Skip to content
Hardcover Cryptography: A Primer Book

ISBN: 0471081329

ISBN13: 9780471081326

Cryptography: A Primer

CrypTography: a Primer Alan G. Konheim Here's the first systematic, unclassified treatment of the theory and practice of encipherment--an essential tool for protecting the contents of computer data.... This description may be from another edition of this product.

Recommended

Format: Hardcover

Temporarily Unavailable

3 people are interested in this title.

We receive 3 copies every 6 months.

Customer Reviews

5 ratings

Decrypting cryptography

Prof. Konheim's book is, well, fun to read. While I took the class in UC Santa Barbara, he essentailly followed the book. It covers classical as well as part of modern cyrptography. Needless to say, we have a lot of programming and deciphering a lot of crypted text as homework.The knowledge is basic and essential for crypto-analysis. You will find this book indispensible, even though it doesn't cover topics such as interactive proof system which is more theory than practice as you find very little real world implementation in action.Read it, program it, decrypt it and enjoy yourself.

Excellent, but with a few minor gaps

Konheim tried in 1981 to do what Helen Gaines tried to do in 1939; to provide a basic working knowledge of the state of the art in cryptology to people with little or no previous knowledge. By and large, Konheim succeeded admirably. He had to overcome two major hurdles. By 1981 the amount known in the public domain about cryptology was very large: too large for a modest-sized book like this. And the basis of the topic had become largely mathematical, which is a put-off for many readers. Konheim copes beautifully with both problems, selecting important material and skipping less important material, and limiting the mathematics to what can almost all be followed by a high-school science honors student (although it helps to have at least three years of college math.) I would love to use this book as the text for a one semester course.Having said that, I'll offer a few minor criticisms. The whole art of cryptology (as distinct from the mathematics) lies in dealing with the fallibility of people who design and use (or don't use) crypto systems. Konheim doesn't emphasize this enough. For example, cypher-text-only cryptanalysis of a good modern cypher is apt to be extremely hard, but it is often unnecessary. Konheim does not discuss the enormous diversity of ways in which the cryptanalyst may hope to acquire plaintext or probable plaintext. Professional designers of ciphers and codes know all about this, and their choices are heavily influenced by the need to limit damage when, for example, a general sends a back-channel message in a weak cipher that has the same content as an official message in a strong cipher.He also fails to discuss in detail just how hard it is for the designer of a cipher to create a cipher as strong as the designer believes it to be. This is unfortunate, but I can't lay the blame on Konheim. Most of the most interesting anecdotes to illustrate this point (such as the reasons why NSA rejected LUCIFER and instead worked with IBM to create NDES) are sort of known in the folklore, but not really in the public domain, so could not be included in a college textbook. This is also presumably why Konheim chose not to mention the earliest, original discussions about public key ciphers.I'll also observe that Konheim's discussion of rotor ciphers is remarkably brief, in view of the importance and widespread use of various types of rotor ciphers in many countries for many years. I understand why Konheim decided not to delve into this topic in detail, but it leaves a serious gap in the student's knowledge. Similarly, Konheim's discussion of NDES pays little attention to chaining and related topics, although he surely had access to the NBS unclassified manual on this subject.And finally, Konheim devotes less attention than I could wish to the problems of generating, distributing and safeguarding keys. There is a popular belief that RSA with a suitably long key is nearly impregnable, for example, and there is good reason for this belief, but on

Bad quality reprint, good quality content

I contemplated buying this book a few years ago when the original edition was still available, but put it off until earlier this year. The book is now available only as a reprint and the quality is nowhere near as good as the original. For a $185 book, I was somewhat disappointed. Still, at least the content hasn't changed.Topics in this book include cryptanalysis of substitution ciphers, polyalphabetic ciphers, playfair and rotor machines. It has a chapter on the design and analysis of the DES block cipher. The final part of the book concentrates on key management.The approach is mainly from a statistical angle, as opposed to combinatorics or number theory (which is more common in crypto textbooks). There is not a lot on public key crypto (or even modern cryptanalysis methods) in here, but it is a nice introduction to cryptology from a well-respected cryptographer.

Schneier gives you fish. Konheim gives you a fishing rod.

It was back in early 1982, I believe, that I bought my first copy of Alan G. Konheim's _Cryptography:_A_Primer_. It proved to be addictive. The author taught me the basics of cryptanalysis, explaining means and ways with a clarity that seldom finds its equal.If you buy one book on the subject, I implore you to let Bruce Schneier wait a while -- get the basics first.

The best introductory book to cryptography.

This book is quite suitable for junior/senior or first year graduate school student interested in COmputer Information Security.
Copyright © 2023 Thriftbooks.com Terms of Use | Privacy Policy | Do Not Sell/Share My Personal Information | Cookie Policy | Cookie Preferences | Accessibility Statement
ThriftBooks® and the ThriftBooks® logo are registered trademarks of Thrift Books Global, LLC
GoDaddy Verified and Secured