Decrypted Secrets: Methods and Maxims of Cryptology
Cryptology, for millennia a "secret science", is rapidly gaining in practical importance for the protection of communication channels, databases, and software. Beside its role in computerized information systems (public key systems), more and more applications inside computer systems and networks are appearing, which also extend to access rights and source file protection. The first part of this book treats secret codes and their uses - cryptography. The second part deals with the process of covertly decrypting a secret code - cryptanalysis - where in particular advice on assessing methods is given. The book presupposes only elementary mathematical knowledge. Spiced with a wealth of exciting, amusing, and sometimes personal stories from the history of cryptology, it will also interest general readers.
What people are saying - Write a review
We haven't found any reviews in the usual places.
Polygraphic Substitution and Coding
Families of Alphabets
Kappa and Chi
Alignment of Accompanying Alphabets
Linear Basis Analysis
Other editions - View all
according addition allows alphabet already American Army assume attack bigram block break British called changed characters cipher coincidence column communication complete compromise contains cryptanalysis crypto cryptography cryptology cryptosystem cryptotext cycle decryption determined device distance double encryption steps English ENIGMA example exhaustion fact French frequency function German given gives hand important indicator known language later length letters linear machine means method monoalphabetic needed obtained occur operation particular password pattern period permutation plaintext polyalphabetic position possible practical prime probable word reasons requires result rotor Second World secret Sect self-reciprocal sequence shifted shows signals simple solution space standard strip substitution success Table tion transposition turn values VIGENERE