Coverart for item
The Resource Decrypted secrets : methods and maxims of cryptology, Friedrich L. Bauer

Decrypted secrets : methods and maxims of cryptology, Friedrich L. Bauer

Label
Decrypted secrets : methods and maxims of cryptology
Title
Decrypted secrets
Title remainder
methods and maxims of cryptology
Statement of responsibility
Friedrich L. Bauer
Creator
Subject
Language
  • eng
  • ger
  • eng
Summary
Cryptology, for millennia a "secret science", is rapidly gaining in practical importance for the protection of communication channels, databases, and software. Beside its role in computerized information systems (public key systems), more and more applications inside computer systems and networks are appearing, which also extend to access rights and source file protection. The first part of this book treats secret codes and their uses - cryptography. The second part deals with the process of covertly decrypting a secret code - cryptanalysis - where in particular advice on assessing methods is given. The book presupposes only elementary mathematical knowledge. Spiced with a wealth of exciting, amusing, and sometimes personal stories from the history of cryptology, it will also interest general readers
Member of
http://library.link/vocab/creatorDate
1924-
http://library.link/vocab/creatorName
Bauer, Friedrich Ludwig
Dewey number
652/.8
Illustrations
illustrations
Index
index present
Literary form
non fiction
Nature of contents
  • dictionaries
  • bibliography
http://library.link/vocab/subjectName
  • Computer security
  • Cryptography
Label
Decrypted secrets : methods and maxims of cryptology, Friedrich L. Bauer
Instantiates
Publication
Copyright
Antecedent source
unknown
Bibliography note
Includes bibliographical references (pages 449-452) and index
Color
multicolored
Contents
  • 4.
  • Encryption Steps: Polygraphic Substitution and Coding.
  • 5.
  • Encryption Steps: Linear Substitution.
  • 6.
  • Encryption Steps: Transposition.
  • 7.
  • Polyalphabetic Encryption: Families of Alphabets.
  • 8.
  • Polyalphabetic Encryption: Keys.
  • pt. I.
  • 9.
  • Composition of Classes of Methods.
  • 10.
  • Open Encryption Key Systems.
  • 11.
  • Encryption Security
  • pt. II.
  • Cryptanalysis.
  • 12.
  • Exhausting Combinatorial Complexity.
  • Cryptography.
  • 13.
  • Anatomy of Language: Patterns.
  • 14.
  • Polyalphabetic Case: Probable Words.
  • 15.
  • Anatomy of Language: Frequencies.
  • 16.
  • Kappa and Chi.
  • 17.
  • Periodicity Examination.
  • 1.
  • 18.
  • Alignment of Accompanying Alphabets.
  • 19.
  • Compromises
  • Introductory Synopsis.
  • 2.
  • Aims and Methods of Cryptography.
  • 3.
  • Encryption Steps: Simple Substitution.
Control code
ocn883382949
Dimensions
unknown
Edition
3rd, revised and updated edition
Extent
1 online resource (xii, 473 pages)
File format
unknown
Form of item
online
Isbn
9783662047361
Level of compression
unknown
Note
SpringerLink
Other physical details
illustrations (some color)
Quality assurance targets
not applicable
Reformatting quality
unknown
Sound
unknown sound
Specific material designation
remote
System control number
(OCoLC)883382949
Label
Decrypted secrets : methods and maxims of cryptology, Friedrich L. Bauer
Publication
Copyright
Antecedent source
unknown
Bibliography note
Includes bibliographical references (pages 449-452) and index
Color
multicolored
Contents
  • 4.
  • Encryption Steps: Polygraphic Substitution and Coding.
  • 5.
  • Encryption Steps: Linear Substitution.
  • 6.
  • Encryption Steps: Transposition.
  • 7.
  • Polyalphabetic Encryption: Families of Alphabets.
  • 8.
  • Polyalphabetic Encryption: Keys.
  • pt. I.
  • 9.
  • Composition of Classes of Methods.
  • 10.
  • Open Encryption Key Systems.
  • 11.
  • Encryption Security
  • pt. II.
  • Cryptanalysis.
  • 12.
  • Exhausting Combinatorial Complexity.
  • Cryptography.
  • 13.
  • Anatomy of Language: Patterns.
  • 14.
  • Polyalphabetic Case: Probable Words.
  • 15.
  • Anatomy of Language: Frequencies.
  • 16.
  • Kappa and Chi.
  • 17.
  • Periodicity Examination.
  • 1.
  • 18.
  • Alignment of Accompanying Alphabets.
  • 19.
  • Compromises
  • Introductory Synopsis.
  • 2.
  • Aims and Methods of Cryptography.
  • 3.
  • Encryption Steps: Simple Substitution.
Control code
ocn883382949
Dimensions
unknown
Edition
3rd, revised and updated edition
Extent
1 online resource (xii, 473 pages)
File format
unknown
Form of item
online
Isbn
9783662047361
Level of compression
unknown
Note
SpringerLink
Other physical details
illustrations (some color)
Quality assurance targets
not applicable
Reformatting quality
unknown
Sound
unknown sound
Specific material designation
remote
System control number
(OCoLC)883382949

Library Locations

    • InternetBorrow it
      Albany, Auckland, 0632, NZ
Processing Feedback ...