Decrypted Secrets: Methods and Maxims of CryptologySpringer, 2000 - 470 стор. Cryptology, for millennia a "secret science," is rapidly gaining in practical importance for the protection of communication channels, databases, & software. Beside its role in computerized information systems (public key systems), more & more applications within computer systems & networks are appearing, which also extend to access rights & source file protection. The first part of this book treats secret codes & their uses - cryptography. The second part deals with the process of covertly decrypting a secret code - cryptanalysis - where in particular advice on assessing methods is given. The book presupposes only elementary mathematical knowledge. Spiced with a wealth of exciting, amusing, & sometimes personal stories from the history of cryptology, it will also interest general readers. Decrypted Secrets has become a standard book on cryptology. The new edition has been revised & extended in many details. |
Зміст
Cryptography | 1 |
Aims and Methods of Cryptography | 25 |
3 | 41 |
Авторські права | |
19 інших розділів не відображаються
Інші видання - Показати все
Decrypted Secrets: Methods and Maxims of Cryptology Friedrich L. Bauer Обмежений попередній перегляд - 2013 |
Загальні терміни та фрази
3-rotor Alberti algorithm attack Bazeries BEAUFORT bigram binary Bletchley Park British CAESAR addition cipher machine codegroups column columnar transposition compromise cryptanalysis crypto cryptographic cryptology cryptosystem cryptotext cryptotext characters cycle cyclic decryption diplomatic disk enciphering encryption method encryption steps ENIGMA example Eyraud fixpoints French frequency Friedman German Hagelin homophones Japanese Kahn Kappa Kerckhoffs keytext Kriegsmarine language length letters linear substitution matrix mixed alphabet modulo password patent pattern period permutation plaintext plugboard polyalphabetic encryption polygraphic Porta position primary alphabet prime probable word rotor machines Second World secret Sect self-reciprocal sequence Shannon shifted shows SIGABA signals simple substitution standard alphabet steganographic strip superencryption Table tabula recta Theorem tion trigrams U.S. Army unauthorized decryptor unicity distance v w x y z VERNAM VIGENÈRE encryption Wehrmacht Wehrmacht ENIGMA width Ꭱ Ꭱ Ꭱ Ꮓ Ꮓ Ꮓ
Посилання на книгу
Introduction to Cryptography: Principles and Applications Hans Delfs,Helmut Knebl Обмежений попередній перегляд - 2007 |
Data Hiding Fundamentals and Applications: Content Security in Digital ... Husrev T. Sencar,Mahalingam Ramkumar,Ali N. Akansu Обмежений попередній перегляд - 2004 |