
Download the free Kindle app and start reading Kindle books instantly on your smartphone, tablet, or computer - no Kindle device required.
Read instantly on your browser with Kindle for Web.
Using your mobile phone camera - scan the code below and download the Kindle app.
Follow the authors
OK
Understanding Cryptography: A Textbook for Students and Practitioners 1st Edition
Cryptography is now ubiquitous - moving beyond the traditional environments, such as government communications and banking systems, we see cryptographic techniques realized in Web browsers, e-mail programs, cell phones, manufacturing systems, embedded software, smart buildings, cars, and even medical implants. Today's designers need a comprehensive understanding of applied cryptography.
After an introduction to cryptography and data security, the authors explain the main techniques in modern cryptography, with chapters addressing stream ciphers, the Data Encryption Standard (DES) and 3DES, the Advanced Encryption Standard (AES), block ciphers, the RSA cryptosystem, public-key cryptosystems based on the discrete logarithm problem, elliptic-curve cryptography (ECC), digital signatures, hash functions, Message Authentication Codes (MACs), and methods for key establishment, including certificates and public-key infrastructure (PKI). Throughout the book, the authors focus on communicating the essentials and keeping the mathematics to a minimum, and they move quickly from explaining the foundations to describing practical implementations, including recent topics such as lightweight ciphers for RFIDs and mobile devices, and current key-length recommendations.
The authors have considerable experience teaching applied cryptography to engineering and computer science students and to professionals, and they make extensive use of examples, problems, and chapter reviews, while the book's website offers slides, projects and links to further resources. This is a suitable textbook for graduate and advanced undergraduate courses and also for self-study by engineers.
- ISBN-103642041000
- ISBN-13978-3642041006
- Edition1st
- PublisherSPRINGER
- Publication dateOctober 19, 2011
- LanguageEnglish
- Dimensions6.1 x 9.3 inches
- Print length392 pages
There is a newer edition of this item:
Customers who viewed this item also viewed
Product details
- Publisher : SPRINGER; 1st edition (October 19, 2011)
- Language : English
- Hardcover : 392 pages
- ISBN-10 : 3642041000
- ISBN-13 : 978-3642041006
- Item Weight : 2.31 pounds
- Dimensions : 6.1 x 9.3 inches
- Best Sellers Rank: #670,984 in Books (See Top 100 in Books)
- #63 in Web Encryption
- #67 in Information Theory
- #81 in Computer Cryptography
- Customer Reviews:
About the authors
For more information on Understanding Cryptography, including video lectures, slides and many other resources, visit: WWW.CRYPTO-TEXTBOOK.COM
Christof is Founding Director of the Max Planck Institute for Security and Privacy in Bochum, Germany, and Research Professor at the Univ. of Massachusetts Amherst. He has taught crypto and security courses for 25 years to thousands of students in the US & Europe. He also taught extensively in industry, including courses at NASA, Motorola & Philips. Christof has given invited talks at MIT, Oxford, Yale, Stanford, IBM and Intel. He co-founded, with Cetin Koc, the Conference on Cryptographic Hardware and Embedded Systems (CHES) and has 200+ scientific publications on applied cryptography. He is fellow of the IEEE and the International Association for Cryptologic Research.
Christof has also been very active in industrial security. He co-founded ESCRYPT Inc., a leading international player for industrial security. In 2012 ESCRYPT became part of Bosch, one of the world's largest engineering firms. Together with his PhD students he spun-off a number of other start-ups related to IoT security, secure embedded software and high-performance computing for cryptanalysis.
For more information on UNDERSTANDING CRYPTOGRAPHY, including slides, free chapters & videos, visit: WWW.CRYPTO-TEXTBOOK.COM
Since 2015, Jan Pelzl is Professor for Computer Security at the Applied University of Hamm-Lippstadt. Besides teaching applied IT Security, Jan Pelzl focusses on research topics in applied data security for industrial applications such as automation, automotive, and medical. He has successfully managed numerous national and international industry projects, and has a deep insight into security needs in the real world. Prof. Pelzl had investigated practical aspects of elliptic curve-based cryptography and cryptanalysis. He has published extensively about his theoretical and industrial work at leading international conferences and journals. Prof. Pelzl has been teaching IT security and cryptography courses in industry for many years.
Before becoming a Professor in Computer Security, Jan Pelzl was Managing Director of ESCRYPT - Embedded Security for almost 8 years. ESCRYPT is a leading security consultancy company and since 2012, ESCRYPT is a subsidiary of the Robert Bosch GmbH.
Customer reviews
Customer Reviews, including Product Star Ratings help customers to learn more about the product and decide whether it is the right product for them.
To calculate the overall star rating and percentage breakdown by star, we don’t use a simple average. Instead, our system considers things like how recent a review is and if the reviewer bought the item on Amazon. It also analyzed reviews to verify trustworthiness.
Learn more how customers reviews work on AmazonCustomers say
Customers find the book provides great explanations and is extremely educational, helping with homework problems. Moreover, the content is concise and easy to understand. Additionally, the coverage is practical, and one customer mentions the book comes with dozens of hours of YouTube lectures as a supplement.
AI-generated from the text of customer reviews
Select to learn more
Customers find the book's explanations excellent and educational, particularly noting that it helps with homework problems. One customer mentions it provides a high-level conceptual overview, while another appreciates its math-based approach to selected topics.
"...the great things about Understanding Cryptography is that it taught me exactly the math that I needed. You need to be comfortable learning new math...." Read more
"...discussion of a given cryptosystem design, there is a discussion of how to crypto analyze (break or attack) "that" cryptosystem (cryptanalysis)...." Read more
"...chapters are clear and concise, and usually begin with a high level conceptual overview before breaking down component algorithms and supporting..." Read more
"...Christof's classes are excellent, I bought the book to use as a reference while going through the online courses but you probably wouldn't need..." Read more
Customers find the book clear and easy to understand, with one customer noting it serves as an excellent introduction for readers of various backgrounds.
"...'s explanation of the math & algorithms is the most clear and easy to understand I have ever seen; which to me means, you do not need a strong..." Read more
"...a college course in the matter, but I want to add that it is so clearly presented, organized with introductions to the necessary math that it works..." Read more
"...The chapters are clear and concise, and usually begin with a high level conceptual overview before breaking down component algorithms and supporting..." Read more
"...Very clearly set out, but as I said, if you're not a math person, you will find it a little obscure." Read more
Customers appreciate the video content, with one mentioning that dozens of hours of YouTube lectures are available as a supplement to the text.
"...The excellent organization and presentation of the material means that I was able to get far, far more out of this book than anything else I have..." Read more
"...All the videos are on Youtube and these videos are a must supplement to this text...." Read more
"There are dozens of hours of youtube lectures of Christof Paar lecturing in his class in Germany (in English) which I found extraordinarily helpful..." Read more
"Prof. Paar's course on YouTube is superb, and this text makes it even better...." Read more
Customers find the book's coverage practical and comprehensive, with one customer noting it covers the breadth of the topic well.
"...In addition, it is very practical coverage and still challenging enough to be motivational, in other words, you do not have to drink twelve cups of..." Read more
"...I am sure that it will ultimately have very broad base as it is well suited for introductory courses with a variety of goals. Order it!..." Read more
"...too much history, not too much code, just enough math, covers the breadth of the topic well...." Read more
Reviews with images

Just what my granddaughter needs to read to check on this as a career.
Top reviews from the United States
There was a problem filtering reviews. Please reload the page.
- Reviewed in the United States on September 20, 2010I came across this book on accident. I was googling around for articles by Preneel and found this book, in which he wrote the foreword. Frankly, I hope this book eventually replaces most, if not all of the mainstream texts on cryptography. My only complaint about this book is that I no longer feel like one of the rare geniuses that thoroughly and completely understands cryptography. Thanks to this book, any dummy off the street can understand cryptography nearly as well as I do and they do not need a computer science or math degree. No prerequisite knowledge is required, other than the ability to read but there is plenty of math if you want to study it. (Warning: I might be exaggerating a little. I really enjoy math and might be taking my math skills for granted. Just so I am clear, this is a Math textbook, which means the encryption algorithms are formally defined using math notation. However, the author's explanation of the math & algorithms is the most clear and easy to understand I have ever seen; which to me means, you do not need a strong background in mathematics to understand this material.)
The following categories are scored 1-10. 1 being the lowest, through 10, the highest...
- Readability (i.e. authors style of writing, is he to the point, write clear, how does he approach the topic, does he motivate, etc...)
Score: 10
I personally do not care for analogies in cryptography books. If the author knows what he is talking about and can explain it, there is absolutely no need for stupid analogies. Another thing that drives me crazy is authors that "challenge you to think" too much. They can never get to the point and come right out and tell you something. Half the time, I can't figure out if they actually either do not know what they are talking about, or they simply do not know how to explain something and hide it behind a series of challenging questions...which they themselves cannot answer(as if to be objective or something). Frankly, I am a professional with over 10 years of experience. I do not buy books so that authors can beat around the bush with their knowledge; which, by the way, I find condescending, because they are supposed to be the experts. When I pay money for a technical book, I do it with the expectation that the author is knowledgeable, qualified to write about the topic, and will not waste my time playing mind games with me. That is what is so surprising about this book; it clearly says "textbook" on the cover, which made me hesitate, thinking... maybe this is too elementary, or like many college textbooks, challenges you to think too much. However, contrary to my concerns, this book is to the point and carefully explains details that other authors seem to miss. In addition, it is very practical coverage and still challenging enough to be motivational, in other words, you do not have to drink twelve cups of coffee just to get through it. To summarize this section, at this stage in my career, I really appreciate authors that can "thoroughly explain things in the fewest possible words, while still being crystal clear!" (Apparently, this is something I myself cannot do, as evidence above, but that is why I do not write books)
- Organization
Score: 10
I have many cryptography books that talk about critical aspects of the encryption processes in isolation without tying them together; this book is very well organized in that respect.
- Real world Application (i.e. is this how it works in the real world or is this just theory that never gets used in practice)
Score: 9
This is another category that makes this book stand out because the coverage is very practical.
- Thoroughness (i.e. how rigorous is the book, is it a comprehensive review of technologies)
Score: 7
Great Introduction to many areas!
- Application & Implementation on Computer (i.e. code, algorithms, data-types, programming language tips/tricks...etc)
Score: 5
Most books attempt to provide code but the code is based on static input and is poorly written, leaving you to wonder, why on earth they even bothered to try. Actually coding algorithms is not the focus of this book... I don't think it contains one line of code, but you can encrypt and decrypt, end-2-end on paper, if you want to, after reading it. As I mentioned earlier, this is a math book, so the algorithms are presented in mathematical notation.
............
Edit: I have to add a disclaimer to this review. I originally read this book when I was knee deep in research and loved this book so much because the author tied together some concepts in such a concise explanation. This book is definitely a five star book but now that my initial excitement has worn off I think that some of my claims above may have been overinflated. I would recommend that the reader is comfortable with at least advanced algebra and discrete math. Sorry, I think I drank too much coffee before writing this review. Bottom line, this is not a detailed comprehensive book on cryptography, this is a short, concise, math based explanation about selected topics. The point that I was trying to make is not that this is a thorough book, but this is a high quality explanation of selected topics.
- Reviewed in the United States on June 20, 2011If you've heard people mention things like ECC, HMACs, discrete logarithms and wanted to what they were talking about; or if you wanted to understand who RSA and AES really work along with many other things, then this is the book for you.
I had been hunting for something more current than the 1996 Applied Cryptography: Protocols, Algorithms, and Source Code in C, Second Edition when I came across Understanding Cryptography. I could tell from the available samples and the table of contents, that it should meet my needs. It has not only met my needs, but has exceeded them in every respect.
This book was absolutely perfect for me, so it would be of some use for you to know my background.
I've long had an interest in cryptography but never any training. When I read Martin Gardener's famous 1977 article on RSA I thought it was the coolest thing ever, but I didn't fully grasp it and didn't pursue it at the time. In college I studied some math, but my degree is in linguistics, not in math or computing. I have read popularizations of cryptography, and had tried to make it though Applied Cryptography when it first came out in 1996, but I can't say that I really understood how the algorithms and the more intricate protocols worked. So that is roughly my background.
One of the great things about Understanding Cryptography is that it taught me exactly the math that I needed. You need to be comfortable learning new math. (I also found that I had to brush up on basic linear algebra on my own to understand one component of the deals of AES).
Working though this book on my own through self study took time. It is extremely well presented (with the possible exception of the final chapter, which could do with another round of copy-editing). The subject matter is not simple, so if you really wish to understand them you need to go through things very slowly, stopping frequently to check understanding, but everything you need is in the book without it being overly long. The excellent organization and presentation of the material means that I was able to get far, far more out of this book than anything else I have read on the topic.
The problem sets at the end of each chapter progress from easy to more challenging. I still need to go back and take on some of the more challenging ones I skipped the first time through. Often I was too eager to get to the new chapter than to work through the problems. As a consequence I missed some of the extended material that was presented through those problems sets.
Personally, my second favorite chapter is the chapter on AES which really steps through how it works and why each component does what it does. My favorite is the chapter on ECC. I had known wat ECC was used for, but before reading this, I had no idea of what it really was. Now I find it "the coolest thing ever". (OK, I may over use that phrase.) The authors' presentation of it is just right. They lead you though the process so that you can share in the delight of how ECC works.
Although I have worked though this as complete self-study, I would have preferred to do this as part of a class or at least some study group. Sometimes because I could have more quickly gotten through things that I held me up a few times, but mostly because I would have liked to share the experience. My wife and daughter are not entirely happy with the fact that I've been trying to teach them bits of what I've been learning over the month.
There are still bits that I don't fully understand. Some are questions not addressed in the book, but the further readings and bibliography are excellent. So I have the resources to investigate those. There are also bits that I don't fully understand because I haven't gone back and worked through the relevant exercises in the problem sets.
What I would like to see in a second addition:
(1) A bibliography for each chapter as well as the comprehensive one at the end
(2) A reworking of the final chapter, which appears rushed and not as well presented as everything else
(3) More on hash functions reflecting what is being learned now as part of the SHA3 process.
I am sure that this makes an outstanding textbook for a college course in the matter, but I want to add that it is so clearly presented, organized with introductions to the necessary math that it works for self-study as well.
- Reviewed in the United States on January 2, 2014I read this book as someone with a maths degree and someone familiar with cryptography to see how its treatment compares to more popular books.
In brief, this book will take you through from the very basics, such as stream ciphers (briefly), to specific and very common examples of block ciphers such as AES and DES -- each of which is given its own chapter. Though some implementation details are left out, for example, it would not have been too difficult to explain how the steps of an AES round could be combined into a single operations involving look up tables and exclusive ORs. It would have added at most 2 pages and would have made the reader more familiar with the Galios Field mathematics involved. The later chapters of the book deal with public-private key encryption, certificates, hashes, MACs and a brief introduction to elliptical curves.
Unfortunately, this book has a lot of mistakes so you cannot rely on it with authority. For example, even the Miller-Rabin algorithm is not stated correctly and some coefficients of various algorithms are written incorrectly. If you're looking for a reference, look on, at least maybe until the 2nd edition.
Despite the mistakes, I can't bear to give this book a 4 star rating. It definitely deserves 5 stars and rest assured, when you start to read this book you will not feel like stopping. The authors use plenty of real world stories to keep you going each time, it is paced masterfully. Every chapter is motivated well, every example and exercise serves a point. It would be great if the authors could write another book discussing authentication protocols and the practical implementation side of things (such as things like cache timing attacks).
Top reviews from other countries
-
Aravinth RajReviewed in Germany on March 24, 2025
5.0 out of 5 stars Tolles Buch
Ich habe kürzlich Kryptographie-Engineering: Design-Prinzipien und praktische Anwendungen gelesen und es ist ein tolles Buch für alle, die sich für Kryptographie interessieren. Es ist klar und detailliert, mit einer guten Mischung aus Theorie und praktischen Anwendungen. Obwohl es technische Aspekte behandelt, ist es trotzdem für Leser mit grundlegenden Informatikkenntnissen verständlich. Die Beispiele machen die Konzepte leichter verständlich. Einige Abschnitte sind jedoch etwas schwerer, wenn man sich mit bestimmten Themen nicht auskennt. Insgesamt ist es eine gute Wahl, um Kryptographie besser zu verstehen. Ich kann es definitiv empfehlen!
-
Hitek13Reviewed in Spain on April 8, 2018
5.0 out of 5 stars Libro maravilloso
Ideal para los que empiezan o ya saben de Cryptografia. Además la edición es genial: tapa dura y papel agradable al tacto.
-
JambockReviewed in Brazil on January 21, 2019
5.0 out of 5 stars Excelente introdução à criptologia
Livro bom e que conta com algumas aulas dos capítulos no YouTube (em Inglês). Recomendo. A encardenação não é das melhores, mas isto é secundário no meu caso.
- FrankieboyReviewed in the United Kingdom on May 12, 2016
5.0 out of 5 stars very very good companion to the YouTube series
I had follow the cryto course on Youtube sometime its hard to understand the principle (for me at least) until I follow it in a book. Cryptography is very hard anyway I am still working my way through the book. very very good companion to the YouTube series.
-
LuigiReviewed in Italy on July 31, 2018
5.0 out of 5 stars LIBRO DIVERTENTE E BEN FATTO
Ho studiato da diversi libri di crittografia ma questo è quello più completo, conciso e puntuale. Diciamo che è consigliabile per i "beginners" come me. Dà delle buone basi e rilascia dei riferimenti per chi volesse approfondire. Tutto quello di cui ho avuto bisogno l'ho trovato qui sopra e l'ho sempre capito. 5 stelle meritatissime