|
1 Introduction: A Revolutionary Cipher |
|
|
1 | (10) |
|
|
1 | (3) |
|
1.2 A Few (Vocabulary) Words About Cryptology |
|
|
4 | (1) |
|
|
5 | (1) |
|
|
6 | (1) |
|
|
7 | (1) |
|
1.6 Transposition Ciphers |
|
|
8 | (3) |
|
|
9 | (2) |
|
2 Cryptology Before 1500: A Bit of Magic |
|
|
11 | (8) |
|
|
11 | (1) |
|
2.2 Cryptology in the Middle Ages |
|
|
12 | (1) |
|
2.3 Frequency Analysis, the First Cryptanalytic Tool |
|
|
12 | (7) |
|
|
17 | (2) |
|
3 The Black Chambers: 1500--1776 |
|
|
19 | (12) |
|
3.1 Mary, Queen of Scots and the Spy master |
|
|
19 | (4) |
|
|
23 | (1) |
|
|
23 | (1) |
|
3.4 The Next Complexity: Polyalphabetic Substitution |
|
|
24 | (7) |
|
|
29 | (2) |
|
4 Crypto Goes to War: 1861--1865 |
|
|
31 | (12) |
|
4.1 Technology Goes to War |
|
|
31 | (1) |
|
4.2 The Union Tries a Route |
|
|
32 | (3) |
|
4.3 Crypto for the Confederates |
|
|
35 | (1) |
|
4.4 Solving a Vigenere Cipher |
|
|
36 | (7) |
|
|
42 | (1) |
|
5 Crypto and the War to End All Wars: 1914--1918 |
|
|
43 | (10) |
|
5.1 The Americans Start from Behind |
|
|
43 | (1) |
|
|
44 | (1) |
|
|
45 | (1) |
|
5.4 Ciphers in the Great War: The Playfair |
|
|
46 | (2) |
|
5.5 Ciphers in the Great War: The ADFGVX Cipher |
|
|
48 | (2) |
|
|
50 | (3) |
|
|
51 | (2) |
|
6 The Interwar Period 1919--1939 |
|
|
53 | (10) |
|
6.1 Herbert O. Yardley and the Cipher Bureau |
|
|
53 | (5) |
|
6.2 William Friedman and the Signal Intelligence Service |
|
|
58 | (5) |
|
|
60 | (3) |
|
7 The Coming of the Machines: 1918--1945 |
|
|
63 | (12) |
|
7.1 Early Cipher Machines |
|
|
63 | (1) |
|
7.2 The Rotor Makes its Appearance |
|
|
64 | (2) |
|
7.3 How does the Enigma Work? |
|
|
66 | (4) |
|
7.4 Solving the Enigma: Turing, Marian, and the Bombe |
|
|
70 | (1) |
|
7.5 SIGABA: Friedman and Rowlett's Triumph |
|
|
71 | (1) |
|
7.6 How Does the SIGABA Work? |
|
|
72 | (3) |
|
|
74 | (1) |
|
8 The Machines Take Over: Computer Cryptography |
|
|
75 | (12) |
|
8.1 The Shoulders of Giants |
|
|
75 | (2) |
|
8.2 Modern Computer Cipher Algorithms: The DES |
|
|
77 | (5) |
|
8.2.1 How Does the DES Work? |
|
|
77 | (2) |
|
|
79 | (1) |
|
|
79 | (1) |
|
|
80 | (2) |
|
8.3 The Advanced Encryption Standard |
|
|
82 | (5) |
|
|
85 | (2) |
|
9 Alice and Bob and Whit and Martin: Public Key Crypto |
|
|
87 | (10) |
|
9.1 The Problem with Symmetric Ciphers |
|
|
87 | (1) |
|
9.2 Enter Whit and Martin |
|
|
88 | (1) |
|
9.3 The Key Exchange Problem |
|
|
88 | (2) |
|
9.4 Public-Key Cryptography Appears |
|
|
90 | (1) |
|
9.5 Authentication is a Problem Too |
|
|
91 | (1) |
|
9.6 Implementing Public-Key Cryptography: The RSA Algorithm |
|
|
92 | (2) |
|
|
93 | (1) |
|
9.6.2 Encrypting and Decrypting |
|
|
94 | (1) |
|
|
94 | (1) |
|
9.8 Applications of Public-Key Cryptography |
|
|
94 | (3) |
|
|
96 | (1) |
Index |
|
97 | |