Description
For courses in Cryptography, Network Security, and Computer Security.
A broad spectrum of cryptography topics, covered from a mathematical point of view
Extensively revised and updated, the 3rd Edition of Introduction to Cryptography with Coding Theory mixes applied and theoretical aspects to build a solid foundation in cryptography and security. The authors' lively, conversational tone and practical focus informs a broad coverage of topics from a mathematical point of view. The text reflects the most recent trends in the rapidly changing field of cryptography, such as cryptocurrency.
Extend learning beyond the classroom
Pearson eText is an easy-to-use digital textbook that students can purchase on their own or you can assign for your course. It lets students read, highlight, and take notes all in one place. The mobile app lets students learn on the go, offline or online. Creating a course allows you to schedule readings, view reading analytics, and share your own notes with students, motivating them to keep reading, and keep learning. Learn more about Pearson eText.
Features
Balances the applied and theoretical aspects of cryptography and security
- Coverage of practical applications of cryptography to security protocols connects the cryptographic tools to the building of real security tools, demonstrating there is more to security and cryptography than just math.
- A friendly, story-like discussion of security concepts uses historical examples to illustrate the concepts of security and cryptanalysis by relating theory to easier-to-grasp events.
- The first thirteen chapters represent the core of the material; the flexible organization of the remaining chapters allow instructors to use them depending on their objectives and the level of the students.
- Methods that are becoming increasingly prominent in the field are covered thoroughly – including Elliptic curves, Pairing-based cryptography, Lattice methods, and Quantum techniques.
- In-depth coverage of coding theory explores a topic often covered in today’s cryptology courses.
- NEW–Short URLs within the text have been added to take students to relevant Web content. In the eText, all relevant content is a click away.
- New and up-to-date content covers the most current topics in cryptography:
- NEW / REVISED–Chapters 5-8 now organize content previously covered in two, on Stream Ciphers (including RC4), Block Ciphers, DES, and AES, respectively. In particular, the RC4 material is all new.
- REVISED–Heavily revised chapters on hash functions–Chapter 11 (Hash Functions) now includes sections on SHA-2 and SHA-3. Chapter 12 (Hash functions: Attacks and Applications) now includes material on message authentication codes, password protocols, and blockchains.
- REVISED–The short section on the one-time pad has been expanded to become Chapter 4, which includes sections on multiple use of the one-time pad, perfect secrecy, and ciphertext indistinguishability.
- NEW–Chapter 14, What Can Go Wrong, shows what can happen when cryptographic algorithms are used or designed incorrectly.
- REVISED–Expanded Chapter 16 on digital cash now includes Bitcoin and cryptocurrencies.
- NEW–Pairing-Based Cryptography is introduced in the new Chapter 22.
- REVISED–Expanded coverage of cryptographic hash functions:
- Includes SHA-2 and the new SHA-3 hash function, which uses the sponge construction.
- Updates discussion of message authentication codes, password protocols, and blockchains.
Relevant examples and exercises allow students to apply course concepts - Practical examples and applications give students hands-on experience with the large-numbered cryptography of today’s security systems, along with a discussion of security protocols.
- Numerous example calculations include many examples, such as computer-generated examples with realistic parameter sizes.
- Appendices at the end of the book contain computer examples written in each of Mathematica®, Maple®, MATLAB®, and Sage that show how to do such calculations.
- NEW–A Sage appendix has been added to the 3rd Edition, and references to the Sage appendix have been added throughout the text.
- NEW–Within the eText, all appendix references are live links to this content.
- Numerous exercises appear throughout, with many new exercises added to the 3rd Edition.
- NEW–Answers to a majority of the odd-numbered problems have been added in a new section at the back of the book.
- Mathematica, Maple, MATLAB, and Sage problems allow students to work with realistic-sized examples in RSA and Digital Signatures, as well as classical cryptosystems and those with elliptic curves.
Check out the preface for a complete list of features and what's new in this edition.
New to this Edition
Content changes:
- Chapters 5-8 now organize content previously covered in two – on Stream Ciphers (including RC4), Block Ciphers, DES, and AES, respectively. In particular, the RC4 material is all new.
- Heavily revised chapters on hash functions – Chapter 11 (Hash Functions) now includes sections on SHA-2 and SHA-3. Chapter 12 (Hash Functions: Attacks and Applications) now includes material on message authentication codes, password protocols, and blockchains.
- The short section on the one-time pad has been expanded to become Chapter 4, which includes sections on multiple use of the one-time pad, perfect secrecy, and ciphertext indistinguishability.
- New Chapter 14, What Can Go Wrong, shows what can happen when cryptographic algorithms are used or designed incorrectly.
- Expanded Chapter 16 on digital cash now includes Bitcoin and cryptocurrencies.
- Pairing-Based Cryptography is introduced in the new Chapter 22.
- References to the new Sage appendices have been added in relevant locations in the text. Within the eText, these references are live links to this content.
- Short URLs within the text have been added to take students to relevant Web content. In the eText, all relevant content is a click away.
- Many new exercises have been added throughout.
- Answers to a majority of the odd-numbered problems have been added in a new section at the back of the book.
Check out the preface for a complete list of features and what's new in this edition.
Table of Contents
Brief Table of Contents
Author
About our author
Wade Trappe is a Professor in the Electrical and Computer Engineering Department at Rutgers University, and Associate Director of the Wireless Information Network Laboratory (WINLAB). He has led several federally funded projects in the area of cybersecurity and communication systems. He was named Fellow of the Institute of Electrical and Electronics Engineers (IEEE) in 2014 for contributions to information and communication security.