical Applications

  • Textbook
  • © 2013

Overview

  • Introduces the most important issues of modern applied cryptography in computerized telecommunication networks
  • Presents key technologies, algorithms, and protocols, along with methods of design and analysis
  • Suitable for advanced undergraduates and graduates in computer science and engineering
  • Includes supplementary material: sn.pub/extras

This is a preview of subscription content, log in via an institution to check access.

Access this book

eBook USD 54.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 69.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book USD 84.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

Licence this eBook for your library

Institutional subscriptions

Table of contents (9 chapters)

Keywords

About this book

Cryptography has experienced rapid development, with major advances recently in both secret and public key ciphers, cryptographic hash functions, cryptographic algorithms and multiparty protocols, including their software engineering correctness verification, and various methods of cryptanalysis. This textbook introduces the reader to these areas, offering an understanding of the essential, most important, and most interesting ideas, based on the authors' teaching and research experience.

After introducing the basic mathematical and computational complexity concepts, and some historical context, including the story of Enigma, the authors explain symmetric and asymmetric cryptography, electronic signatures and hash functions, PGP systems, public key infrastructures, cryptographic protocols, and applications in network security. In each case the text presents the key technologies, algorithms, and protocols, along with methods of design and analysis, while the content is characterized by a visual style and all algorithms are presented in readable pseudocode or using simple graphics and diagrams.

The book is suitable for undergraduate and graduate courses in computer science and engineering, particularly in the area of networking, and it is also a suitable reference text for self-study by practitioners and researchers. The authors assume only basic elementary mathematical experience, the text covers the foundational mathematics and computational complexity theory.

Authors and Affiliations

  • Faculty of Information Technology, Wrocław School of Information Technology, Wrocław, Poland

    Czesław Kościelny

  • Inst. of Computer and Inf. Sciences, Czestochowa University of Technology, Czestochowa, Poland

    Mirosław Kurkowski

  • Institute of Computer Science, Polish Academy of Sciences, Warsaw, Poland

    Marian Srebrny

About the authors

Czesław Kościelny is a professor in the Department of Cryptography of Wrocław University of Applied Informatics.

Mirosław Kurkowski is a professor in the Institute of Computer and Information Sciences of Czestochowa University of Technology.

Marian Srebrny is a professor in the Institute of Computer Science of the Polish Academy of Sciences.

Bibliographic Information

Publish with us