Ihre E-Mail wurde erfolgreich gesendet. Bitte prüfen Sie Ihren Maileingang.

Leider ist ein Fehler beim E-Mail-Versand aufgetreten. Bitte versuchen Sie es erneut.

Vorgang fortführen?

Exportieren
Filter
Medientyp
Sprache
Region
Bibliothek
Erscheinungszeitraum
Zugriff
  • 1
    Online-Ressource
    Online-Ressource
    Berlin : Springer
    UID:
    gbv_744940117
    Umfang: Online-Ressource (XII, 471 p) , digital
    Ausgabe: Second, Revised and Extended Edition
    Ausgabe: Springer eBook Collection. Computer Science
    ISBN: 9783662040249
    Inhalt: Cryptology, for millennia a "secret science", is rapidly gaining in practical importance for the protection of communication channels, databases, and software. Beside its role in computerized information systems (public key systems), more and more applications within computer systems and networks are appearing, which also extend to access rights and source file protection. The first part of this book treats secret codes and their uses - cryptography. The second part deals with the process of covertly decrypting a secret code - cryptanalysis - where in particular advice on assessing methods is given. The book presupposes only elementary mathematical knowledge. Spiced with a wealth of exciting, amusing, and sometimes personal stories from the history of cryptology, it will also interest general readers.Decrypted Secrets has become a standard book on cryptology. The new edition has been revised and extended in many details, particularly on the ENIGMA and other rotor machines, on cipher teletype machines, codenamed FISH by the British, and on key negotiation."The best single book on cryptology today" (David Kahn, Cryptologia)"For those who work actively with cryptology this book is a must. For amateurs it is an important dictionary which in many cases will guide them to make their ciphers more secure." (Arne Fransén, International Intelligence History Study Group)
    Anmerkung: Part I. Cryptography: Introductory Synopsis -- Aims and Methods of Cryptography -- Encryption Steps: Simple Substitution -- Encryption Steps: Polygraphic Substitution and Coding -- Encryption Steps: Linear Substitution -- Encryption Steps: Transposition -- Polyalphabetic Encryption: Families of Alphabets -- Polyalphabetic Encryption: Keys -- Composition of Classes of Methods -- Open Encryption Key Systems -- Encryption Security -- Part II. Cryptanalysis: Exhausting Combinatorial Complexity -- Anatomy of Language: Patterns -- Polyalphabetic Case: Probable Words -- Anatomy of Language: Frequencies -- Kappa and Chi -- Periodicity Examination -- Alignment of Accompanying Alphabets -- Compromises -- Linear Basis Analysis -- Anagramming -- Concluding Remarks -- Appendix: Axiomatic Information Theory -- Bibliography -- Index -- Photo Credits.
    Weitere Ausg.: ISBN 9783662040263
    Weitere Ausg.: Erscheint auch als Druck-Ausgabe ISBN 9783662040263
    Weitere Ausg.: Erscheint auch als Druck-Ausgabe ISBN 9783662040256
    Weitere Ausg.: Erscheint auch als Druck-Ausgabe ISBN 9783540668718
    Sprache: Englisch
    URL: Volltext  (lizenzpflichtig)
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 2
    Online-Ressource
    Online-Ressource
    Berlin, Heidelberg :Springer Berlin Heidelberg :
    UID:
    almahu_9948621438302882
    Umfang: XII, 471 p. 136 illus., 17 illus. in color. , online resource.
    Ausgabe: 2nd ed. 2000.
    ISBN: 9783662040249
    Inhalt: Cryptology, for millennia a "secret science", is rapidly gaining in practical importance for the protection of communication channels, databases, and software. Beside its role in computerized information systems (public key systems), more and more applications within computer systems and networks are appearing, which also extend to access rights and source file protection. The first part of this book treats secret codes and their uses - cryptography. The second part deals with the process of covertly decrypting a secret code - cryptanalysis - where in particular advice on assessing methods is given. The book presupposes only elementary mathematical knowledge. Spiced with a wealth of exciting, amusing, and sometimes personal stories from the history of cryptology, it will also interest general readers. Decrypted Secrets has become a standard book on cryptology. The new edition has been revised and extended in many details, particularly on the ENIGMA and other rotor machines, on cipher teletype machines, codenamed FISH by the British, and on key negotiation. "The best single book on cryptology today" (David Kahn, Cryptologia) "For those who work actively with cryptology this book is a must. For amateurs it is an important dictionary which in many cases will guide them to make their ciphers more secure." (Arne Fransén, International Intelligence History Study Group).
    Anmerkung: I: Cryptography -- 1 Introductory Synopsis -- 2 Aims and Methods of Cryptography -- 3 Encryption Steps: Simple Substitution -- 4 Encryption Steps: Polygraphic Substitution and Coding -- 5 Encryption Steps: Linear Substitution -- 6 Encryption Steps: Transposition -- 7 Polyalphabetic Encryption: Families of Alphabets -- 8 Polyalphabetic Encryption: Keys -- 9 Composition of Classes of Methods -- 10 Open Encryption Key Systems -- 11 Encryption Security -- II: Cryptanalysis -- 12 Exhausting Combinatorial Complexity -- 13 Anatomy of Language: Patterns -- 14 Polyalphabetic Case: Probable Words -- 15 Anatomy of Language: Frequencies -- 16 Kappa and Chi -- 17 Periodicity Examination -- 18 Alignment of Accompanying Alphabets -- 19 Compromises -- 20 Linear Basis Analysis -- 21 Anagramming -- 22 Concluding Remarks -- Appendix: Axiomatic Information Theory -- Photo Credits.
    In: Springer Nature eBook
    Weitere Ausg.: Printed edition: ISBN 9783662040263
    Weitere Ausg.: Printed edition: ISBN 9783662040256
    Weitere Ausg.: Printed edition: ISBN 9783540668718
    Sprache: Englisch
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
Meinten Sie 9783662040294?
Meinten Sie 9783462040449?
Meinten Sie 9783462040289?
Schließen ⊗
Diese Webseite nutzt Cookies und das Analyse-Tool Matomo. Weitere Informationen finden Sie auf den KOBV Seiten zum Datenschutz