Cargando…

The mathematics of secrets : cryptography from Caesar ciphers to digital encryption /

"The Mathematics of Secrets takes readers on a tour of the mathematics behind cryptography--the science of sending secret messages. Joshua Holden shows how mathematical principles underpin the ways that different codes and ciphers operate, as he focuses on both code making and code breaking. He...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Holden, Joshua, 1970- (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Princeton : Princeton University Press, [2017]
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000Ii 4500
001 JSTOR_ocn972159290
003 OCoLC
005 20231005004200.0
006 m o d
007 cr |n|||||||||
008 160405s2017 njua ob 001 0 eng d
040 |a IDEBK  |b eng  |e rda  |e pn  |c IDEBK  |d OCLCO  |d OCLCQ  |d YDX  |d N$T  |d EBLCP  |d MERUC  |d IDEBK  |d UAB  |d OCLCA  |d OCLCQ  |d IHT  |d DEGRU  |d OCLCA  |d OCLCQ  |d OCLCO  |d OCLCA  |d INT  |d OCLCQ  |d TKN  |d YDXIT  |d JSTOR  |d OCLCQ  |d MM9  |d UKAHL  |d OCLCQ  |d IEEEE  |d OCLCO  |d KSU  |d OCLCQ  |d FTB  |d INARC  |d OCLCQ  |d OCLCO 
019 |a 967393172  |a 971594292  |a 971914236  |a 972138720  |a 972289002  |a 972426978  |a 972573030  |a 972743122  |a 973896979  |a 974034290  |a 974331501  |a 974462901  |a 976306431  |a 979756664  |a 986667845  |a 986851510  |a 991214663  |a 992868640  |a 993448199  |a 993652387  |a 1013775515  |a 1024109396  |a 1030802197  |a 1035645604  |a 1036096783  |a 1042475879  |a 1050718744  |a 1076566075 
020 |a 9781400885626  |q electronic book 
020 |a 1400885620  |q electronic book 
020 |a 9780691184555  |q electronic book 
020 |a 0691184550  |q electronic book 
020 |z 9780691141756  |q hardcover 
020 |z 0691141754  |q hardcover 
024 7 |a 10.1515/9781400885626  |2 doi 
024 8 |a 99974545040 
029 1 |a AU@  |b 000059955576 
029 1 |a AU@  |b 000060227581 
029 1 |a AU@  |b 000062533420 
029 1 |a CHBIS  |b 011306288 
029 1 |a CHVBK  |b 530837455 
029 1 |a GBVCP  |b 882892606 
035 |a (OCoLC)972159290  |z (OCoLC)967393172  |z (OCoLC)971594292  |z (OCoLC)971914236  |z (OCoLC)972138720  |z (OCoLC)972289002  |z (OCoLC)972426978  |z (OCoLC)972573030  |z (OCoLC)972743122  |z (OCoLC)973896979  |z (OCoLC)974034290  |z (OCoLC)974331501  |z (OCoLC)974462901  |z (OCoLC)976306431  |z (OCoLC)979756664  |z (OCoLC)986667845  |z (OCoLC)986851510  |z (OCoLC)991214663  |z (OCoLC)992868640  |z (OCoLC)993448199  |z (OCoLC)993652387  |z (OCoLC)1013775515  |z (OCoLC)1024109396  |z (OCoLC)1030802197  |z (OCoLC)1035645604  |z (OCoLC)1036096783  |z (OCoLC)1042475879  |z (OCoLC)1050718744  |z (OCoLC)1076566075 
037 |a 984633  |b MIL 
037 |a 9452465  |b IEEE 
050 4 |a Z103  |b .H664 2017 
072 7 |a COM  |x 083000  |2 bisacsh 
082 0 4 |a 005.8/2  |2 23 
084 |a COM083000  |2 bisacsh 
049 |a UAMI 
100 1 |a Holden, Joshua,  |d 1970-  |e author. 
245 1 4 |a The mathematics of secrets :  |b cryptography from Caesar ciphers to digital encryption /  |c Joshua Holden. 
264 1 |a Princeton :  |b Princeton University Press,  |c [2017] 
300 |a 1 online resource (xiv, 373 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
504 |a Includes bibliographical references and index. 
520 |a "The Mathematics of Secrets takes readers on a tour of the mathematics behind cryptography--the science of sending secret messages. Joshua Holden shows how mathematical principles underpin the ways that different codes and ciphers operate, as he focuses on both code making and code breaking. He discusses the majority of ancient and modern ciphers currently known, beginning by looking at substitution ciphers, built by substituting one letter or block of letters for another. Explaining one of the simplest and historically well-known ciphers, the Caesar cipher, Holden establishes the key mathematical idea behind the cipher and discusses how to introduce flexibility and additional notation. He explores polyalphabetic substitution ciphers, transposition ciphers, including one developed by the Spartans, connections between ciphers and computer encryption, stream ciphers, ciphers involving exponentiation, and public-key ciphers, where the methods used to encrypt messages are public knowledge, and yet, intended recipients are still the only ones who are able to read the message. Only basic mathematics up to high school algebra is needed to understand and enjoy the book."--Adapted from jacket flap. 
505 0 0 |t Introduction to ciphers and substitution.  |t Alice and Bob and Carl and Julius: terminology and Caesar Cipher ;  |t The key to the matter: generalizing the Caesar Cipher ;  |t Multiplicative ciphers ;  |t Affine ciphers ;  |t Attack at dawn: cryptanalysis of sample substitution ciphers ;  |t Just to get up that hill: polygraphic substitution ciphers ;  |t Known-plaintext attacks ;  |t Looking forward --  |t Polyalphabetic substitution ciphers.  |t Homophonic ciphers ;  |t Coincidence or conspiracy? ;  |t Alberti ciphers ;  |t It's hip to be square: Tabula Recta or Vigenère Square ciphers ;  |t How many is many? ;  |t Determining the number of alphabets ;  |t Superman is staying for dinner: superimposition and reduction ;  |t Products of polyalphabetic ciphers ;  |t Pinwheel machines and rotor machines ;  |t Looking forward --  |t Transposition ciphers.  |t This is Sparta! The Scytale ;  |t Rails and routes: geometric transposition ciphers ;  |t Permutations and permutation ciphers ;  |t Permutation products ;  |t Keyed columnar transposition ciphers ;  |t Determining the width of the rectangle ;  |t Anagramming ;  |t Looking forward --  |t Ciphers and computers.  |t Bringing home the bacon: polyliteral ciphers and binary numerals ;  |t Fractionating ciphers ;  |t How to design a digital cipher: SP-networks and feistel networks ;  |t The data encryption standard ;  |t The advanced encryption standard ;  |t Looking forward --  |t Stream ciphers.  |t Running-key ciphers ;  |t One-time pads ;  |t Baby you can drive my car: autokey ciphers ;  |t Linear feedback shift registers ;  |t Adding nonlinearity to LFSRs ;  |t Looking forward --  |t Ciphers involving exponentiation.  |t Encrypting using exponentiation ;  |t Fermat's little theorem ;  |t Decrypting using exponentiation ;  |t The discrete logarithm problem ;  |t Composite moduli ;  |t The Euler Phi function ;  |t Decryption with composite moduli ;  |t Looking forward --  |t Public-key ciphers.  |t Right out in public: the idea of public-key ciphers ;  |t Diffie-Hellman key agreement ;  |t Asymmetric-key cryptography ;  |t RSA ;  |t Priming the pump: primality testing ;  |t Why is RSA a (Good) public-key system? ;  |t Cryptanalysis of RSA ;  |t Looking forward --  |t Other public-key systems.  |t The three-pass protocol ;  |t ElGamal ;  |t Elliptic curve cryptography ;  |t Digital signatures ;  |t Looking forward --  |t The future of cryptography.  |t Quantum computing ;  |t Postquantum cryptogaphy ;  |t Quantum cryptography ;  |t Looking forward. 
546 |a In English. 
588 |a Description based on online resource; title from digital title page (viewed on March 10, 2023). 
590 |a JSTOR  |b Books at JSTOR All Purchased 
590 |a JSTOR  |b Books at JSTOR Demand Driven Acquisitions (DDA) 
590 |a JSTOR  |b Books at JSTOR Evidence Based Acquisitions 
650 0 |a Cryptography  |x Mathematics. 
650 0 |a Ciphers. 
650 0 |a Computer security. 
650 1 |a Ciphers. 
650 6 |a Cryptographie  |x Mathématiques. 
650 6 |a Chiffres (Cryptographie) 
650 6 |a Sécurité informatique. 
650 7 |a ciphers (codes)  |2 aat 
650 7 |a COMPUTERS  |x Security  |x Cryptography.  |2 bisacsh 
650 7 |a Ciphers  |2 fast 
650 7 |a Computer security  |2 fast 
650 7 |a Cryptography  |x Mathematics  |2 fast 
650 7 |a Chiffre  |2 gnd 
650 7 |a Chiffrierung  |2 gnd 
650 7 |a Computersicherheit  |2 gnd 
650 7 |a Kryptologie  |2 gnd 
650 7 |a Mathematik  |2 gnd 
776 0 8 |i Print version:  |z 9781400885626 
856 4 0 |u https://jstor.uam.elogim.com/stable/10.2307/j.ctvc775xv  |z Texto completo 
938 |a Internet Archive  |b INAR  |n mathematicsofsec0000hold 
938 |a Askews and Holts Library Services  |b ASKH  |n AH32254906 
938 |a De Gruyter  |b DEGR  |n 9781400885626 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL5500264 
938 |a EBSCOhost  |b EBSC  |n 1434820 
938 |a ProQuest MyiLibrary Digital eBook Collection  |b IDEB  |n cis37130418 
938 |a YBP Library Services  |b YANK  |n 13415256 
938 |a YBP Library Services  |b YANK  |n 15682210 
994 |a 92  |b IZTAP