Narrow your search

Library

KU Leuven (2)

UAntwerpen (2)

ULiège (2)

Hogeschool Gent (1)

UCLouvain (1)

UGent (1)

UHasselt (1)

ULB (1)


Resource type

book (2)


Language

English (2)


Year
From To Submit

2000 (1)

1995 (1)

Listing 1 - 2 of 2
Sort by
Decrypted secrets: methods and maxims of cryptology
Author:
ISBN: 3540668713 3662040263 3662040247 Year: 2000 Publisher: Berlin Springer

Loading...
Export citation

Choose an application

Bookmark

Abstract

Cryptology, for millennia a "secret science", is rapidly gaining in practical importance for the protection of communication channels, databases, and software. Beside its role in computerized information systems (public key systems), more and more applications within computer systems and networks are appearing, which also extend to access rights and source file protection. The first part of this book treats secret codes and their uses - cryptography. The second part deals with the process of covertly decrypting a secret code - cryptanalysis - where in particular advice on assessing methods is given. The book presupposes only elementary mathematical knowledge. Spiced with a wealth of exciting, amusing, and sometimes personal stories from the history of cryptology, it will also interest general readers. Decrypted Secrets has become a standard book on cryptology. The new edition has been revised and extended in many details, particularly on the ENIGMA and other rotor machines, on cipher teletype machines, codenamed FISH by the British, and on key negotiation. "The best single book on cryptology today" (David Kahn, Cryptologia) "For those who work actively with cryptology this book is a must. For amateurs it is an important dictionary which in many cases will guide them to make their ciphers more secure." (Arne Fransén, International Intelligence History Study Group).

Keywords

Mathematical control systems --- cryptologie --- 519.764 --- 003.26 --- 091.14:003.26 --- 681.188 --- Computer security --- -Cryptography --- -681.3*D46 --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Data encryption (Computer science) --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Electronic digital computers --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Deciphering of systems of symbols --- Cryptografische schriftsoorten. Geheimschrift --- Codices--Geheimschrift, cryptografie --- Cryptographic devices. Ciphering, encoding machines. Deciphering, decoding machines --- Congresses --- Security and protection: access controls; authentication; cryptographic controls; information flow controls; security kernels; verification (Operating systems) --- Security measures --- 681.3*D46 Security and protection: access controls; authentication; cryptographic controls; information flow controls; security kernels; verification (Operating systems) --- 681.188 Cryptographic devices. Ciphering, encoding machines. Deciphering, decoding machines --- 091.14:003.26 Codices--Geheimschrift, cryptografie --- 003.26 Cryptografische schriftsoorten. Geheimschrift --- 519.764 Deciphering of systems of symbols --- Cyber security --- Cybersecurity --- Protection of computer systems --- Protection --- Cryptography --- 681.3*D46 --- Cryptographie --- Data encryption (Computer science). --- Coding theory. --- Information theory. --- Number theory. --- Applied mathematics. --- Engineering mathematics. --- Computers and civilization. --- Cryptology. --- Coding and Information Theory. --- Number Theory. --- Applications of Mathematics. --- Computers and Society. --- Civilization and computers --- Civilization --- Engineering --- Engineering analysis --- Mathematical analysis --- Number study --- Numbers, Theory of --- Algebra --- Communication theory --- Communication --- Cybernetics --- Data compression (Telecommunication) --- Digital electronics --- Information theory --- Machine theory --- Signal theory (Telecommunication) --- Computer programming --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Mathematics

Listing 1 - 2 of 2
Sort by