The Mathematics of Secrets : : Cryptography from Caesar Ciphers to Digital Encryption / / Joshua Holden.

The Mathematics of Secrets takes readers on a fascinating tour of the mathematics behind cryptography—the science of sending secret messages. Using a wide range of historical anecdotes and real-world examples, Joshua Holden shows how mathematical principles underpin the ways that different codes and...

Full description

Saved in:
Bibliographic Details
VerfasserIn:
Place / Publishing House:Princeton, NJ : : Princeton University Press, , [2018]
©2019
Year of Publication:2018
Language:English
Online Access:
Physical Description:1 online resource (392 p.)
Tags: Add Tag
No Tags, Be the first to tag this record!
LEADER 07524nam a22018495i 4500
001 9780691184555
003 DE-B1597
005 20221201113901.0
006 m|||||o||d||||||||
007 cr || ||||||||
008 221201t20182019nju fo d z eng d
020 |a 9780691184555 
024 7 |a 10.1515/9780691184555  |2 doi 
035 |a (DE-B1597)502931 
035 |a (OCoLC)1083603295 
040 |a DE-B1597  |b eng  |c DE-B1597  |e rda 
041 0 |a eng 
044 |a nju  |c US-NJ 
072 7 |a COM083000  |2 bisacsh 
084 |a ST 276  |q SEPA  |2 rvk  |0 (DE-625)rvk/143642: 
100 1 |a Holden, Joshua,   |e author.  |4 aut  |4 http://id.loc.gov/vocabulary/relators/aut 
245 1 4 |a The Mathematics of Secrets :  |b Cryptography from Caesar Ciphers to Digital Encryption /  |c Joshua Holden. 
264 1 |a Princeton, NJ :   |b Princeton University Press,   |c [2018] 
264 4 |c ©2019 
300 |a 1 online resource (392 p.) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
505 0 0 |t Frontmatter --   |t CONTENTS --   |t PREFACE --   |t ACKNOWLEDGMENTS --   |t 1. Introduction to Ciphers and Substitution --   |t 2. Polyalphabetic Substitution Ciphers --   |t 3. Transposition Ciphers --   |t 4. Ciphers and Computers --   |t 5. Stream Ciphers --   |t 6. Ciphers Involving Exponentiation --   |t 7. Public-Key Ciphers --   |t 8. Other Public-Key Systems --   |t 9. The Future of Cryptography --   |t LIST OF SYMBOLS --   |t NOTES --   |t SUGGESTIONS FOR FURTHER READING --   |t BIBLIOGRAPHY --   |t INDEX 
506 0 |a restricted access  |u http://purl.org/coar/access_right/c_16ec  |f online access with authorization  |2 star 
520 |a The Mathematics of Secrets takes readers on a fascinating tour of the mathematics behind cryptography—the science of sending secret messages. Using a wide range of historical anecdotes and real-world examples, Joshua Holden shows how mathematical principles underpin the ways that different codes and ciphers work. He focuses on both code making and code breaking and discusses most of the ancient and modern ciphers that are currently known. He begins by looking at substitution ciphers, and then discusses how to introduce flexibility and additional notation. Holden goes on to explore polyalphabetic substitution ciphers, transposition ciphers, connections between ciphers and computer encryption, stream ciphers, public-key ciphers, and ciphers involving exponentiation. He concludes by looking at the future of ciphers and where cryptography might be headed. The Mathematics of Secrets reveals the mathematics working stealthily in the science of coded messages.A blog describing new developments and historical discoveries in cryptography related to the material in this book is accessible at http://press.princeton.edu/titles/10826.html. 
538 |a Mode of access: Internet via World Wide Web. 
546 |a In English. 
588 0 |a Description based on online resource; title from PDF title page (publisher's Web site, viewed 01. Dez 2022) 
650 0 |a Ciphers. 
650 0 |a Computer security. 
650 0 |a Cryptography  |x Mathematics. 
650 7 |a COMPUTERS / Security / Cryptography.  |2 bisacsh 
653 |a Adaptive chosen-ciphertext attack. 
653 |a Advanced Encryption Standard. 
653 |a Affine cipher. 
653 |a Alice and Bob. 
653 |a Autokey cipher. 
653 |a Block cipher mode of operation. 
653 |a Block cipher. 
653 |a Block size (cryptography). 
653 |a Brute-force attack. 
653 |a Brute-force search. 
653 |a Caesar cipher. 
653 |a Calculation. 
653 |a Chosen-ciphertext attack. 
653 |a Chosen-plaintext attack. 
653 |a Cipher. 
653 |a Ciphertext-only attack. 
653 |a Ciphertext. 
653 |a Codebook. 
653 |a Communication Theory of Secrecy Systems. 
653 |a Computational problem. 
653 |a Confusion and diffusion. 
653 |a Correlation attack. 
653 |a Craig Gentry (computer scientist). 
653 |a Cryptanalysis. 
653 |a Cryptogram. 
653 |a Cryptographic engineering. 
653 |a Cryptographic hash function. 
653 |a Cryptography Research. 
653 |a Cryptography. 
653 |a Cryptosystem. 
653 |a Data Encryption Standard. 
653 |a Differential cryptanalysis. 
653 |a Diffie–Hellman key exchange. 
653 |a Discrete logarithm. 
653 |a Disquisitiones Arithmeticae. 
653 |a Dual EC DRBG. 
653 |a ElGamal encryption. 
653 |a Elliptic curve cryptography. 
653 |a Encryption. 
653 |a Enigma machine. 
653 |a Euler's theorem. 
653 |a Fast Software Encryption. 
653 |a Feistel cipher. 
653 |a Fermat's little theorem. 
653 |a Forward secrecy. 
653 |a Grover's algorithm. 
653 |a Hill cipher. 
653 |a Homomorphic encryption. 
653 |a Hyperelliptic curve cryptography. 
653 |a Information theory. 
653 |a Initialization vector. 
653 |a International Association for Cryptologic Research. 
653 |a Kerckhoffs's principle. 
653 |a Key (cryptography). 
653 |a Key schedule. 
653 |a Key size. 
653 |a Keystream. 
653 |a Known-plaintext attack. 
653 |a Lattice problem. 
653 |a Linear cryptanalysis. 
653 |a Logjam (computer security). 
653 |a Mathematical problem. 
653 |a Mathematician. 
653 |a Mathematics. 
653 |a Mental poker. 
653 |a Merkle's Puzzles. 
653 |a Monte Carlo algorithm. 
653 |a Multiple encryption. 
653 |a NSA Suite B Cryptography. 
653 |a Nonlinear feedback shift register. 
653 |a Number theory. 
653 |a Padding (cryptography). 
653 |a Permutation box. 
653 |a Permutation. 
653 |a Plaintext. 
653 |a Polyalphabetic cipher. 
653 |a Post-quantum cryptography. 
653 |a Precomputation. 
653 |a Probabilistic encryption. 
653 |a Product cipher. 
653 |a Public-key cryptography. 
653 |a Quantum algorithm. 
653 |a Quantum cryptography. 
653 |a Quantum key distribution. 
653 |a RSA (cryptosystem). 
653 |a RSA problem. 
653 |a Related-key attack. 
653 |a S-box. 
653 |a Security level. 
653 |a Shor's algorithm. 
653 |a Sign (mathematics). 
653 |a Spyware. 
653 |a Stream cipher. 
653 |a Substitution cipher. 
653 |a Symmetric-key algorithm. 
653 |a Transposition cipher. 
653 |a VIC cipher. 
653 |a Variable (computer science). 
653 |a Vigenère cipher. 
653 |a Vulnerability (computing). 
776 0 |c print  |z 9780691183312 
856 4 0 |u https://doi.org/10.1515/9780691184555?locatt=mode:legacy 
856 4 0 |u https://www.degruyter.com/isbn/9780691184555 
856 4 2 |3 Cover  |u https://www.degruyter.com/document/cover/isbn/9780691184555/original 
912 |a EBA_BACKALL 
912 |a EBA_CL_CHCOMSGSEN 
912 |a EBA_EBACKALL 
912 |a EBA_EBKALL 
912 |a EBA_ECL_CHCOMSGSEN 
912 |a EBA_EEBKALL 
912 |a EBA_ESTMALL 
912 |a EBA_PPALL 
912 |a EBA_STMALL 
912 |a GBV-deGruyter-alles 
912 |a PDA12STME 
912 |a PDA13ENGE 
912 |a PDA18STMEE 
912 |a PDA5EBK