Cryptological Mathematics (Classroom Resource Materials Series) / Edition 1

Paperback (Print)
Rent from
(Save 68%)
Est. Return Date: 07/26/2015
Buy Used
Buy Used from
(Save 41%)
Item is in good condition but packaging may have signs of shelf wear/aging or torn packaging.
Condition: Used – Good details
Used and New from Other Sellers
Used and New from Other Sellers
from $21.99
Usually ships in 1-2 business days
(Save 55%)
Other sellers (Paperback)
  • All (13) from $21.99   
  • New (3) from $47.00   
  • Used (10) from $21.99   
Sort by
Page 1 of 1
Showing All
Note: Marketplace items are not eligible for any coupons and promotions
Seller since 2007

Feedback rating:



New — never opened or used in original packaging.

Like New — packaging may have been opened. A "Like New" item is suitable to give as a gift.

Very Good — may have minor signs of wear on packaging but item works perfectly and has no damage.

Good — item is in good condition but packaging may have signs of shelf wear/aging or torn packaging. All specific defects should be noted in the Comments section associated with each item.

Acceptable — item is in working order but may show signs of wear such as scratches or torn packaging. All specific defects should be noted in the Comments section associated with each item.

Used — An item that has been opened and may show signs of wear. All specific defects should be noted in the Comments section associated with each item.

Refurbished — A used item that has been renewed or updated and verified to be in proper working condition. Not necessarily completed by the original manufacturer.

Brand new. We distribute directly for the publisher. Cryptological Mathematics introduces the reader to elementary yet rigorous mathematics from several different branches of the ... subject including number theory, abstract algebra, matrix algebra, probability, and statistics, all of which play a role in enciphering and deciphering secret messages. And it does so in a light-hearted fashion, thanks to the carryings-on of the book's three main characters, Beth, Stephanie, and Molly.The book can be used at several different levels. Those interested in learning how to encipher messages using a variety of symmetric and asymmetric schemes will learn those techniques in this volume. Those interested in learning the mathematical foundations of these techniques will learn how and why the enciphering schemes actually work. And those who are looking for some challenging computer programming exercises will also find exercises in this book to keep them busy. So, the book may be used profitably by amateur cryptographers, motivated liberal arts students, and mathematics or computer science majors alike.The book begins by considering simple monoalphabetic substitution ciphers (additive, multiplicative, affine and keyword) and then moves through a polyalphabetic substitution cipher (the Vignere Square) and on to polygraphic substitution ciphers (including Hill's system). Finally the RSA Public Key Encryption System is introduced along with several of its variations. At each step the mathematics required to understand these systems is introduced in a thorough yet gentle manner.The book also invites those readers who may be interested to program the algorithms it describes. Some exercises can be done using a simple spreadsheet program; others are best handled by a symbolic algebra system.In addition, the book contains biographical sketches of some lesser-known yet fascinating personalities who had been involved with cryptography. Read more Show Less

Ships from: Boonsboro, MD

Usually ships in 1-2 business days

  • Canadian
  • International
  • Standard, 48 States
  • Standard (AK, HI)
  • Express, 48 States
  • Express (AK, HI)
Seller since 2015

Feedback rating:


Condition: New
Brand new, never opened. Sells out fast! - Paperback - ISBN 9780883857199

Ships from: Lexington, KY

Usually ships in 1-2 business days

  • Standard, 48 States
  • Standard (AK, HI)
Seller since 2008

Feedback rating:


Condition: New

Ships from: Chicago, IL

Usually ships in 1-2 business days

  • Standard, 48 States
  • Standard (AK, HI)
Page 1 of 1
Showing All
Sort by


This is an introduction to the mathematics involved in the intriguing field of cryptology, the science of writing and reading secret messages which are designed to be read only by their intended recipients. It is written at an elementary level, suitable for beginning undergraduates, with careful explanations of all the concepts used. The basic branches of mathematics required, including number theory, abstract algebra and probability, are used to show how to encipher and decipher messages, and why this works, giving a practical as well as theoretical basis to the subject. Challenging computer programming exercises are also included. The book is written in an engaging style which will appeal to all, and also includes historical background on some of the founders of the subject. It will be of interest both to students wishing to learn cryptology per se, and also to those searching for practical applications of seemingly abstract mathematics.

Read More Show Less

Editorial Reviews

Neal Koblitz
This book is written with careful attention to the challenge of motivating a humanities or business major. An impressive amount of the mathematics that might make a standard "math for poets" course-mathematical induction, elementary number theory, probabilities, matrices-is presented through the vehicle of cryptography.
American Mathematical Monthly
A textbook for a one-semester undergraduate course for students who will or will not go on to more advanced mathematics. Lewant (Groucher College, Baltimore) draws together elementary mathematics from number theory, abstract algebra, matrix algebra, probability, and statistics. The point is not so much to learn to encode and decode, but to use cryptology as a fun way to learn the math itself. Annotation c. Book News, Inc., Portland, OR (
Read More Show Less

Product Details

  • ISBN-13: 9780883857199
  • Publisher: Mathematical Association of America
  • Publication date: 11/1/2000
  • Series: Classroom Resource Materials Series
  • Edition description: New Edition
  • Edition number: 1
  • Pages: 220
  • Product dimensions: 7.02 (w) x 9.96 (h) x 0.46 (d)

Table of Contents

Preface xi
1 Monoalphabetic Substitution Ciphers 1
1.1 Well-Ordering Axiom, Principle of Mathematical Induction 2
The Well-Ordering Axiom 2
The Principle of Mathematical Induction 3
Exercises 1.1 7
1.2 Prime Numbers, Division Algorithm, Greatest Common Divisor 7
Exercises 1.2 15
1.3 Relatively Prime Integers, Fundamental Theorem of Arithmetic 16
The Fundamental Theorem of Arithmetic 17
Exercises 1.3 18
1.4 Modular Arithmetic 19
Exercises 1.4 26
1.5 Simple Ciphers 27
The Cast of Characters 27
Additive Ciphers 28
Multiplicative Ciphers 30
Affine Ciphers 32
Keyword Ciphers 33
Exercises 1.5 34
1.6 Cryptanalysis of Monoalphabetic Substitution Ciphers 35
Exercises 1.6 41
1.7 Personalities 42
2 Polyalphabetic Substitution Ciphers 45
2.1 The Multiplication Principle 46
Exercises 2.1 50
2.2 Permutations and Combinations 51
Exercises 2.2 59
2.3 Probability 61
Some Definitions 62
Determining the Probability of an Event 63
Properties of Probability 67
Exercises 2.3 70
2.4 Independent Events and Expected Number 72
Independent Events 72
Expected Number 74
Exercises 2.4 75
2.5 Disguising the Frequencies 76
Changing Letters to Numbers 77
The Vigenere Square 79
Enciphering a Message Using the Vigenere Square 79
Deciphering a Message Using the Vigenere Square 81
Decrypting a Message Using the Vigenere Square 82
The Friedman Test 86
Determining the Length of the Keyword 89
Exercises 2.5 97
2.6 Personalities 99
3 Polygraphic Substitution Ciphers 103
3.1 Elementary Polygraphic Substitution Ciphers 104
Exercises 3.1 108
3.2 Elementary Matrix Theory 108
Identities and Inverses 113
Linear Systems of Equations 116
Geometrical Transformations 118
Exercises 3.2 121
3.3 Hill's System 124
Enciphering and Deciphering a Message Using Hill's System 124
Cryptanalysis of a Message Enciphered Using Hill's System 128
Exercises 3.3 137
3.4 Personalities 138
4 Public Key Cryptography 141
4.1 More Number Theory 142
Exercises 4.1 150
4.2 The RSA Algorithm 150
Generation of Keys 151
Exchanging Messages 151
Frequently Asked Questions 154
Exercises 4.2 159
4.3 Two Examples 160
Exercises 4.3 170
4.4 Other Illustrations of Public Key Cryptography 171
Signature Authentication 171
Hybrid Systems 172
Use RSA to Transmit the Key 172
The Diffie-Hellman Key Exchange System 173
The Massey-Omura System 174
Exercises 4.4 177
4.5 Personalities 178
Appendix A ASCII Code 181
Appendix B Taxonomy of Cryptology 183
Appendix C Answers to Even-Numbered Problems 185
Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star


4 Star


3 Star


2 Star


1 Star


Your Rating:

Your Name: Create a Pen Name or

Barnes & Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation


  • - By submitting a review, you grant to Barnes & and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Terms of Use.
  • - Barnes & reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)