Secret History: The Story of CryptologyWinner of an Outstanding Academic Title Award from CHOICE MagazineMost available cryptology books primarily focus on either mathematics or history. Breaking this mold, Secret History: The Story of Cryptology gives a thorough yet accessible treatment of both the mathematics and history of cryptology. Requiring minimal mathematical prerequisites, the |
Contents
Chapter 1 Ancient Roots | 3 |
Disguises for Messages | 11 |
Chapter 3 Simple Progression to an Unbreakable Cipher | 69 |
Chapter 4 Transposition Ciphers | 119 |
Chapter 5 Shakespeare Jefferson and JFK | 145 |
Chapter 6 World War I and Herbert O Yardley | 185 |
Chapter 7 Matrix Encryption | 227 |
The Enigma of Germany | 245 |
Chapter 12 Data Encryption Standard | 369 |
Chapter 13 Birth of Public Key Cryptography | 403 |
Chapter 14 Attacking RSA | 427 |
Chapter 15 Primality Testing and Complexity Theory | 459 |
Chapter 16 Authenticity | 489 |
Chapter 17 Pretty Good Privacy | 503 |
Chapter 18 Stream Ciphers | 519 |
Chapter 19 Suite B AllStars | 533 |
Chapter 9 Cryptologic War against Japan | 293 |
Chapter 10 Claude Shannon | 329 |
Chapter 11 National Security Agency | 341 |
Chapter 20 Possible Futures | 559 |
Back Cover | 575 |
Other editions - View all
Common terms and phrases
Adleman Advances in Cryptology algorithm Alice alphabet American attack bits block Brassard Center for Cryptologic chapter ciphertext ciphertext letters Codebreakers column Computer Science cryptanalysis Crypto Cryptologic History Cryptology cryptosystem cycle Data Encryption Standard deciphering Digital elliptic curve enciphered encipherment Enigma example factor FIGURE frequency Friedman German hash Hellman Ibid IEEE integer Japanese Kahn keyspace Koblitz Lecture Notes look machine Mathematical mathematicians matrix encryption modulo National Cryptologic Museum National Security Agency Navajo Code Talkers Notes in Computer one-time pad pair paper permutation plaintext Playfair cipher plugboard polynomial position possible prime Privacy problem public key quantum cryptography random rotor rows running key cipher S-boxes secret session key Shannon solution Springer substitution cipher Theory tion transposition transposition ciphers Turing values Vigenère cipher words World XF DF Yardley York Zimmermann


