| 000 | 02489nam a22003618i 4500 | ||
|---|---|---|---|
| 001 | CR9780511542978 | ||
| 003 | UkCbUP | ||
| 005 | 20200124160208.0 | ||
| 006 | m|||||o||d|||||||| | ||
| 007 | cr|||||||||||| | ||
| 008 | 090505s2002||||enk o ||1 0|eng|d | ||
| 020 | _a9780511542978 (ebook) | ||
| 020 | _z9780521810548 (hardback) | ||
| 020 | _z9780521008907 (paperback) | ||
| 040 |
_aUkCbUP _beng _erda _cUkCbUP |
||
| 050 | 0 | 0 |
_aZ103 _b.C48 2002 |
| 082 | 0 | 0 |
_a652/.8 _221 |
| 100 | 1 |
_aChurchhouse, R. F., _eauthor. |
|
| 245 | 1 | 0 |
_aCodes and ciphers : _bJulius Caesar, the Enigma, and the internet / _cR.F. Churchhouse. |
| 246 | 3 | _aCodes & Ciphers | |
| 264 | 1 |
_aCambridge : _bCambridge University Press, _c2002. |
|
| 300 |
_a1 online resource (x, 240 pages) : _bdigital, PDF file(s). |
||
| 336 |
_atext _btxt _2rdacontent |
||
| 337 |
_acomputer _bc _2rdamedia |
||
| 338 |
_aonline resource _bcr _2rdacarrier |
||
| 500 | _aTitle from publisher's bibliographic system (viewed on 05 Oct 2015). | ||
| 505 | 0 | 0 |
_g1. _tIntroduction -- _g2. _tFrom Julius Caesar to simple substitution -- _g3. _tPolyalphabetic systems -- _g4. _tJigsaw ciphers -- _g5. _tTwo-letter ciphers -- _g6. _tCodes -- _g7. _tCiphers for spies -- _g8. _tProducing random numbers and letters -- _g9. _tThe Enigma cipher machine -- _g10. _tThe Hagelin cipher machine -- _g11. _tBeyond the Enigma -- _g12. _tPublic key cryptography -- _g13. _tEncipherment and the internet. |
| 520 | _aThe design of code and cipher systems has undergone major changes in modern times. Powerful personal computers have resulted in an explosion of e-banking, e-commerce and e-mail, and as a consequence the encryption of communications to ensure security has become a matter of public interest and importance. This book describes and analyses many cipher systems ranging from the earliest and elementary to the more recent and sophisticated, such as RSA and DES, as well as wartime machines such as the ENIGMA and Hagelin, and ciphers used by spies. Security issues and possible methods of attack are discussed and illustrated by examples. The design of many systems involves advanced mathematical concepts and this is explained in detail in a major appendix. This book will appeal to anyone interested in codes and ciphers as used by private individuals, spies, governments and industry throughout history. | ||
| 650 | 0 | _aCryptography. | |
| 650 | 0 | _aCiphers. | |
| 776 | 0 | 8 |
_iPrint version: _z9780521810548 |
| 856 | 4 | 0 | _uhttps://doi.org/10.1017/CBO9780511542978 |
| 999 |
_c515551 _d515549 |
||