Decrypted Secrets: Methods and Maxims of Cryptology

Decrypted Secrets: Methods and Maxims of Cryptology
ISBN-10
3540426744
ISBN-13
9783540426745
Series
Decrypted Secrets
Category
Computer security
Pages
512
Language
English
Published
2002
Publisher
Springer Science & Business Media
Author
Friedrich Ludwig Bauer

Description

In today's unsafe and increasingly wired world cryptology plays a vital role in protecting communication channels, databases, and software from unwanted intruders. This revised and extended third edition of the classic reference work on cryptology now contains many new technical and biographical details. The first part treats secret codes and their uses - cryptography. The second part deals with the process of covertly decrypting a secret code - cryptanalysis, where particular advice on assessing methods is given. The book presupposes only elementary mathematical knowledge. Spiced with a wealth of exciting, amusing, and sometimes personal stories from the history of cryptology, it will also interest general readers.

Other editions

Similar books

  • Decrypted Secrets
    By Friedrich L. Bauer

    Decrypted Secrets

  • Decrypted Secrets
    By Dr. rer. nat. Dr. ès sc. h. c. Dr. rer. nat. h. c. mult. Friedrich L. Bauer

    Decrypted Secrets

  • Defending Secrets, Sharing Data: New Locks and Keys for Electronic Information

    Examines Federal policies directed at protecting information, particularly in electronic communications systems. Examines the vulnerability of communications and computer systems, and the trends in technology for safeguarding information in these...

  • The Code Book: The Secrets Behind Codebreaking
    By Simon Singh

    Coders and codebreakers alike will be fascinated by history's most mesmerizing stories of intrigue and cunning--from Julius Caesar and his Caeser cipher to the Allies' use of the Enigma machine to decode German messages during World War II. ...

  • Internet Security SECRETS
    By John R. Vacca

    ... encrypted with one key can only be decrypted by the other key if one key is made public and the other is kept private . Information sent to the holder of the private key can be encrypted with the public key , and only the holder of the ...

  • Secret History: The Story of Cryptology
    By Craig Bauer

    Doyle. Among cryptologists, the best known Sherlock Holmes story is “The Adventure of the Dancing Men” (1903).26 In this story, the cipher messages that Holmes attempts to crack have the letters replaced by dancing men; hence, ...

  • Cyberspace Safety and Security: 13th International Symposium, CSS 2021, Virtual Event, November 9–11, 2021, Proceedings
    By Weizhi Meng, Mauro Conti

    3) Generation and upload of encrypted secret data and escrowed shared secret: Once the secret data are ready, the sender peer invokes the Sender chaincode and performs the following actions. • Firstly, the Sender chaincode symmetrically ...

  • Cryptography Decrypted
    By H. X. Mel, Doris M. Baker

    Cryptography is at the heart of computer security: without it, secure e-commerce and Internet communications would be impossible. Decision-makers and sophisticated computer users need to understand cryptography -- but most...

  • Information Technology Applications in Industry II
    By Prasad Yarlagadda, Su Fen Yang, Keon Myung Lee

    knowledge. diffusion. in. cluster. innovation. network. based. on. social. network. theory. Li. Xing. Dept of management science and project management Guizhou University of Finance and Economics, Guiyang, ...

  • Modern Embedded Computing: Designing Connected, Pervasive, Media-Rich Systems
    By Peter Barry, Patrick Crowley

    ... secrets with mathematical guarantees. When information is encrypted, it should be indistinguishable from random data ... crypto algorithm translates that secret into a numerical form that is used to randomize the bits in the file you ...