|
|
|
|
LEADER |
05921nam a2200757 4500 |
001 |
ocn909367811 |
003 |
OCoLC |
005 |
20170124072531.8 |
006 |
m o d |
007 |
cr cnu|||unuuu |
008 |
150519s2015 nju o 000 0 eng d |
040 |
|
|
|a N$T
|b eng
|e rda
|e pn
|c N$T
|d N$T
|d IDEBK
|d YDXCP
|d DG1
|d E7B
|d EBLCP
|d IEEEE
|d COO
|d OCLCF
|d OCLCQ
|d OCL
|d DEBBG
|d GrThAP
|
066 |
|
|
|c (S
|
019 |
|
|
|a 913797103
|
020 |
|
|
|a 9781119061601
|q electronic bk.
|
020 |
|
|
|a 9781119061625
|q electronic bk.
|
020 |
|
|
|a 1119061628
|q electronic bk.
|
020 |
|
|
|a 1119061601
|q electronic bk.
|
020 |
|
|
|z 9780470465899
|
020 |
|
|
|a 0470465891
|
020 |
|
|
|a 9780470465899
|
029 |
1 |
|
|a NZ1
|b 16092903
|
029 |
1 |
|
|a DEBBG
|b BV043397808
|
035 |
|
|
|a (OCoLC)909367811
|z (OCoLC)913797103
|
043 |
|
|
|a e-uk---
|
050 |
|
4 |
|a D810.C88
|
072 |
|
7 |
|a HIS
|x 010020
|2 bisacsh
|
082 |
0 |
4 |
|a 940.54/86
|2 23
|
049 |
|
|
|a MAIN
|
245 |
0 |
0 |
|a Breaking teleprinter ciphers at Bletchley Park :
|b an edition of I.J. Good, D. Michie and G. Timms: General report on Tunny with emphasis on statistical methods (1945) /
|c edited and with introductions and notes by James A. Reeds, Whitfield Diffie and J.V. Field.
|
264 |
|
1 |
|a [Piscataway, NJ] :
|b IEEE Press ;
|a Hoboken, New Jersey :
|b Wiley,
|c [2015]
|
300 |
|
|
|a 1 online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
588 |
0 |
|
|a Vendor-supplied metadata.
|
505 |
0 |
|
|a BREAKING TELEPRINTER CIPHERS AT BLETCHLEY PARK; Contents; Preface; Editorial Notes; Notes on Vocabulary; List of Abbreviations; Cryptanalytic Significance of the Analysis of Tunny, by Whitfield Diffie; Editors' Introduction, by Whitfield Diffie and J. V. Field; Statistics at Bletchley Park, by S. L. Zabell; Biographies of Authors; Notes on the Editors of the Present Volume; List of Figures; General Report on Tunny, with emphasis on statistical methods; 01 Preface; Part 1: Introduction; Chapter 11: German Tunny; 11A: Fish machines; 11B: The Tunny cipher machine; 11C: Wheel patterns
|
505 |
8 |
|
|a 11D: How Tunny is used11E: The Tunny network; Chapter 12: Cryptographic Aspects; 12A: The problem; 12B: Modern strategy; 12C: Chi breaking and setting: Solution of Z = X+D; 12D: Motor and psi breaking and setting: Solution of D = P+; 12E: Methods involving key: Solution of Z = K+P, and K = X+; Chapter 13: Machines; 13A: Explanation of the categories; 13B: Counting and stepping machines; 13C: Copying machines; 13D: Miscellaneous simple machines; Chapter 14: Organisation; 14A: Expansion and growth; 14B: The two sections in 1945; 14C: Circulation; Chapter 15: Some Historical Notes
|
505 |
8 |
|
|a 15A: First stages in machine development15B: Early organisation and difficulties; 15C: Period of expansion; Chapter 21: Some Probability Techniques; Chapter 22: Statistical Foundations; 22A: Introductory; 22B: The chi-stream; 22C: The motor stream; 22D: The psi stream; 22E: The sum of two streams; 22F: The key stream; 22G: The plain language stream; 22H: The de-chi stream; 22J: The cipher stream; 22K: Sampling errors in alphabetical counts; 22W: Some further streams; 22X: The algebra of proportional bulges; 22Y: The amount of evidence derived from a letter count; Chapter 23: Machine Setting
|
505 |
8 |
|
|a 24E: Rectangle significance tests24F: Conditional rectangle; 24G: Some generalized rectangles; 24W: Theory of convergence; 24X: Significance tests; 24Y: Other theory of rectangles; Chapter 25: Chi-Breaking from Cipher; 25A: The short wheel-breaking run; 25B: Weighing the evidence; 25C: General plan of wheel-breaking; 25D: Particular methods; 25E: Special methods for 2 limitation; 25F: Special method for ab 1/2; 25G: Wheel-breaking exhibits; 25W: Derivation of formulae for the weighing of evidence; 25X: The number of legal wheels; 25Y: Proportional bulges relating to X2
|
520 |
|
|
|a This book is an edition of the General Report on Tunny with commentary that clarifies the often difficult language of the GRT and fitting it into a variety of contexts arising out of several separate but intersecting story lines, some only implicit in the GRT. Explores the likely roots of the ideas entering into the Tunny cryptanalysis. Includes examples of original worksheets, and printouts of the Tunny-breaking process in action. Presents additional commentary, biographies, glossaries, essays, and bibliographies.
|
504 |
|
|
|a Includes bibliographical references and index.
|
611 |
2 |
7 |
|a World War (1939-1945)
|2 fast
|0 (OCoLC)fst01180924
|
650 |
|
0 |
|a Cryptography
|z Great Britain
|x History
|y 20th century.
|
650 |
|
0 |
|a World War, 1939-1945
|x Electronic intelligence
|z Great Britain.
|
650 |
|
7 |
|a HISTORY / Europe / Western
|2 bisacsh
|
650 |
|
4 |
|a Cryptography -- Germany -- History.
|
650 |
|
4 |
|a Cryptography -- Great Britain -- History.
|
650 |
|
4 |
|a Lorenz cipher system.
|
650 |
|
4 |
|a World War, 1939-1945 -- Cryptography.
|
650 |
|
4 |
|a World War, 1939-1945 -- Electronic intelligence -- Great Britain.
|
650 |
|
7 |
|a Cryptography.
|2 fast
|0 (OCoLC)fst00884552
|
650 |
|
7 |
|a Electronic intelligence.
|2 fast
|0 (OCoLC)fst00907316
|
651 |
|
0 |
|a Bletchley Park (Milton Keynes, England)
|x History
|y 20th century.
|
651 |
|
7 |
|a England
|z Milton Keynes
|z Bletchley Park.
|2 fast
|0 (OCoLC)fst01711859
|
651 |
|
7 |
|a Great Britain.
|2 fast
|0 (OCoLC)fst01204623
|
648 |
|
7 |
|a 1900-1999
|2 fast
|
655 |
|
4 |
|a Electronic books.
|
655 |
|
0 |
|a Electronic books.
|
655 |
|
7 |
|a History.
|2 fast
|0 (OCoLC)fst01411628
|
700 |
1 |
|
|a Reeds, James A.,
|e editor.
|
700 |
1 |
|
|a Diffie, Whitfield,
|e editor.
|
700 |
1 |
|
|a Field, J. V.,
|e editor.
|
776 |
0 |
8 |
|i Print version:
|a Reeds, James A.
|t Breaking Teleprinter Ciphers at Bletchley Park: An edition of I.J. Good, D. Michie and G. Timms
|d Hoboken : Wiley,c2015
|z 9780470465899
|
856 |
4 |
0 |
|u https://doi.org/10.1002/9781119061601
|z Full Text via HEAL-Link
|
994 |
|
|
|a 92
|b DG1
|