## Codes: The Guide to Secrecy From Ancient to Modern TimesFrom the Rosetta Stone to public-key cryptography, the art and science of cryptology has been used to unlock the vivid history of ancient cultures, to turn the tide of warfare, and to thwart potential hackers from attacking computer systems. Codes: The Guide to Secrecy from Ancient to Modern Times explores the depth and breadth of the field, remaining accessible to the uninitiated while retaining enough rigor for the seasoned cryptologist. The book begins by tracing the development of cryptology from that of an arcane practice used, for example, to conceal alchemic recipes, to the modern scientific method that is studied and employed today. The remainder of the book explores the modern aspects and applications of cryptography, covering symmetric- and public-key cryptography, cryptographic protocols, key management, message authentication, e-mail and Internet security, and advanced applications such as wireless security, smart cards, biometrics, and quantum cryptography. The author also includes non-cryptographic security issues and a chapter devoted to information theory and coding. Nearly 200 diagrams, examples, figures, and tables along with abundant references and exercises complement the discussion. Written by leading authority and best-selling author on the subject Richard A. Mollin, Codes: The Guide to Secrecy from Ancient to Modern Times is the essential reference for anyone interested in this exciting and fascinating field, from novice to veteran practitioner. |

### What people are saying - Write a review

We haven't found any reviews in the usual places.

### Contents

1 | |

From SixteenthCentury Cryptography to the New Millennium The Last 500 Years | 59 |

SymmetricKey Cryptography | 107 |

PublicKey Cryptography | 161 |

Cryptographic Protocols | 191 |

Key Management | 233 |

Message Authentication | 251 |

Electronic Mail and Internet Security | 271 |

Mathematical Facts | 466 |

Pseudorandom Number Generation | 506 |

Factoring Large Integers | 509 |

Technical and Advanced Details | 527 |

Probability Theory | 543 |

Recognizing Primes | 550 |

Exercises | 561 |

Bibliography | 605 |

Applications and the Future | 329 |

Noncryptographic Security Issues | 375 |

Information Theory and Coding | 425 |

List of Symbols | 627 |

Index | 629 |

### Other editions - View all

Codes: The Guide to Secrecy From Ancient to Modern Times Richard A. Mollin No preview available - 2005 |

### Common terms and phrases

algorithm Alice and Bob Alice’s attack authentication binary bitlength bits bitstring block cipher Bob’s bytes Caesar cipher called certificate ciphertext codeword cookie cryptanalysis cryptographic cryptology cryptosystem deciphering decryption defined denoted Diagram Diffie-Hellman digital signature discussed disk e-mail employed enciphering encoding encryption ensure entities entropy example Exercises factor firewall given hacker hash function Hence host input instance integer Internet IPSec key exchange key pair keystream layer letter linear Mallory matrix means mechanism method mode modulo Moreover notion output packet password permutation plaintext polynomial prime private key problem protocol public key random reader Rijndael round S-boxes S-DES S/MIME scheme secret key Section sends server session key smart card standard step stream cipher symbols Theorem Trent vector verify virus words

### Popular passages

Page 47 - Oh, East is East, and West is West, and never the twain shall meet. Till Earth and Sky stand presently at God's great Judgment Seat; But there is neither East nor West, Border, nor Breed, nor Birth, When two strong men stand face to face, though they come from the ends of the earth!

Page 59 - But the age of chivalry is gone. That of sophisters, economists, and calculators, has succeeded ; and the glory of Europe is extinguished for ever.

Page 294 - Knowledge is of two kinds. We know a subject ourselves, or we know where we can find information upon it.

Page 260 - I have learned that success is to be measured not so much by the position that one has reached in life as by the obstacles which he has overcome while trying to succeed.

Page 180 - I am not yet so lost in lexicography as to forget that words are the daughters of earth, and that things are the sons of heaven. Language is only the instrument of science, and words are but the signs of ideas...

Page 159 - Then we shall all, philosophers, scientists, and just ordinary people, be able to take part in the discussion of the question of why it is that we and the universe exist. If we find the answer to that, it would be the ultimate triumph of human reason - for then we would know the mind of God...

Page 435 - Where is the Life we have lost in living? Where is the wisdom we have lost in knowledge? Where is the knowledge we have lost in information?

Page 237 - WHO says that fictions only and false hair Become a verse.? Is there in truth no beauty ? Is all good structure in a winding stair? May no lines pass, except they do their duty Not to a true, but painted chair ? Is it no verse, except enchanted groves...

Page 133 - In architecture, as in all other operative arts, the end must direct the operation. The end is to build well. Well building hath three conditions: commodity, firmness, and delight.

Page 78 - I know that it will be said by many, that I might have been more pleasing to the reader, if I had written the story of mine own times, having been permitted to draw water as near the well-head as another. To this I answer, that whosoever in writing a modern history, shall follow truth too near the heels, it may haply strike out his teeth.