000 07756cam a2200925Mi 4500
001 ocn972159290
003 OCoLC
005 20220908100119.0
006 m o d
007 cr |n|||||||||
008 160405s2017 njua ob 001 0 eng d
040 _aIDEBK
_beng
_erda
_epn
_cIDEBK
_dOCLCO
_dOCLCQ
_dYDX
_dN$T
_dEBLCP
_dMERUC
_dIDEBK
_dUAB
_dOCLCA
_dOCLCQ
_dIHT
_dDEGRU
_dOCLCA
_dOCLCQ
_dOCLCO
_dOCLCA
_dINT
_dOCLCQ
_dTKN
_dYDXIT
_dJSTOR
_dOCLCQ
_dMM9
_dUKAHL
_dOCLCQ
_dIEEEE
_dOCLCO
_dKSU
019 _a967393172
_a971594292
_a971914236
_a972138720
_a972289002
_a972426978
_a972573030
_a972743122
_a973896979
_a974034290
_a974331501
_a974462901
_a976306431
_a979756664
_a986667845
_a986851510
_a991214663
_a992868640
_a993448199
_a993652387
_a1013775515
_a1024109396
_a1030802197
_a1035645604
_a1036096783
_a1042475879
_a1050718744
_a1076566075
020 _a1400885620
_q(ebk)
020 _a9781400885626
020 _a9780691184555
_q(electronic book)
020 _a0691184550
_q(electronic book)
020 _z0691141754
020 _z9780691141756
024 7 _a10.1515/9781400885626
_2doi
024 8 _a99974545040
029 1 _aAU@
_b000059955576
029 1 _aAU@
_b000060227581
029 1 _aAU@
_b000062533420
029 1 _aCHBIS
_b011306288
029 1 _aCHVBK
_b530837455
029 1 _aGBVCP
_b882892606
035 _a(OCoLC)972159290
_z(OCoLC)967393172
_z(OCoLC)971594292
_z(OCoLC)971914236
_z(OCoLC)972138720
_z(OCoLC)972289002
_z(OCoLC)972426978
_z(OCoLC)972573030
_z(OCoLC)972743122
_z(OCoLC)973896979
_z(OCoLC)974034290
_z(OCoLC)974331501
_z(OCoLC)974462901
_z(OCoLC)976306431
_z(OCoLC)979756664
_z(OCoLC)986667845
_z(OCoLC)986851510
_z(OCoLC)991214663
_z(OCoLC)992868640
_z(OCoLC)993448199
_z(OCoLC)993652387
_z(OCoLC)1013775515
_z(OCoLC)1024109396
_z(OCoLC)1030802197
_z(OCoLC)1035645604
_z(OCoLC)1036096783
_z(OCoLC)1042475879
_z(OCoLC)1050718744
_z(OCoLC)1076566075
037 _a984633
_bMIL
037 _a9452465
_bIEEE
050 4 _aZ103
_b.H664 2017eb
072 7 _aCOM
_x083000
_2bisacsh
082 0 4 _a005.8/2
_223
084 _aCOM083000
_2bisacsh
049 _aMAIN
100 1 _aHolden, Joshua,
_d1970-
_eauthor.
_964835
245 1 4 _aThe mathematics of secrets :
_bcryptography from Caesar ciphers to digital encryption /
_cJoshua Holden.
264 1 _aPrinceton :
_bPrinceton University Press,
_c[2017]
300 _a1 online resource (xiv, 373 pages) :
_billustrations
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
504 _aIncludes bibliographical references and index.
588 0 _aPrint version record.
520 _a"The Mathematics of Secrets takes readers on a tour of the mathematics behind cryptography--the science of sending secret messages. Joshua Holden shows how mathematical principles underpin the ways that different codes and ciphers operate, as he focuses on both code making and code breaking. He discusses the majority of ancient and modern ciphers currently known, beginning by looking at substitution ciphers, built by substituting one letter or block of letters for another. Explaining one of the simplest and historically well-known ciphers, the Caesar cipher, Holden establishes the key mathematical idea behind the cipher and discusses how to introduce flexibility and additional notation. He explores polyalphabetic substitution ciphers, transposition ciphers, including one developed by the Spartans, connections between ciphers and computer encryption, stream ciphers, ciphers involving exponentiation, and public-key ciphers, where the methods used to encrypt messages are public knowledge, and yet, intended recipients are still the only ones who are able to read the message. Only basic mathematics up to high school algebra is needed to understand and enjoy the book."--Adapted from jacket flap.
505 0 0 _tIntroduction to ciphers and substitution.
_tAlice and Bob and Carl and Julius: terminology and Caesar Cipher ;
_tThe key to the matter: generalizing the Caesar Cipher ;
_tMultiplicative ciphers ;
_tAffine ciphers ;
_tAttack at dawn: cryptanalysis of sample substitution ciphers ;
_tJust to get up that hill: polygraphic substitution ciphers ;
_tKnown-plaintext attacks ;
_tLooking forward --
_tPolyalphabetic substitution ciphers.
_tHomophonic ciphers ;
_tCoincidence or conspiracy? ;
_tAlberti ciphers ;
_tIt's hip to be square: Tabula Recta or Vigen�ere Square ciphers ;
_tHow many is many? ;
_tDetermining the number of alphabets ;
_tSuperman is staying for dinner: superimposition and reduction ;
_tProducts of polyalphabetic ciphers ;
_tPinwheel machines and rotor machines ;
_tLooking forward --
_tTransposition ciphers.
_tThis is Sparta! The Scytale ;
_tRails and routes: geometric transposition ciphers ;
_tPermutations and permutation ciphers ;
_tPermutation products ;
_tKeyed columnar transposition ciphers ;
_tDetermining the width of the rectangle ;
_tAnagramming ;
_tLooking forward --
_tCiphers and computers.
_tBringing home the bacon: polyliteral ciphers and binary numerals ;
_tFractionating ciphers ;
_tHow to design a digital cipher: SP-networks and feistel networks ;
_tThe data encryption standard ;
_tThe advanced encryption standard ;
_tLooking forward --
_tStream ciphers.
_tRunning-key ciphers ;
_tOne-time pads ;
_tBaby you can drive my car: autokey ciphers ;
_tLinear feedback shift registers ;
_tAdding nonlinearity to LFSRs ;
_tLooking forward --
_tCiphers involving exponentiation.
_tEncrypting using exponentiation ;
_tFermat's little theorem ;
_tDecrypting using exponentiation ;
_tThe discrete logarithm problem ;
_tComposite moduli ;
_tThe Euler Phi function ;
_tDecryption with composite moduli ;
_tLooking forward --
_tPublic-key ciphers.
_tRight out in public: the idea of public-key ciphers ;
_tDiffie-Hellman key agreement ;
_tAsymmetric-key cryptography ;
_tRSA ;
_tPriming the pump: primality testing ;
_tWhy is RSA a (Good) public-key system? ;
_tCryptanalysis of RSA ;
_tLooking forward --
_tOther public-key systems.
_tThe three-pass protocol ;
_tElGamal ;
_tElliptic curve cryptography ;
_tDigital signatures ;
_tLooking forward --
_tThe future of cryptography.
_tQuantum computing ;
_tPostquantum cryptogaphy ;
_tQuantum cryptography ;
_tLooking forward.
546 _aIn English.
590 _aIEEE
_bIEEE Xplore Princeton University Press eBooks Library
650 0 _aCryptography
_xMathematics.
_917085
650 0 _aCiphers.
_929147
650 0 _aComputer security.
_93970
650 1 _aCiphers.
_929147
650 6 _aCryptographie
_xMath�ematiques.
_964836
650 6 _aChiffres (Cryptographie)
_964837
650 6 _aS�ecurit�e informatique.
_964838
650 7 _aciphers (codes)
_2aat
_964839
650 7 _aCOMPUTERS
_xSecurity
_xCryptography.
_2bisacsh
_98524
650 7 _aCiphers.
_2fast
_0(OCoLC)fst00861549
_929147
650 7 _aComputer security.
_2fast
_0(OCoLC)fst00872484
_93970
650 7 _aCryptography
_xMathematics.
_2fast
_0(OCoLC)fst00884558
_917085
650 7 _aChiffre
_2gnd
_964840
650 7 _aChiffrierung
_2gnd
_964841
650 7 _aComputersicherheit
_2gnd
_964842
650 7 _aKryptologie
_2gnd
_964843
650 7 _aMathematik
_2gnd
_964844
655 0 _aElectronic books.
_93294
655 4 _aElectronic books.
_93294
776 0 8 _iPrint version:
_z9781400885626
856 4 0 _uhttps://ieeexplore.ieee.org/servlet/opac?bknumber=9452465
938 _aAskews and Holts Library Services
_bASKH
_nAH32254906
938 _aDe Gruyter
_bDEGR
_n9781400885626
938 _aProQuest Ebook Central
_bEBLB
_nEBL5500264
938 _aEBSCOhost
_bEBSC
_n1434820
938 _aProQuest MyiLibrary Digital eBook Collection
_bIDEB
_ncis37130418
938 _aYBP Library Services
_bYANK
_n13415256
938 _aYBP Library Services
_bYANK
_n15682210
942 _cEBK
994 _a92
_bINTKS
999 _c81358
_d81358