000 | 07756cam a2200925Mi 4500 | ||
---|---|---|---|
001 | ocn972159290 | ||
003 | OCoLC | ||
005 | 20220908100119.0 | ||
006 | m o d | ||
007 | cr |n||||||||| | ||
008 | 160405s2017 njua ob 001 0 eng d | ||
040 |
_aIDEBK _beng _erda _epn _cIDEBK _dOCLCO _dOCLCQ _dYDX _dN$T _dEBLCP _dMERUC _dIDEBK _dUAB _dOCLCA _dOCLCQ _dIHT _dDEGRU _dOCLCA _dOCLCQ _dOCLCO _dOCLCA _dINT _dOCLCQ _dTKN _dYDXIT _dJSTOR _dOCLCQ _dMM9 _dUKAHL _dOCLCQ _dIEEEE _dOCLCO _dKSU |
||
019 |
_a967393172 _a971594292 _a971914236 _a972138720 _a972289002 _a972426978 _a972573030 _a972743122 _a973896979 _a974034290 _a974331501 _a974462901 _a976306431 _a979756664 _a986667845 _a986851510 _a991214663 _a992868640 _a993448199 _a993652387 _a1013775515 _a1024109396 _a1030802197 _a1035645604 _a1036096783 _a1042475879 _a1050718744 _a1076566075 |
||
020 |
_a1400885620 _q(ebk) |
||
020 | _a9781400885626 | ||
020 |
_a9780691184555 _q(electronic book) |
||
020 |
_a0691184550 _q(electronic book) |
||
020 | _z0691141754 | ||
020 | _z9780691141756 | ||
024 | 7 |
_a10.1515/9781400885626 _2doi |
|
024 | 8 | _a99974545040 | |
029 | 1 |
_aAU@ _b000059955576 |
|
029 | 1 |
_aAU@ _b000060227581 |
|
029 | 1 |
_aAU@ _b000062533420 |
|
029 | 1 |
_aCHBIS _b011306288 |
|
029 | 1 |
_aCHVBK _b530837455 |
|
029 | 1 |
_aGBVCP _b882892606 |
|
035 |
_a(OCoLC)972159290 _z(OCoLC)967393172 _z(OCoLC)971594292 _z(OCoLC)971914236 _z(OCoLC)972138720 _z(OCoLC)972289002 _z(OCoLC)972426978 _z(OCoLC)972573030 _z(OCoLC)972743122 _z(OCoLC)973896979 _z(OCoLC)974034290 _z(OCoLC)974331501 _z(OCoLC)974462901 _z(OCoLC)976306431 _z(OCoLC)979756664 _z(OCoLC)986667845 _z(OCoLC)986851510 _z(OCoLC)991214663 _z(OCoLC)992868640 _z(OCoLC)993448199 _z(OCoLC)993652387 _z(OCoLC)1013775515 _z(OCoLC)1024109396 _z(OCoLC)1030802197 _z(OCoLC)1035645604 _z(OCoLC)1036096783 _z(OCoLC)1042475879 _z(OCoLC)1050718744 _z(OCoLC)1076566075 |
||
037 |
_a984633 _bMIL |
||
037 |
_a9452465 _bIEEE |
||
050 | 4 |
_aZ103 _b.H664 2017eb |
|
072 | 7 |
_aCOM _x083000 _2bisacsh |
|
082 | 0 | 4 |
_a005.8/2 _223 |
084 |
_aCOM083000 _2bisacsh |
||
049 | _aMAIN | ||
100 | 1 |
_aHolden, Joshua, _d1970- _eauthor. _964835 |
|
245 | 1 | 4 |
_aThe mathematics of secrets : _bcryptography from Caesar ciphers to digital encryption / _cJoshua Holden. |
264 | 1 |
_aPrinceton : _bPrinceton University Press, _c[2017] |
|
300 |
_a1 online resource (xiv, 373 pages) : _billustrations |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
504 | _aIncludes bibliographical references and index. | ||
588 | 0 | _aPrint version record. | |
520 | _a"The Mathematics of Secrets takes readers on a tour of the mathematics behind cryptography--the science of sending secret messages. Joshua Holden shows how mathematical principles underpin the ways that different codes and ciphers operate, as he focuses on both code making and code breaking. He discusses the majority of ancient and modern ciphers currently known, beginning by looking at substitution ciphers, built by substituting one letter or block of letters for another. Explaining one of the simplest and historically well-known ciphers, the Caesar cipher, Holden establishes the key mathematical idea behind the cipher and discusses how to introduce flexibility and additional notation. He explores polyalphabetic substitution ciphers, transposition ciphers, including one developed by the Spartans, connections between ciphers and computer encryption, stream ciphers, ciphers involving exponentiation, and public-key ciphers, where the methods used to encrypt messages are public knowledge, and yet, intended recipients are still the only ones who are able to read the message. Only basic mathematics up to high school algebra is needed to understand and enjoy the book."--Adapted from jacket flap. | ||
505 | 0 | 0 |
_tIntroduction to ciphers and substitution. _tAlice and Bob and Carl and Julius: terminology and Caesar Cipher ; _tThe key to the matter: generalizing the Caesar Cipher ; _tMultiplicative ciphers ; _tAffine ciphers ; _tAttack at dawn: cryptanalysis of sample substitution ciphers ; _tJust to get up that hill: polygraphic substitution ciphers ; _tKnown-plaintext attacks ; _tLooking forward -- _tPolyalphabetic substitution ciphers. _tHomophonic ciphers ; _tCoincidence or conspiracy? ; _tAlberti ciphers ; _tIt's hip to be square: Tabula Recta or Vigen�ere Square ciphers ; _tHow many is many? ; _tDetermining the number of alphabets ; _tSuperman is staying for dinner: superimposition and reduction ; _tProducts of polyalphabetic ciphers ; _tPinwheel machines and rotor machines ; _tLooking forward -- _tTransposition ciphers. _tThis is Sparta! The Scytale ; _tRails and routes: geometric transposition ciphers ; _tPermutations and permutation ciphers ; _tPermutation products ; _tKeyed columnar transposition ciphers ; _tDetermining the width of the rectangle ; _tAnagramming ; _tLooking forward -- _tCiphers and computers. _tBringing home the bacon: polyliteral ciphers and binary numerals ; _tFractionating ciphers ; _tHow to design a digital cipher: SP-networks and feistel networks ; _tThe data encryption standard ; _tThe advanced encryption standard ; _tLooking forward -- _tStream ciphers. _tRunning-key ciphers ; _tOne-time pads ; _tBaby you can drive my car: autokey ciphers ; _tLinear feedback shift registers ; _tAdding nonlinearity to LFSRs ; _tLooking forward -- _tCiphers involving exponentiation. _tEncrypting using exponentiation ; _tFermat's little theorem ; _tDecrypting using exponentiation ; _tThe discrete logarithm problem ; _tComposite moduli ; _tThe Euler Phi function ; _tDecryption with composite moduli ; _tLooking forward -- _tPublic-key ciphers. _tRight out in public: the idea of public-key ciphers ; _tDiffie-Hellman key agreement ; _tAsymmetric-key cryptography ; _tRSA ; _tPriming the pump: primality testing ; _tWhy is RSA a (Good) public-key system? ; _tCryptanalysis of RSA ; _tLooking forward -- _tOther public-key systems. _tThe three-pass protocol ; _tElGamal ; _tElliptic curve cryptography ; _tDigital signatures ; _tLooking forward -- _tThe future of cryptography. _tQuantum computing ; _tPostquantum cryptogaphy ; _tQuantum cryptography ; _tLooking forward. |
546 | _aIn English. | ||
590 |
_aIEEE _bIEEE Xplore Princeton University Press eBooks Library |
||
650 | 0 |
_aCryptography _xMathematics. _917085 |
|
650 | 0 |
_aCiphers. _929147 |
|
650 | 0 |
_aComputer security. _93970 |
|
650 | 1 |
_aCiphers. _929147 |
|
650 | 6 |
_aCryptographie _xMath�ematiques. _964836 |
|
650 | 6 |
_aChiffres (Cryptographie) _964837 |
|
650 | 6 |
_aS�ecurit�e informatique. _964838 |
|
650 | 7 |
_aciphers (codes) _2aat _964839 |
|
650 | 7 |
_aCOMPUTERS _xSecurity _xCryptography. _2bisacsh _98524 |
|
650 | 7 |
_aCiphers. _2fast _0(OCoLC)fst00861549 _929147 |
|
650 | 7 |
_aComputer security. _2fast _0(OCoLC)fst00872484 _93970 |
|
650 | 7 |
_aCryptography _xMathematics. _2fast _0(OCoLC)fst00884558 _917085 |
|
650 | 7 |
_aChiffre _2gnd _964840 |
|
650 | 7 |
_aChiffrierung _2gnd _964841 |
|
650 | 7 |
_aComputersicherheit _2gnd _964842 |
|
650 | 7 |
_aKryptologie _2gnd _964843 |
|
650 | 7 |
_aMathematik _2gnd _964844 |
|
655 | 0 |
_aElectronic books. _93294 |
|
655 | 4 |
_aElectronic books. _93294 |
|
776 | 0 | 8 |
_iPrint version: _z9781400885626 |
856 | 4 | 0 | _uhttps://ieeexplore.ieee.org/servlet/opac?bknumber=9452465 |
938 |
_aAskews and Holts Library Services _bASKH _nAH32254906 |
||
938 |
_aDe Gruyter _bDEGR _n9781400885626 |
||
938 |
_aProQuest Ebook Central _bEBLB _nEBL5500264 |
||
938 |
_aEBSCOhost _bEBSC _n1434820 |
||
938 |
_aProQuest MyiLibrary Digital eBook Collection _bIDEB _ncis37130418 |
||
938 |
_aYBP Library Services _bYANK _n13415256 |
||
938 |
_aYBP Library Services _bYANK _n15682210 |
||
942 | _cEBK | ||
994 |
_a92 _bINTKS |
||
999 |
_c81358 _d81358 |