|
" Secret history : "
Craig P. Bauer, York College of Pennsylvania and National Security Agency, Center for Cryptologic History, 2011-2012 Scholar-in-Residence
Document Type
|
:
|
BL
|
Record Number
|
:
|
590432
|
Doc. No
|
:
|
GBB2C0147b419651
|
Main Entry
|
:
|
Bauer, Craig P
|
Title & Author
|
:
|
Secret history : : the story of cryptology /\ Craig P. Bauer, York College of Pennsylvania and National Security Agency, Center for Cryptologic History, 2011-2012 Scholar-in-Residence
|
Series Statement
|
:
|
Discrete mathematics and its applications ;; 76
|
Page. NO
|
:
|
xxv, 594 pages :: illustrations ;; 24 cm
|
ISBN
|
:
|
9781466561861 (hardback)
|
|
:
|
: 1466561866 (hardback)
|
Bibliographies/Indexes
|
:
|
Includes bibliographical references and index
|
Contents
|
:
|
Ancient roots -- Monalphabetic substitution ciphers, or MASCs: disguises for messages -- Simple progression to an unbreakable cipher -- Transposition ciphers -- Shakespeare, Jefferson, and JFK -- World War I and Herbert O. Yardley -- Matrix encryption -- World War II: the enigma of Germany -- Cryptologic war against Japan -- Claude Shannon -- National Security Agency -- Data Encryption Standard -- Birth of public key cryptography -- Attacking RSA -- Primality testing and complexity theory -- Authenticity -- Pretty good privacy -- Stream ciphers -- Suite B all-stars -- Possible futures
|
Abstract
|
:
|
"Codes are a part of everyday life, from the ubiquitous Universal Price Code (UPC) to postal zip codes. They need not be intended for secrecy. They generally use groups of letters (sometimes pronounceable code words) or numbers to represent other words or phrases. There is typically no mathematical rule to pair an item with its representation in code. A few more examples will serve to illustrate the range of codes"--
|
Subject
|
:
|
Data encryption (Computer science)
|
Subject
|
:
|
Computer security
|
Subject
|
:
|
Cryptography-- History
|
Subject
|
:
|
Ciphers
|
Dewey Classification
|
:
|
005.8/2
|
LC Classification
|
:
|
QA76.9.A25B384 2013
|
|
:
|
QA76.9.A25B384 2013
|
| |