Titre : |
Decrypted secrets : methods and maxims of cryptology |
Type de document : |
texte imprimé |
Auteurs : |
Friedrich Ludwig Bauer, Auteur |
Mention d'édition : |
3 éd |
Editeur : |
Berlin ; London ; Cham : Springer |
Année de publication : |
2002 |
Importance : |
XII-473 p. |
Présentation : |
ill. |
Format : |
24 cm |
ISBN/ISSN/EAN : |
978-3-540-42674-5 |
Note générale : |
Bibliogr. p. [449]-452. Notes bibliogr. Index |
Langues : |
Français (fre) |
Mots-clés : |
Coupe-feu (sécurité informatique)
Cryptographie |
Index. décimale : |
681.3.053 Problèmes de la conversion,du codage et du décodage. |
Résumé : |
The first part of this book treats secret codes and their uses - cryptography. The second part deals with the process of covertly decrypting a secret code - cryptanalysis - where in particular advice on assessing methods is given. The book presupposes only elementary mathematical knowledge. Spiced with a wealth of exciting, amusing, and sometimes personal stories from the history of cryptology, it will also interest general readers |
Note de contenu : |
Part I: Cryptography
Introductory Synopsis
Aims and Methods of Cryptography
Encryption Steps: Simple Substitution
Encryption Steps: Polygraphic Substitution and Coding
Encryption Steps: Linear Substitution
Encryption Steps: Transposition
Polyalphabetic Encryption: Families of Alphabets
Polyalphabetic Encryption: Keys
...
Part II: Cryptanalysis
Exhausting Combinatorial Complexity
Anatomy of Language: Patterns
Polyalphabetic Case: Probable Words
Anatomy of Language: Frequencies
Kappa and Chi
Periodicity Examination
Alignment of Accompanying Alphabets
Compromises
... |
Decrypted secrets : methods and maxims of cryptology [texte imprimé] / Friedrich Ludwig Bauer, Auteur . - 3 éd . - Berlin ; London ; Cham : Springer, 2002 . - XII-473 p. : ill. ; 24 cm. ISBN : 978-3-540-42674-5 Bibliogr. p. [449]-452. Notes bibliogr. Index Langues : Français ( fre)
Mots-clés : |
Coupe-feu (sécurité informatique)
Cryptographie |
Index. décimale : |
681.3.053 Problèmes de la conversion,du codage et du décodage. |
Résumé : |
The first part of this book treats secret codes and their uses - cryptography. The second part deals with the process of covertly decrypting a secret code - cryptanalysis - where in particular advice on assessing methods is given. The book presupposes only elementary mathematical knowledge. Spiced with a wealth of exciting, amusing, and sometimes personal stories from the history of cryptology, it will also interest general readers |
Note de contenu : |
Part I: Cryptography
Introductory Synopsis
Aims and Methods of Cryptography
Encryption Steps: Simple Substitution
Encryption Steps: Polygraphic Substitution and Coding
Encryption Steps: Linear Substitution
Encryption Steps: Transposition
Polyalphabetic Encryption: Families of Alphabets
Polyalphabetic Encryption: Keys
...
Part II: Cryptanalysis
Exhausting Combinatorial Complexity
Anatomy of Language: Patterns
Polyalphabetic Case: Probable Words
Anatomy of Language: Frequencies
Kappa and Chi
Periodicity Examination
Alignment of Accompanying Alphabets
Compromises
... |
|  |