Listing 1 - 2 of 2 |
Sort by
|
Choose an application
Cryptography. --- Ciphers. --- Cryptography --- Ciphers --- Cryptographie --- Chiffres (Cryptographie) --- History. --- History --- Histoire --- cryptologie --- 003.26 --- 681.3*D46 --- Cryptografische schriftsoorten. Geheimschrift --- Security and protection: access controls; authentication; cryptographic controls; information flow controls; security kernels; verification (Operating systems) --- 681.3*D46 Security and protection: access controls; authentication; cryptographic controls; information flow controls; security kernels; verification (Operating systems) --- 003.26 Cryptografische schriftsoorten. Geheimschrift --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Writing --- Data encryption (Computer science) --- Telecommunication services --- Computer architecture. Operating systems --- Cryptography - History
Choose an application
The science of cryptology is made up of two halves. Cryptography is the study of how to create secure systems for communications. Cryptanalysis is the study of how to break those systems. The conflict between these two halves of cryptology is the story of secret writing. For over two thousand years governments, armies, and now individuals have wanted to protect their messages from the “enemy”. This desire to communicate securely and secretly has resulted in the creation of numerous and increasingly complicated systems to protect one's messages. On the other hand, for every new system to protect messages there is a cryptanalyst creating a new technique to break that system. With the advent of computers the cryptographer seems to finally have the upper hand. New mathematically based cryptographic algorithms that use computers for encryption and decryption are so secure that brute-force techniques seem to be the only way to break them – so far. This work traces the history of the conflict between cryptographer and cryptanalyst, explores in some depth the algorithms created to protect messages, and suggests where the field is going in the future.
Cryptography -- History. --- Data encryption (Computer science) -- History. --- Data structures. --- Engineering & Applied Sciences --- Computer Science --- Algorithms. --- Cryptography. --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Algorism --- Computer science. --- History. --- Data structures (Computer science). --- Computers. --- Computer Science. --- History of Computing. --- Data Structures, Cryptology and Information Theory. --- History of Science. --- Algebra --- Arithmetic --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Data encryption (Computer science) --- Foundations --- Data structures (Computer scienc. --- Data Structures and Information Theory. --- Data structures (Computer science) --- Annals --- Auxiliary sciences of history --- Informatics --- Science --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- Electronic data processing --- File organization (Computer science) --- Abstract data types (Computer science) --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Computer systems --- Cybernetics --- Machine theory --- Calculators --- Cyberspace --- Cryptography
Listing 1 - 2 of 2 |
Sort by
|