Skip to content

Cryptography: A Very Short Introduction

(Part of the Very Short Introductions (#68) Series and Oxford's Very Short Introductions series (#68) Series)

Select Format

Select Condition ThriftBooks Help Icon

Recommended

Format: Paperback

Condition: Good

$5.99
Save $7.00!
List Price $12.99
Almost Gone, Only 3 Left!

Book Overview

This book is a clear and informative introduction to cryptography and data protection--subjects of considerable social and political importance. It explains what algorithms do, how they are used, the... This description may be from another edition of this product.

Customer Reviews

2 ratings

excellent read

this book is exactly what it says it is and is excellent at that task. i highly recommend this book to a sys-admin that wants to understand the basics of encryption without being an expert, anyone interested in cryptograms, or anyone with just a casual interest in the history, and concepts of cryptography. this book is not designed for mathematicians or security experts looking deep inner workings of algorithms. the book is easy to follow without the need for a technical or mathematics background and gives occasional problems for the reader to solve which will be of interest to anyone who enjoys cryptograms. as a network engineer, i found this an enjoyable pleasure read which shed some light on the encryption protocols employed on some of the gear i manage.

covers the main ideas, with little maths needed

The book is good as befits its subtitle. Indeed, a very short introduction, with only a minimal evocation of maths background. But there is enough qualitative explanation so that you can understand the broad historical development. From the Caesar Cipher to a Simple Substitution Cipher to a Vigenere Square Cipher. Then, the text goes into modern ideas, all of which involve using computers to encrypt and decrypt. Notably the invention of the public key system. Truly quite different from all that preceded it. There is also a brief foray into quantum computing. Here, it is mostly conceptual; discussing the possible potential, since current implementations are very rudimentary. The text has no mention of man in the middle attacks and how to guard against these. Pity. Because while this is a very hard attack to perform, if it can done, then it is very hard to defend against. One of the promises of quantum computing is that it inherently offers a simple detection, based on quantum interference by the attacker.
Copyright © 2023 Thriftbooks.com Terms of Use | Privacy Policy | Do Not Sell/Share My Personal Information | Cookie Policy | Cookie Preferences | Accessibility Statement
ThriftBooks® and the ThriftBooks® logo are registered trademarks of Thrift Books Global, LLC
GoDaddy Verified and Secured