000 03923cam a2200577Mi 4500
001 9781315162539
003 FlBoTFG
005 20260210180747.0
006 m o d
007 cr |||||||||||
008 201210r20212013flua fob 001 0 eng d
040 _aOCoLC-P
_beng
_erda
_epn
_cOCoLC-P
020 _a9781351668507
_q(e-book)
020 _a1351668501
020 _a9781351668491
_q(ePub ebook)
020 _a1351668498
020 _a9781315162539
_q(ebook)
020 _a1315162539
020 _a9781351668484
_q(electronic bk. : Mobipocket)
020 _a135166848X
_q(electronic bk. : Mobipocket)
020 _z9781138061231 (hbk.)
024 7 _a10.1201/9781315162539
_2doi
035 _a(OCoLC)1240713327
035 _a(OCoLC-P)1240713327
050 4 _aQA76.9.A25
072 7 _aCOM
_x083000
_2bisacsh
072 7 _aMAT
_x000000
_2bisacsh
072 7 _aMAT
_x025000
_2bisacsh
072 7 _aPBCD
_2bicssc
082 0 4 _a005.82
_223
100 1 _aBauer, Craig P.,
_eauthor.
245 1 0 _aSecret history
_bthe story of cryptology /
_cCraig P. Bauer.
264 1 _aBoca Raton :
_bChapman & Hall/CRC,
_c2021.
300 _a1 online resource
_billustrations (black and white).
336 _atext
_2rdacontent
336 _astill image
_2rdacontent
337 _acomputer
_2rdamedia
338 _aonline resource
_2rdacarrier
490 0 _aDiscrete mathematics and its applications
520 _aThe first edition of this award-winning book attracted a wide audience. This second edition is both a joy to read and a useful classroom tool. Unlike traditional textbooks, it requires no mathematical prerequisites and can be read around the mathematics presented. If used as a textbook, the mathematics can be prioritized, with a book both students and instructors will enjoy reading. Secret History: The Story of Cryptology, Second Edition incorporates new material concerning various eras in the long history of cryptology. Much has happened concerning the political aspects of cryptology since the first edition appeared. The still unfolding story is updated here. The first edition of this book contained chapters devoted to the cracking of German and Japanese systems during World War II. Now the other side of this cipher war is also told, that is, how the United States was able to come up with systems that were never broken. The text is in two parts. Part I presents classic cryptology from ancient times through World War II. Part II examines modern computer cryptology. With numerous real-world examples and extensive references, the author skillfully balances the history with mathematical details, providing readers with a sound foundation in this dynamic field. FEATURES Presents a chronological development of key concepts Includes the Vigenre cipher, the one-time pad, transposition ciphers, Jefferson's wheel cipher, Playfair cipher, ADFGX, matrix encryption, Enigma, Purple, and other classic methods Looks at the work of Claude Shannon, the origin of the National Security Agency, elliptic curve cryptography, the Data Encryption Standard, the Advanced Encryption Standard, public-key cryptography, and many other topics New chapters detail SIGABA and SIGSALY, successful systems used during World War II for text and speech, respectively Includes quantum cryptography and the impact of quantum computers
588 _aOCLC-licensed vendor bibliographic record.
650 0 _aData encryption (Computer science)
_95564
650 0 _aComputer security.
_91600
650 0 _aCryptography
_xHistory.
650 0 _aCiphers.
650 7 _aCOMPUTERS / Cryptography
_2bisacsh
650 7 _aMATHEMATICS / General
_2bisacsh
650 7 _aMATHEMATICS / Recreations & Games
_2bisacsh
856 4 0 _3Taylor & Francis
_uhttps://www.taylorfrancis.com/books/9781315162539
856 4 2 _3OCLC metadata license agreement
_uhttp://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf
999 _c90435
_d90434