Cryptology, for millennia a "secret science", is rapidly gaining in practical importance for the protection of communication channels, databases, and software. Beside its role in computerized information systems (public key systems), more and more applications within computer systems and networks are appearing, which also extend to access rights and source file protection. The first part of this book treats secret codes and their uses - cryptography. The second part deals with the process of covertly decrypting a secret code - cryptanalysis - where in particular advice on assessing methods is given. The book presupposes only elementary mathematical knowledge. Spiced with a wealth of exciting, amusing, and sometimes personal stories from the history of cryptology, it will also interest general readers.
Decrypted Secrets has become a standard book on cryptology. The new edition has been revised and extended in many details.
Rezensionen / Stimmen
"The best single book on cryptology today." -- Cryptologia (from a review of a previous edition)
From the reviews of the fourth edition:
"This comprehensive updated edition is divided into two sections. The first part of the book deals with The People and the second concentrates on The Machinery. . This volume includes 191 Figures, 29 Tables and 16 Color Plates, plus an Appendix. . Friedrich L. Bauer Professor Emeritus of Mathematics and Computer Science . has written an outstanding book on cryptology that belongs in your personal library or as a gift for a friend. . There are other fascinating sidelights to this excellent book." (The Cryptogram, Page 15, 2007)
"By far the best single work on the subject." -- David Kahn
Auflage
Sprache
Verlagsort
Verlagsgruppe
Illustrationen
119
17 farbige Abbildungen, 119 s/w Abbildungen
XII, 471 p. 136 illus., 17 illus. in color.
ISBN-13
978-3-662-04024-9 (9783662040249)
DOI
10.1007/978-3-662-04024-9
Schweitzer Klassifikation
I: Cryptography.- 1 Introductory Synopsis.- 2 Aims and Methods of Cryptography.- 3 Encryption Steps: Simple Substitution.- 4 Encryption Steps: Polygraphic Substitution and Coding.- 5 Encryption Steps: Linear Substitution.- 6 Encryption Steps: Transposition.- 7 Polyalphabetic Encryption: Families of Alphabets.- 8 Polyalphabetic Encryption: Keys.- 9 Composition of Classes of Methods.- 10 Open Encryption Key Systems.- 11 Encryption Security.- II: Cryptanalysis.- 12 Exhausting Combinatorial Complexity.- 13 Anatomy of Language: Patterns.- 14 Polyalphabetic Case: Probable Words.- 15 Anatomy of Language: Frequencies.- 16 Kappa and Chi.- 17 Periodicity Examination.- 18 Alignment of Accompanying Alphabets.- 19 Compromises.- 20 Linear Basis Analysis.- 21 Anagramming.- 22 Concluding Remarks.- Appendix: Axiomatic Information Theory.- Photo Credits.