Atjaunināt sīkdatņu piekrišanu

E-grāmata: Secret History: The Story of Cryptology

4.00/5 (16 ratings by Goodreads)
(York College of Pennsylvania, Physical Sciences Department, USA)
Citas grāmatas par šo tēmu:
  • Formāts - EPUB+DRM
  • Cena: 71,37 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.
Citas grāmatas par šo tēmu:

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.

The first edition of this award-winning book attracted a wide audience. This second edition is both a joy to read and a useful classroom tool. Unlike traditional textbooks, it requires no mathematical prerequisites and can be read around the mathematics presented. If used as a textbook, the mathematics can be prioritized, with a book both students and instructors will enjoy reading.

Secret History: The Story of Cryptology, Second Edition incorporates new material concerning various eras in the long history of cryptology. Much has happened concerning the political aspects of cryptology since the first edition appeared. The still unfolding story is updated here.

The first edition of this book contained chapters devoted to the cracking of German and Japanese systems during World War II. Now the other side of this cipher war is also told, that is, how the United States was able to come up with systems that were never broken.

The text is in two parts. Part I presents classic cryptology from ancient times through World War II. Part II examines modern computer cryptology. With numerous real-world examples and extensive references, the author skillfully balances the history with mathematical details, providing readers with a sound foundation in this dynamic field.

FEATURES











Presents a chronological development of key concepts





Includes the Vigenčre cipher, the one-time pad, transposition ciphers, Jeffersons wheel cipher, Playfair cipher, ADFGX, matrix encryption, Enigma, Purple, and other classic methods





Looks at the work of Claude Shannon, the origin of the National Security Agency, elliptic curve cryptography, the Data Encryption Standard, the Advanced Encryption Standard, public-key cryptography, and many other topics





New chapters detail SIGABA and SIGSALY, successful systems used during World War II for text and speech, respectively Includes quantum cryptography and the impact of quantum computers

Part I: Classical Cryptology
1. Monoalphabetic Substitution Ciphers, or MASCs: Disguises for Messages
2. Simple Progression to an Unbreakable Cipher
3. Transposition Ciphers
4. Shakespeare, Jefferson, and JFK
5. World War I and Herbert O. Yardley
6. Matrix Encryption
7. World War II: The Enigma of Germany
8. Cryptologic War against Japan
9. SIGABA: World War II Defense
10. Enciphering Speech Part II: Modern Cryptology 11. Claude Shannon
12. National Security Agency
13. The Data Encryption Standard
14. The Birth of Public Key Cryptography
15. Attacking RSA
16. Primality Testing and Complexity Theory
17. Authenticity
18. Pretty Good Privacy and Bad Politics
19. Stream Ciphers
20. Suite B All-Stars
21. Toward Tomorrow

Craig P. Bauer is an associate professor of mathematics at York College of Pennsylvania and the editor-in-chief of Cryptologia. He was the 2011-2012 Scholar-in-Residence at the National Security Agency (NSA) Center for Cryptologic History, where he wrote several papers for NSA journals, gave numerous lectures, and made substantial progress on a second book focused on unsolved codes and ciphers. He earned a PhD in mathematics at North Carolina State University.