000 02887 a2200265 4500
008 140323b2013 xxu||||| |||| 00| 0 eng d
020 _a9781466561861
082 _a005.82
_bB2S3
100 _aBauer, Craig P.
_9234427
245 _aSecret history: the story of cryptology
260 _c2013
_bCRC Press
_aLondon
300 _axxv, 594 p.
365 _aUKP
_b44.99
440 _aDiscrete mathematics and its applications
_958420
520 _aMost available cryptology books primarily focus on either mathematics or history. Breaking this mold, Secret History: The Story of Cryptology gives a thorough yet accessible treatment of both the mathematics and history of cryptology. Requiring minimal mathematical prerequisites, the book presents the mathematics in sufficient detail and weaves the history throughout the chapters. In addition to the fascinating historical and political sides of cryptology, the author—a former Scholar-in-Residence at the U.S. National Security Agency (NSA) Center for Cryptologic History—includes interesting instances of codes and ciphers in crime, literature, music, and art. Following a mainly chronological development of concepts, the book focuses on classical cryptology in the first part. It covers Greek and Viking cryptography, the Vigenère cipher, the one-time pad, transposition ciphers, Jefferson’s cipher wheel, the Playfair cipher, ADFGX, matrix encryption, World War II cipher systems (including a detailed examination of Enigma), and many other classical methods introduced before World War II. The second part of the book examines modern cryptology. The author looks at the work of Claude Shannon and the origin and current status of the NSA, including some of its Suite B algorithms such as elliptic curve cryptography and the Advanced Encryption Standard. He also details the controversy that surrounded the Data Encryption Standard and the early years of public key cryptography. The book not only provides the how-to of the Diffie-Hellman key exchange and RSA algorithm, but also covers many attacks on the latter. Additionally, it discusses Elgamal, digital signatures, PGP, and stream ciphers and explores future directions such as quantum cryptography and DNA computing. With numerous real-world examples and extensive references, this book skillfully balances the historical aspects of cryptology with its mathematical details. It provides readers with a sound foundation in this dynamic field.
650 _aData encryption (Computer science)
_985173
650 _aComputer security
_956817
650 _aCryptography - History
_9234195
650 _aCiphers
_9158828
650 _aCOMPUTERS / Security / Cryptography
_9234196
650 _aMATHEMATICS / General
_9234197
650 _aMATHEMATICS / Combinatorics
_9234198
700 _aRosen, Kenneth. H.
_eSeries editor
_9234199
942 _cBK
999 _c179275
_d179275