Codes and ciphers : Julius Caesar, the Enigma, and the internet / R.F. Churchhouse.

By: Churchhouse, R. F
Material type: TextTextPublisher: Cambridge ; New York : Cambridge University Press, 2002Description: 1 online resource (x, 240 pages) : illustrationsContent type: text Media type: computer Carrier type: online resourceISBN: 0511042183; 9780511042188; 0511155611; 9780511155611; 9780521810548; 052181054X; 9780521008907; 0521008905; 9780511542978; 0511542976; 1283331489; 9781283331487; 1107125170; 9781107125179; 9786613331489; 6613331481; 1139134078; 9781139134071; 1139130374; 9781139130370; 0511045042; 9780511045042Subject(s): Cryptography | Ciphers | Cryptographie | Chiffres (Cryptographie) | BUSINESS & ECONOMICS -- Business Writing | Ciphers | Cryptography | Biblioteksvæsen, informations- og kommunikationsvidenskab Biblioteksvæsen, informations- og kommunikationsvidenskabGenre/Form: Electronic books. | Electronic books. Additional physical formats: Print version:: Codes and ciphers.DDC classification: 652/.8 LOC classification: Z103 | .C48 2002ebOnline resources: Click here to access online
Contents:
Introduction -- From Julius Caesar to simple substitution -- Polyalphabetic systems -- Jigsaw ciphers -- Two-letter ciphers -- Codes -- Ciphers for spies -- Producing random numbers and letters -- The Enigma cipher machine -- The Hagelin cipher machine -- Beyond the Enigma -- Public key cryptography -- Encipherment and the internet.
Summary: The design of code and cipher systems has undergone major changes in modern times. Powerful personal computers have resulted in an explosion of e-banking, e-commerce and e-mail, and as a consequence the encryption of communications to ensure security has become a matter of public interest and importance. This book describes and analyses many cipher systems ranging from the earliest and elementary to the more recent and sophisticated, such as RSA and DES, as well as wartime machines such as the ENIGMA and Hagelin, and ciphers used by spies. Security issues and possible methods of attack are discussed and illustrated by examples. The design of many systems involves advanced mathematical concepts and this is explained in detail in a major appendix. This book will appeal to anyone interested in codes and ciphers as used by private individuals, spies, governments and industry throughout history.
Tags from this library: No tags from this library for this title. Log in to add tags.
    Average rating: 0.0 (0 votes)
Item type Current location Collection Call number Status Date due Barcode Item holds
eBook eBook e-Library

Electronic Book@IST

EBook Available
Total holds: 0

Includes bibliographical references and indexes.

1. Introduction -- 2. From Julius Caesar to simple substitution -- 3. Polyalphabetic systems -- 4. Jigsaw ciphers -- 5. Two-letter ciphers -- 6. Codes -- 7. Ciphers for spies -- 8. Producing random numbers and letters -- 9. The Enigma cipher machine -- 10. The Hagelin cipher machine -- 11. Beyond the Enigma -- 12. Public key cryptography -- 13. Encipherment and the internet.

Print version record.

The design of code and cipher systems has undergone major changes in modern times. Powerful personal computers have resulted in an explosion of e-banking, e-commerce and e-mail, and as a consequence the encryption of communications to ensure security has become a matter of public interest and importance. This book describes and analyses many cipher systems ranging from the earliest and elementary to the more recent and sophisticated, such as RSA and DES, as well as wartime machines such as the ENIGMA and Hagelin, and ciphers used by spies. Security issues and possible methods of attack are discussed and illustrated by examples. The design of many systems involves advanced mathematical concepts and this is explained in detail in a major appendix. This book will appeal to anyone interested in codes and ciphers as used by private individuals, spies, governments and industry throughout history.

English.

There are no comments for this item.

to post a comment.

Powered by Koha