E-Book, Englisch, 449 Seiten, eBook
Bauer Decrypted Secrets
1997
ISBN: 978-3-662-03452-1
Verlag: Springer
Format: PDF
Kopierschutz: 1 - PDF Watermark
Methods and Maxims of Cryptology
E-Book, Englisch, 449 Seiten, eBook
ISBN: 978-3-662-03452-1
Verlag: Springer
Format: PDF
Kopierschutz: 1 - PDF Watermark
The first part of this book treats secret codes and their uses - cryptography - before moving on to the process of covertly decrypting a secret code - cryptanalysis.
Spiced with a wealth of exciting, amusing, and occasionally personal stories from the history of cryptology, and presupposing only elementary mathematical knowledge, this book will also stimulate general readers.
Zielgruppe
Professional/practitioner
Autoren/Hrsg.
Weitere Infos & Material
1 Introductory Synopsis.- 2 Aims and Methods of Cryptography.- 3 Encryption Steps: Simple Substitution.- 4 Encryption Steps: Polygraphic Substitution and Coding.- 5 Encryption Steps: Linear Substitution.- 6 Encryption Steps: Transposition.- 7 Polyalphabetic Encryption: Families of Alphabets.- 8 Polyalphabetic Encryption: Keys.- 9 Composition of Classes of Methods.- 10 Open Encryption Key Systems.- 11 Encryption Security.- 12 Exhausting Combinatorial Complexity.- 13 Anatomy of Language: Patterns.- 14 Polyalphabetic Case: Probable Words.- 15 Anatomy of Language: Frequencies.- 16 Kappa and Chi.- 17 Periodicity Examination.- 18 Alignment of Accompanying Alphabets.- 19 Compromises.- 20 Linear Basis Analysis.- 21 Anagramming.- 22 Concluding Remarks.- Appendix: Axiomatic Information Theory.- Photo Credits.




