skip to content
Decrypted Secrets : Methods and Maxims of Cryptology. Preview this item
ClosePreview this item

Decrypted Secrets : Methods and Maxims of Cryptology.

Author: Friedrich L Bauer
Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg, 2007.
Edition/Format:   eBook : Document : English : Fourth, revised and Extended editionView all editions and formats
A reference work on cryptology offering technical and biographical details. This book reviews secret codes and their uses - the foundations of cryptography. It also deals with the process of covertly decrypting a secret code - cryptanalysis, and gives particular advice on assessing methods.

(not yet rated) 0 with reviews - Be the first.

More like this

Find a copy online

Links to this item

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...


Genre/Form: Electronic books
Additional Physical Format: Print version:
Material Type: Document, Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: Friedrich L Bauer
ISBN: 3642063837 9783642063831 3540245022 9783540245025 9783540481218 3540481214
OCLC Number: 990533529
Language Note: English.
Notes: 13 Anatomy of Language: Patterns
Description: 1 online resource (554 pages)
Contents: Part I: Cryptography-The People; 1 Introductory Synopsis; 1.1 Cryptography and Steganography; 1.2 Semagrams; 1.3 Open Code: Masking; 1.4 Cues; 1.5 Open Code: Veiling by Nulls; 1.6 Open Code: Veiling by Grilles; 1.7 Classification of Cryptographic Methods; 2 Aims and Methods of Cryptography; 2.1 The Nature of Cryptography; 2.2 Encryption; 2.3 Cryptosystems; 2.4 Polyphony; 2.5 Character Sets; 2.6 Keys; 3 Encryption Steps: Simple Substitution; 3.1 Case V (1) −−−≻ W (Unipartite Simple Substitutions); 3.2 Special Case V ≺−−−−≻ V (Permutations) 3.3 Case V (1) −−−≻W m (Multipartite Simple Substitutions)3.4 The General Case V (1) −−−≻ W (m) , Straddling; 4 Encryption Steps: Polygraphic Substitution and Coding; 4.1 Case V 2 −−−≻ W (m) (Digraphic Substitutions); 4.2 Special Cases of Playfair and Delastelle: Tomographic Methods; 4.3 Case V 3 −−−≻ W (m), V4 −−−≻W(m); 4.4 The General Case V (n) −−−≻ W (m) : Codes; 5 Encryption Steps: Linear Substitution; 5.1 Self-reciprocal Linear Substitutions; 5.2 Homogeneous Linear Substitutions; 5.3 Binary Linear Substitutions; 5.4 General Linear Substitutions; 5.5 Decomposed Linear Substitutions 5.6 Decimated Alphabets5.7 Linear Substitutions with Decimal and Binary Numbers; 6 Encryption Steps: Transposition; 6.1 Simplest Methods; 6.2 Columnar Transpositions; 6.3 Anagrams; 7 Polyalphabetic Encryption: Families of Alphabets; 7.1 Iterated Substitutions; 7.2 Cyclically Shifted and Rotated Alphabets; 7.3 Rotor Crypto Machines; 7.4 Shifted Standard Alphabets: Vigenère and Beaufort; 7.5 Unrelated Alphabets; 8 Polyalphabetic Encryption: Keys; 8.1 Early Methods with Periodic Keys; 8.2 'Double Key'; 8.3 Vernam Encryption; 8.4 Quasi-nonperiodic Keys 8.5 Machines that Generate Their Own Key Sequences8.6 Off-Line Forming of Key Sequences; 8.7 Nonperiodic Keys; 8.8 Individual, One-Time Keys; 8.9 Key Negotiation and Key Management; 9 Composition of Classes of Methods; 9.1 Group Property; 9.2 Superencryption; 9.3 Similarity of Encryption Methods; 9.4 Shannon's 'Pastry Dough Mixing'; 9.5 Confusion and Diffusion by Arithmetical Operations; 9.6 DES and IDEA; 10 Open Encryption Key Systems; 10.1 Symmetric and Asymmetric Encryption Methods; 10.2 One-Way Functions; 10.3 RSA Method; 10.4 Cryptanalytic Attack upon RSA 10.5 Secrecy Versus Authentication10.6 Security of Public Key Systems; 11 Encryption Security; 11.1 Cryptographic Faults; 11.2 Maxims of Cryptology; 11.3 Shannon's Yardsticks; 11.4 Cryptology and Human Rights; Part II: Cryptanalysis-The Machinery; 12 Exhausting Combinatorial Complexity; 12.1 Monoalphabetic Simple Encryptions; 12.2 Monoalphabetic Polygraphic Encryptions; 12.3 Polyalphabetic Encryptions; 12.4 General Remarks on Combinatorial Complexity; 12.5 Cryptanalysis by Exhaustion; 12.6 Unicity Distance; 12.7 Practical Execution of Exhaustion; 12.8 Mechanizing the Exhaustion
More information:


In today's extensively wired world, cryptology is vital for guarding communication channels, databases, and software from intruders.  Read more...


Editorial reviews

Publisher Synopsis

"The best single book on cryptology today." -- Cryptologia (from a review of a previous edition)From the reviews of the fourth edition:"This comprehensive updated edition is divided into two Read more...

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...


Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.