UID:
almafu_9959240407002883
Format:
1 online resource (x, 240 pages) :
,
digital, PDF file(s).
Edition:
1st ed.
ISBN:
1-107-12517-0
,
1-283-33148-9
,
9786613331489
,
1-139-13407-8
,
1-139-13037-4
,
0-511-04218-3
,
0-511-15561-1
,
0-511-54297-6
,
0-511-04504-2
Content:
The design of code and cipher systems has undergone major changes in modern times. Powerful personal computers have resulted in an explosion of e-banking, e-commerce and e-mail, and as a consequence the encryption of communications to ensure security has become a matter of public interest and importance. This book describes and analyses many cipher systems ranging from the earliest and elementary to the more recent and sophisticated, such as RSA and DES, as well as wartime machines such as the ENIGMA and Hagelin, and ciphers used by spies. Security issues and possible methods of attack are discussed and illustrated by examples. The design of many systems involves advanced mathematical concepts and this is explained in detail in a major appendix. This book will appeal to anyone interested in codes and ciphers as used by private individuals, spies, governments and industry throughout history.
Note:
Title from publisher's bibliographic system (viewed on 05 Oct 2015).
,
Introduction --
,
From Julius Caesar to simple substitution --
,
Polyalphabetic systems --
,
Jigsaw ciphers --
,
Two-letter ciphers --
,
Codes --
,
Ciphers for spies --
,
Producing random numbers and letters --
,
The Enigma cipher machine --
,
The Hagelin cipher machine --
,
Beyond the Enigma --
,
Public key cryptography --
,
Encipherment and the internet.
,
English
Additional Edition:
ISBN 0-521-00890-5
Additional Edition:
ISBN 0-521-81054-X
Language:
English
URL:
https://doi.org/10.1017/CBO9780511542978
Bookmarklink