Decrypted Secrets Methods and Maxims of Cryptology /

Cryptology, for millennia a "secret science", is rapidly gaining in practical importance for the protection of communication channels, databases, and software. Beside its role in computerized information systems (public key systems), more and more applications within computer systems and n...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Κύριος συγγραφέας: Bauer, Friedrich L. (Συγγραφέας)
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Berlin, Heidelberg : Springer Berlin Heidelberg, 2007.
Έκδοση:Fourth, Revised and Extended Edition.
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
LEADER 03836nam a22005295i 4500
001 978-3-540-48121-8
003 DE-He213
005 20151204171914.0
007 cr nn 008mamaa
008 100301s2007 gw | s |||| 0|eng d
020 |a 9783540481218  |9 978-3-540-48121-8 
024 7 |a 10.1007/978-3-540-48121-8  |2 doi 
040 |d GrThAP 
050 4 |a QA76.9.A25 
072 7 |a URY  |2 bicssc 
072 7 |a COM053000  |2 bisacsh 
082 0 4 |a 005.82  |2 23 
100 1 |a Bauer, Friedrich L.  |e author. 
245 1 0 |a Decrypted Secrets  |h [electronic resource] :  |b Methods and Maxims of Cryptology /  |c by Friedrich L. Bauer. 
250 |a Fourth, Revised and Extended Edition. 
264 1 |a Berlin, Heidelberg :  |b Springer Berlin Heidelberg,  |c 2007. 
300 |a XIV, 525 p. 183 illus., 16 illus. in color.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
505 0 |a Cryptography—The People -- Introductory Synopsis -- Aims and Methods of Cryptography -- Encryption Steps: Simple Substitution -- Encryption Steps: Polygraphic Substitution and Coding -- Encryption Steps: Linear Substitution -- Encryption Steps: Transposition -- Polyalphabetic Encryption: Families of Alphabets -- Polyalphabetic Encryption: Keys -- Composition of Classes of Methods -- Open Encryption Key Systems -- Encryption Security -- Cryptanalysis—The Machinery -- Exhausting Combinatorial Complexity -- Anatomy of Language: Patterns -- Polyalphabetic Case: Probable Words -- Anatomy of Language: Frequencies -- Kappa and Chi -- Periodicity Examination -- Alignment of Accompanying Alphabets -- Compromises -- Linear Basis Analysis -- Anagramming -- Concluding Remarks. 
520 |a Cryptology, for millennia a "secret science", is rapidly gaining in practical importance for the protection of communication channels, databases, and software. Beside its role in computerized information systems (public key systems), more and more applications within computer systems and networks are appearing, which also extend to access rights and source file protection. The first part of this book treats secret codes and their uses - cryptography. The second part deals with the process of covertly decrypting a secret code - cryptanaly-sis - where in particular advice on assessing methods is given. The book presupposes only elementary mathematical knowledge. Spiced with a wealth of exciting, amusing, and sometimes personal stories from the history of cryptology, it will also interest general readers. "Decrypted Secrets" has become a standard book on cryptology. This 3rd edition has again been revised and extended in many technical and biographical details. "The best single book on cryptology today" (David Kahn, Cryptologia) "For those who work actively with cryptology this book is a must. For amateurs it is an important dictionary which in many cases will guide them to make their ciphers more secure." (Arne Fransen, International Intelligence History Study Group). 
650 0 |a Computer science. 
650 0 |a Data encryption (Computer science). 
650 0 |a Coding theory. 
650 0 |a Computers and civilization. 
650 0 |a Applied mathematics. 
650 0 |a Engineering mathematics. 
650 0 |a Number theory. 
650 1 4 |a Computer Science. 
650 2 4 |a Data Encryption. 
650 2 4 |a Coding and Information Theory. 
650 2 4 |a Number Theory. 
650 2 4 |a Computers and Society. 
650 2 4 |a Applications of Mathematics. 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer eBooks 
776 0 8 |i Printed edition:  |z 9783540245025 
856 4 0 |u http://dx.doi.org/10.1007/978-3-540-48121-8  |z Full Text via HEAL-Link 
912 |a ZDB-2-SCS 
950 |a Computer Science (Springer-11645)