Zum Hauptinhalt springen
Dekorationsartikel gehören nicht zum Leistungsumfang.
A Brief History of Cryptology and Cryptographic Algorithms
Taschenbuch von John F. Dooley
Sprache: Englisch

47,95 €*

inkl. MwSt.

Versandkostenfrei per Post / DHL

Lieferzeit 2-4 Werktage

Kategorien:
Beschreibung
The science of cryptology is made up of two halves. Cryptography is the study of how to create secure systems for communications. Cryptanalysis is the study of how to break those systems. The conflict between these two halves of cryptology is the story of secret writing. For over 2,000 years, the desire to communicate securely and secretly has resulted in the creation of numerous and increasingly complicated systems to protect one's messages. Yet for every system there is a cryptanalyst creating a new technique to break that system. With the advent of computers the cryptographer seems to finally have the upper hand. New mathematically based cryptographic algorithms that use computers for encryption and decryption are so secure that brute-force techniques seem to be the only way to break them ¿ so far. This work traces the history of the conflict between cryptographer and cryptanalyst, explores in some depth the algorithms created to protect messages, and suggests where the field is going in the future.
The science of cryptology is made up of two halves. Cryptography is the study of how to create secure systems for communications. Cryptanalysis is the study of how to break those systems. The conflict between these two halves of cryptology is the story of secret writing. For over 2,000 years, the desire to communicate securely and secretly has resulted in the creation of numerous and increasingly complicated systems to protect one's messages. Yet for every system there is a cryptanalyst creating a new technique to break that system. With the advent of computers the cryptographer seems to finally have the upper hand. New mathematically based cryptographic algorithms that use computers for encryption and decryption are so secure that brute-force techniques seem to be the only way to break them ¿ so far. This work traces the history of the conflict between cryptographer and cryptanalyst, explores in some depth the algorithms created to protect messages, and suggests where the field is going in the future.
Zusammenfassung

Traces the history of the conflict between cryptographer and cryptanalyst

Explores in some depth the algorithms created to protect messages

Suggests where the field of cryptology is going in the future

Inhaltsverzeichnis

Introduction: A Revolutionary Cipher.- Cryptology Before 1500: A Bit of Magic.- The Black Chambers: 1500 - 1776.- Crypto goes to War: 1861 - 1865.- Crypto and the War to End All Wars: 1914 - 1917.- The Interwar Period: 1919 - 1939.- The Coming of the Machines: 1918 - 1945.- The Machines Take Over: Computer Cryptography.- Alice and Bob and Whit and Martin: Public Key Crypto.

Details
Erscheinungsjahr: 2013
Genre: Informatik, Mathematik, Medizin, Naturwissenschaften, Technik
Rubrik: Naturwissenschaften & Technik
Medium: Taschenbuch
Reihe: SpringerBriefs in Computer Science
Inhalt: xii
99 S.
33 s/w Illustr.
99 p. 33 illus.
ISBN-13: 9783319016276
ISBN-10: 331901627X
Sprache: Englisch
Herstellernummer: 86264557
Ausstattung / Beilage: Paperback
Einband: Kartoniert / Broschiert
Autor: Dooley, John F.
Hersteller: Springer International Publishing
Springer International Publishing AG
SpringerBriefs in Computer Science
Verantwortliche Person für die EU: Springer Verlag GmbH, Tiergartenstr. 17, D-69121 Heidelberg, juergen.hartmann@springer.com
Maße: 235 x 155 x 7 mm
Von/Mit: John F. Dooley
Erscheinungsdatum: 15.10.2013
Gewicht: 0,184 kg
Artikel-ID: 105706058
Zusammenfassung

Traces the history of the conflict between cryptographer and cryptanalyst

Explores in some depth the algorithms created to protect messages

Suggests where the field of cryptology is going in the future

Inhaltsverzeichnis

Introduction: A Revolutionary Cipher.- Cryptology Before 1500: A Bit of Magic.- The Black Chambers: 1500 - 1776.- Crypto goes to War: 1861 - 1865.- Crypto and the War to End All Wars: 1914 - 1917.- The Interwar Period: 1919 - 1939.- The Coming of the Machines: 1918 - 1945.- The Machines Take Over: Computer Cryptography.- Alice and Bob and Whit and Martin: Public Key Crypto.

Details
Erscheinungsjahr: 2013
Genre: Informatik, Mathematik, Medizin, Naturwissenschaften, Technik
Rubrik: Naturwissenschaften & Technik
Medium: Taschenbuch
Reihe: SpringerBriefs in Computer Science
Inhalt: xii
99 S.
33 s/w Illustr.
99 p. 33 illus.
ISBN-13: 9783319016276
ISBN-10: 331901627X
Sprache: Englisch
Herstellernummer: 86264557
Ausstattung / Beilage: Paperback
Einband: Kartoniert / Broschiert
Autor: Dooley, John F.
Hersteller: Springer International Publishing
Springer International Publishing AG
SpringerBriefs in Computer Science
Verantwortliche Person für die EU: Springer Verlag GmbH, Tiergartenstr. 17, D-69121 Heidelberg, juergen.hartmann@springer.com
Maße: 235 x 155 x 7 mm
Von/Mit: John F. Dooley
Erscheinungsdatum: 15.10.2013
Gewicht: 0,184 kg
Artikel-ID: 105706058
Sicherheitshinweis

Ähnliche Produkte

Ähnliche Produkte