The design of code and cipher systems has undergone major changes in modern times. Powerful personal computers have resulted in an explosion of e-banking, e-commerce and e-mail, and as a consequence the encryption of communications to ensure security has become a matter of public interest and importance. This book describes and analyses many cipher systems ranging from the earliest and elementary to the more recent and sophisticated, such as RSA and DES, as well as wartime machines such as the ENIGMA and Hagelin, and ciphers used by spies. Security issues and possible methods of attack are discussed and illustrated by examples. The design of many systems involves advanced mathematical concepts and this is explained in detail in a major appendix. This book will appeal to anyone interested in codes and ciphers as used by private individuals, spies, governments and industry throughout history.
Rezensionen / Stimmen
'... written in a lively and amusing style but not at the expense of mathematical rigour.' European Mathematical Society 'A fascinating account, which should appeal to a wide readership.' Mathematika '... written in a lively and amusing style ...' EMS Newsletter 'The mathematics is well within the grasp of a cultured A level mathematician and for those to whom the book is addressed, it can be recommended.' The Mathematical Gazette
Sprache
Verlagsort
Zielgruppe
Für Beruf und Forschung
Für höhere Schule und Studium
Maße
Höhe: 240 mm
Breite: 161 mm
Dicke: 18 mm
Gewicht
ISBN-13
978-0-521-81054-8 (9780521810548)
Copyright in bibliographic data and cover images is held by Nielsen Book Services Limited or by the publishers or by their respective licensors: all rights reserved.
Schweitzer Klassifikation
Robert Churchhouse is Emeritus Professor of Computing Mathematics at Cardiff University and has lectured widely on mathematics and cryptanalysis at more than 50 Universities and Institutes throughout the the world. He is also the co-author of books on computers in mathematics, computers in literary and linguistic research, and numerical analysis.
Autor*in
Cardiff University
Preface; 1. Introduction; 2. From Julius Caesar to simple substitution; 3. Polyalphabetic systems; 4. Jigsaw ciphers; 5. Two-letter ciphers; 6. Codes; 7. Ciphers for spies; 8. Producing random numbers and letters; 9. The Enigma cipher machine; 10. The Hagelin cipher machine; 11. Beyond the Enigma; 12. Public key cryptography; 13. Encipherment and the internet; Appendix; Solutions to problems; References; Name index; Subject index.