"The best single book on cryptology today." -- Cryptologia (from a review of a previous edition)

From the reviews of the fourth edition:

"This comprehensive updated edition is divided into two sections. The first part of the book deals with The People and the second concentrates on The Machinery. … This volume includes 191 Figures, 29 Tables and 16 Color Plates, plus an Appendix. … Friedrich L. Bauer Professor Emeritus of Mathematics and Computer Science … has written an outstanding book on cryptology that belongs in your personal library or as a gift for a friend. … There are other fascinating sidelights to this excellent book." (The Cryptogram, Page 15, 2007)

"By far the best single work on the subject." -- David Kahn

“It contains a wealth of material on the history of classical cryptology, focusing especially on the first half of the 20th century. … The book is so thorough that it could serve as a textbook for those who want to develop their skills in this area. … this book is an excellent source for the history of codemaking and codebreaking in the early and mid-20th century.” (Neal Koblitz, SIAM Review, Vol. 52 (4), 2010)

Cryptology, for millennia a "secret science", is rapidly gaining in practical importance for the protection of communication channels, databases, and software. Beside its role in computerized information systems (public key systems), more and more applications within computer systems and networks are appearing, which also extend to access rights and source file protection. The first part of this book treats secret codes and their uses - cryptography. The second part deals with the process of covertly decrypting a secret code - cryptanalysis - where in particular advice on assessing methods is given. The book presupposes only elementary mathematical knowledge. Spiced with a wealth of exciting, amusing, and sometimes personal stories from the history of cryptology, it will also interest general readers. Decrypted Secrets has become a standard book on cryptology. This 4th edition has again been revised and extended in many technical and biographical details.
Les mer
Cryptology, for millennia a "secret science", is rapidly gaining in practical importance for the protection of communication channels, databases, and software. The second part deals with the process of covertly decrypting a secret code - cryptanalysis - where in particular advice on assessing methods is given.
Les mer
Cryptography—The People.- Introductory Synopsis.- Aims and Methods of Cryptography.- Encryption Steps: Simple Substitution.- Encryption Steps: Polygraphic Substitution and Coding.- Encryption Steps: Linear Substitution.- Encryption Steps: Transposition.- Polyalphabetic Encryption: Families of Alphabets.- Polyalphabetic Encryption: Keys.- Composition of Classes of Methods.- Open Encryption Key Systems.- Encryption Security.- Cryptanalysis—The Machinery.- Exhausting Combinatorial Complexity.- Anatomy of Language: Patterns.- Polyalphabetic Case: Probable Words.- Anatomy of Language: Frequencies.- Kappa and Chi.- Periodicity Examination.- Alignment of Accompanying Alphabets.- Compromises.- Linear Basis Analysis.- Anagramming.- Concluding Remarks.
Les mer
Cryptology, for millennia a "secret science", is rapidly gaining in practical importance for the protection of communication channels, databases, and software. Beside its role in computerized information systems (public key systems), more and more applications within computer systems and networks are appearing, which also extend to access rights and source file protection.The first part of this book treats secret codes and their uses - cryptography. The second part deals with the process of covertly decrypting a secret code - cryptanaly-sis - where in particular advice on assessing methods is given. The book presupposes only elementary mathematical knowledge. Spiced with a wealth of exciting, amusing, and sometimes personal stories from the history of cryptology, it will also interest general readers."Decrypted Secrets" has become a standard book on cryptology. This 3rd edition has again been revised and extended in many technical and biographical details. "The best single book on cryptology today" (David Kahn, Cryptologia)"For those who work actively with cryptology this book is a must. For amateurs it is an important dictionary which in many cases will guide them to make their ciphers more secure." (Arne Fransen, International Intelligence History Study Group)
Les mer
4th edition
Reveals secrets and tells stories that will interest the general reader as well as the professional cryptologist The best single book on cryptology today" David Kahn, Cryptologia) Includes supplementary material: sn.pub/extras
Les mer
GPSR Compliance The European Union's (EU) General Product Safety Regulation (GPSR) is a set of rules that requires consumer products to be safe and our obligations to ensure this. If you have any concerns about our products you can contact us on ProductSafety@springernature.com. In case Publisher is established outside the EU, the EU authorized representative is: Springer Nature Customer Service Center GmbH Europaplatz 3 69115 Heidelberg, Germany ProductSafety@springernature.com
Les mer

Produktdetaljer

ISBN
9783642063831
Publisert
2010-02-12
Utgave
4. utgave
Utgiver
Vendor
Springer-Verlag Berlin and Heidelberg GmbH & Co. K
Høyde
235 mm
Bredde
155 mm
Aldersnivå
Professional/practitioner, P, 06
Språk
Product language
Engelsk
Format
Product format
Heftet

Forfatter