Decrypted Secrets: Methods and Maxims of Cryptology

Front Cover
Springer Science & Business Media, Mar 9, 2013 - Computers - 449 pages
Cryptology, for millennia a "secret science", is rapidly gaining in practical importance for the protection of communication channels, databases, and software. Beside its role in computerized information systems (public key systems), more and more applications inside computer systems and networks are appearing, which also extend to access rights and source file protection. The first part of this book treats secret codes and their uses - cryptography. The second part deals with the process of covertly decrypting a secret code - cryptanalysis - where in particular advice on assessing methods is given. The book presupposes only elementary mathematical knowledge. Spiced with a wealth of exciting, amusing, and sometimes personal stories from the history of cryptology, it will also interest general readers.
 

What people are saying - Write a review

We haven't found any reviews in the usual places.

Contents

Cryptography
1
Cues
16
Polyphony
35
Polygraphic Substitution and Coding
56
Linear Substitution
77
Transposition
90
Families of Alphabets
100
Keys
122
Patterns
223
Probable Words
239
Frequencies
258
Kappa and Chi
288
Periodicity Examination
298
Alignment of Accompanying Alphabets
317
Compromises
342
Linear Basis Analysis
394

Composition of Classes of Methods
147
Open Encryption Key Systems
170
Encryption Security
186
Cryptanalysis 205
205
Axiomatic Information Theory
418
Index
431
Photo Credits
448
Copyright

Other editions - View all

Common terms and phrases

Bibliographic information