Find a copy online
Links to this item
Find a copy in the library
Finding libraries that hold this item...
Details
Genre/Form: | Electronic books |
---|---|
Additional Physical Format: | Print version: |
Material Type: | Document, Internet resource |
Document Type: | Internet Resource, Computer File |
All Authors / Contributors: |
Friedrich L Bauer |
ISBN: | 3642063837 9783642063831 3540245022 9783540245025 9783540481218 3540481214 |
OCLC Number: | 990533529 |
Language Note: | English. |
Notes: | 13 Anatomy of Language: Patterns |
Description: | 1 online resource (554 pages) |
Contents: | Part I: Cryptography-The People; 1 Introductory Synopsis; 1.1 Cryptography and Steganography; 1.2 Semagrams; 1.3 Open Code: Masking; 1.4 Cues; 1.5 Open Code: Veiling by Nulls; 1.6 Open Code: Veiling by Grilles; 1.7 Classification of Cryptographic Methods; 2 Aims and Methods of Cryptography; 2.1 The Nature of Cryptography; 2.2 Encryption; 2.3 Cryptosystems; 2.4 Polyphony; 2.5 Character Sets; 2.6 Keys; 3 Encryption Steps: Simple Substitution; 3.1 Case V (1) −−−≻ W (Unipartite Simple Substitutions); 3.2 Special Case V ≺−−−−≻ V (Permutations) 3.3 Case V (1) −−−≻W m (Multipartite Simple Substitutions)3.4 The General Case V (1) −−−≻ W (m) , Straddling; 4 Encryption Steps: Polygraphic Substitution and Coding; 4.1 Case V 2 −−−≻ W (m) (Digraphic Substitutions); 4.2 Special Cases of Playfair and Delastelle: Tomographic Methods; 4.3 Case V 3 −−−≻ W (m), V4 −−−≻W(m); 4.4 The General Case V (n) −−−≻ W (m) : Codes; 5 Encryption Steps: Linear Substitution; 5.1 Self-reciprocal Linear Substitutions; 5.2 Homogeneous Linear Substitutions; 5.3 Binary Linear Substitutions; 5.4 General Linear Substitutions; 5.5 Decomposed Linear Substitutions 5.6 Decimated Alphabets5.7 Linear Substitutions with Decimal and Binary Numbers; 6 Encryption Steps: Transposition; 6.1 Simplest Methods; 6.2 Columnar Transpositions; 6.3 Anagrams; 7 Polyalphabetic Encryption: Families of Alphabets; 7.1 Iterated Substitutions; 7.2 Cyclically Shifted and Rotated Alphabets; 7.3 Rotor Crypto Machines; 7.4 Shifted Standard Alphabets: Vigenère and Beaufort; 7.5 Unrelated Alphabets; 8 Polyalphabetic Encryption: Keys; 8.1 Early Methods with Periodic Keys; 8.2 'Double Key'; 8.3 Vernam Encryption; 8.4 Quasi-nonperiodic Keys 8.5 Machines that Generate Their Own Key Sequences8.6 Off-Line Forming of Key Sequences; 8.7 Nonperiodic Keys; 8.8 Individual, One-Time Keys; 8.9 Key Negotiation and Key Management; 9 Composition of Classes of Methods; 9.1 Group Property; 9.2 Superencryption; 9.3 Similarity of Encryption Methods; 9.4 Shannon's 'Pastry Dough Mixing'; 9.5 Confusion and Diffusion by Arithmetical Operations; 9.6 DES and IDEA; 10 Open Encryption Key Systems; 10.1 Symmetric and Asymmetric Encryption Methods; 10.2 One-Way Functions; 10.3 RSA Method; 10.4 Cryptanalytic Attack upon RSA 10.5 Secrecy Versus Authentication10.6 Security of Public Key Systems; 11 Encryption Security; 11.1 Cryptographic Faults; 11.2 Maxims of Cryptology; 11.3 Shannon's Yardsticks; 11.4 Cryptology and Human Rights; Part II: Cryptanalysis-The Machinery; 12 Exhausting Combinatorial Complexity; 12.1 Monoalphabetic Simple Encryptions; 12.2 Monoalphabetic Polygraphic Encryptions; 12.3 Polyalphabetic Encryptions; 12.4 General Remarks on Combinatorial Complexity; 12.5 Cryptanalysis by Exhaustion; 12.6 Unicity Distance; 12.7 Practical Execution of Exhaustion; 12.8 Mechanizing the Exhaustion |
More information: |
Abstract:
Reviews
Publisher Synopsis
"The best single book on cryptology today." -- Cryptologia (from a review of a previous edition)From the reviews of the fourth edition:"This comprehensive updated edition is divided into two sections. The first part of the book deals with The People and the second concentrates on The Machinery. ... This volume includes 191 Figures, 29 Tables and 16 Color Plates, plus an Appendix. ... Friedrich L. Bauer Professor Emeritus of Mathematics and Computer Science ... has written an outstanding book on cryptology that belongs in your personal library or as a gift for a friend. ... There are other fascinating sidelights to this excellent book." (The Cryptogram, Page 15, 2007)"By far the best single work on the subject." -- David Kahn"It contains a wealth of material on the history of classical cryptology, focusing especially on the first half of the 20th century. ... The book is so thorough that it could serve as a textbook for those who want to develop their skills in this area. ... this book is an excellent source for the history of codemaking and codebreaking in the early and mid-20th century." (Neal Koblitz, SIAM Review, Vol. 52 (4), 2010) Read more...

