## Codes: The Guide to Secrecy From Ancient to Modern Times (Google eBook)From the Rosetta Stone to public-key cryptography, the art and science of cryptology has been used to unlock the vivid history of ancient cultures, to turn the tide of warfare, and to thwart potential hackers from attacking computer systems. Codes: The Guide to Secrecy from Ancient to Modern Times explores the depth and breadth of the field, remaining accessible to the uninitiated while retaining enough rigor for the seasoned cryptologist. The book begins by tracing the development of cryptology from that of an arcane practice used, for example, to conceal alchemic recipes, to the modern scientific method that is studied and employed today. The remainder of the book explores the modern aspects and applications of cryptography, covering symmetric- and public-key cryptography, cryptographic protocols, key management, message authentication, e-mail and Internet security, and advanced applications such as wireless security, smart cards, biometrics, and quantum cryptography. The author also includes non-cryptographic security issues and a chapter devoted to information theory and coding. Nearly 200 diagrams, examples, figures, and tables along with abundant references and exercises complement the discussion. Written by leading authority and best-selling author on the subject Richard A. Mollin, Codes: The Guide to Secrecy from Ancient to Modern Times is the essential reference for anyone interested in this exciting and fascinating field, from novice to veteran practitioner. |

### What people are saying - Write a review

We haven't found any reviews in the usual places.

### Common terms and phrases

algorithm Alice and Bob Alice’s attack authentication binary bits bitstring block cipher Bob’s Caesar cipher called certiﬁcate ciphertext Cited Clipper Chip codeword conﬁdentiality cryptanalysis cryptographic cryptology cryptosystem deciphering decryption deﬁned Deﬁnition denoted Diagram diﬀerent Diﬃe-Hellman digital signature discussed e-mail eﬀective eﬃcient employed enciphering encoding encryption example F G H factor ﬁeld ﬁle ﬁnd ﬁnding ﬁnite ﬁrewall ﬁrst ﬁve ﬁxed given hacker hash function Hence host identiﬁer input instance integer Internet IPSec key pair keystream layer letter linear Mallory matrix means method mode modulo Moreover output packet password permutation plaintext polynomial prime private key protocol public key random reader Rijndael round S-boxes S-DES S/MIME scheme secret key Section sends server session key smart card speciﬁc step stream cipher symbols Theorem traﬃc Trent vector veriﬁcation virus words