Catalog

Record Details

Catalog Search


Back To Results
Showing Item 1 of 1

Secret history : the story of cryptology  Cover Image Book Book

Secret history : the story of cryptology

Bauer, Craig P. (Author).

Summary: "Codes are a part of everyday life, from the ubiquitous Universal Price Code (UPC) to postal zip codes. They need not be intended for secrecy. They generally use groups of letters (sometimes pronounceable code words) or numbers to represent other words or phrases. There is typically no mathematical rule to pair an item with its representation in code. A few more examples will serve to illustrate the range of codes"--

Record details

  • ISBN: 9781466561861 (hardback)
  • ISBN: 1466561866 (hardback)
  • Physical Description: print
    xxv, 594 pages : illustrations ; 24 cm.
  • Publisher: Boca Raton : CRC Press, Taylor & Francis Group, [2013]

Content descriptions

Bibliography, etc. Note: Includes bibliographical references and index.
Formatted Contents Note: Ancient Roots -- Monalphabetic Substitution Ciphers, or MASCs: Disguises for Messages -- Simple progression to an unbreakable cipher -- Transposition Ciphers -- Shakespeare, Jefferson, and JFK -- World War I and Herbert O. Yardley -- Matrix Encryption -- World War II: The Enigma of Germany -- Cryptologic War against Japan -- Claude Shannon -- National Security Agency -- Data Encryption Standard -- Birth of Public Key Cryptography -- Attacking RSA -- Primality Testing and Complexity Theory -- Authenticity -- Pretty Good Privacy -- Stream Ciphers -- Suite B All-Stars -- Possible Futures.
Subject: Data encryption (Computer science)
Computer security
Cryptography History
Ciphers

Available copies

  • 1 of 1 copy available at Kirtland Community College.

Holds

  • 0 current holds with 1 total copy.
Show Only Available Copies
Location Call Number / Copy Notes Barcode Shelving Location Status Due Date
Kirtland Community College Library QA 76.9 .A25 B384 2013 30775305471808 General Collection Available -

Syndetic Solutions - Summary for ISBN Number 9781466561861
Secret History : The Story of Cryptology
Secret History : The Story of Cryptology
by Bauer, Craig P.
Rate this title:
vote data
Click an element below to view details:

Summary

Secret History : The Story of Cryptology


Winner of an Outstanding Academic Title Award from CHOICE Magazine Most available cryptology books primarily focus on either mathematics or history. Breaking this mold, Secret History: The Story of Cryptologygives a thorough yet accessible treatment of both the mathematics and history of cryptology. Requiring minimal mathematical prerequisites, the book presents the mathematics in sufficient detail and weaves the history throughout the chapters. In addition to the fascinating historical and political sides of cryptology, the author--a former Scholar-in-Residence at the U.S. National Security Agency (NSA) Center for Cryptologic History--includes interesting instances of codes and ciphers in crime, literature, music, and art. Following a mainly chronological development of concepts, the book focuses on classical cryptology in the first part. It covers Greek and Viking cryptography, the Vigenère cipher, the one-time pad, transposition ciphers, Jefferson's cipher wheel, the Playfair cipher, ADFGX, matrix encryption, World War II cipher systems (including a detailed examination of Enigma), and many other classical methods introduced before World War II. The second part of the book examines modern cryptology. The author looks at the work of Claude Shannon and the origin and current status of the NSA, including some of its Suite B algorithms such as elliptic curve cryptography and the Advanced Encryption Standard. He also details the controversy that surrounded the Data Encryption Standard and the early years of public key cryptography. The book not only provides the how-to of the Diffie-Hellman key exchange and RSA algorithm, but also covers many attacks on the latter. Additionally, it discusses Elgamal, digital signatures, PGP, and stream ciphers and explores future directions such as quantum cryptography and DNA computing. With numerous real-world examples and extensive references, this book skillfully balances the historical aspects of cryptology with its mathematical details. It provides readers with a sound foundation in this dynamic field. Please visit Dr. Bauer's website, which provides access to exercise sets: http://depts.ycp.edu/~cbauer/ and Viking cryptography, the Vigenère cipher, the one-time pad, transposition ciphers, Jefferson's cipher wheel, the Playfair cipher, ADFGX, matrix encryption, World War II cipher systems (including a detailed examination of Enigma), and many other classical methods introduced before World War II. The second part of the book examines modern cryptology. The author looks at the work of Claude Shannon and the origin and current status of the NSA, including some of its Suite B algorithms such as elliptic curve cryptography and the Advanced Encryption Standard. He also details the controversy that surrounded the Data Encryption Standard and the early years of public key cryptography. The book not only provides the how-to of the Diffie-Hellman key exchange and RSA algorithm, but also covers many attacks on the latter. Additionally, it discusses Elgamal, digital signatures, PGP, and stream ciphers and explores future directions such as quantum cryptography and DNA computing. With numerous real-world examples and extensive references, this book skillfully balances the historical aspects of cryptology with its mathematical details. It provides readers with a sound foundation in this dynamic field. Please visit Dr. Bauer's website, which provides access to exercise sets: http://depts.ycp.edu/~cbauer/ g. With numerous real-world examples and extensive references, this book skillfully balances the historical aspects of cryptology with its mathematical details. It provides readers with a sound foundation in this dynamic field. Please visit Dr. Bauer's website, which provides access to exercise sets: http://depts.ycp.edu/~cbauer/
Back To Results
Showing Item 1 of 1

Additional Resources