Codes: The Guide to Secrecy From Ancient to Modern Times by Richard A. Mollin

By Richard A. Mollin

From the Rosetta Stone to public-key cryptography, the paintings and technological know-how of cryptology has been used to liberate the vibrant background of historic cultures, to show the tide of struggle, and to thwart strength hackers from attacking desktops. Codes: The consultant to Secrecy from historic to fashionable instances explores the intensity and breadth of the sector, ultimate available to the uninitiated whereas keeping adequate rigor for the pro cryptologist.

The booklet starts off via tracing the improvement of cryptology from that of an arcane perform used, for instance, to hide alchemic recipes, to the fashionable medical strategy that's studied and hired this day. the rest of the publication explores the trendy features and purposes of cryptography, overlaying symmetric- and public-key cryptography, cryptographic protocols, key administration, message authentication, email and web defense, and complex purposes comparable to instant safety, clever playing cards, biometrics, and quantum cryptography. the writer additionally comprises non-cryptographic safeguard matters and a bankruptcy dedicated to info concept and coding. approximately 2 hundred diagrams, examples, figures, and tables in addition to considerable references and routines supplement the discussion.

Written by means of major authority and best-selling writer at the topic Richard A. Mollin, Codes: The consultant to Secrecy from old to fashionable occasions is the basic reference for an individual drawn to this fascinating and interesting box, from beginner to veteran practitioner.

Show description

Read or Download Codes: The Guide to Secrecy From Ancient to Modern Times (Discrete Mathematics and Its Applications) PDF

Similar cryptography books

Intrusion Detection And Correlation Challenges

Info how intrusion detection works in community safety with comparisons to conventional tools comparable to firewalls and cryptography
Analyzes the demanding situations in analyzing and correlating Intrusion Detection indicators

Introduction to cryptography, Second Edition

This ebook explains the fundamental tools of contemporary cryptography. it really is written for readers with in simple terms simple mathematical wisdom who're attracted to glossy cryptographic algorithms and their mathematical beginning. a number of workouts are integrated following every one bankruptcy. From the stories: "Gives a transparent and systematic advent into the topic whose acceptance is ever expanding, and will be suggested to all who want to know about cryptography.

Video Content Analysis Using Multimodal Information: For Movie Content Extraction, Indexing and Representation

Video content material research utilizing Multimodal details For motion picture ContentExtraction, Indexing and illustration is on content-based multimedia research, indexing, illustration and functions with a spotlight on function movies. awarded are the state-of-art suggestions in video content material research area, in addition to many novel rules and algorithms for motion picture content material research according to using multimodal info.

Cryptography. InfoSec Pro Guide

Safeguard Smarts for the Self-Guided IT specialist this whole, useful source for defense and IT execs offers the underpinnings of cryptography and lines examples of ways protection is greater industry-wide by way of encryption concepts. Cryptography: InfoSec professional consultant will give you an actionable, rock-solid beginning in encryption and may demystify even many of the more difficult techniques within the box.

Additional info for Codes: The Guide to Secrecy From Ancient to Modern Times (Discrete Mathematics and Its Applications)

Sample text

A glyph that represents only a sound, syllable, or even just a part of a word is called a phoneme. Yet, that is not all. A single logographic symbol might have many meanings. Also, any given glyph could represent a sound, a concept, or both. Hence, there are the interwoven problems of deciphering not only a symbol’s logographic meaning — what it represents — but also its phonetic meaning. Although the reader may find similarities in what we are describing here to what we described in the tackling of the Egyptian hieroglyphs, there are two major differences.

This may be viewed as a task equivalent to trying to crack the code of the Mayans as they would any contemporary cryptosystem. Given the wealth of talent and sophistication of computing and cryptanalytic techniques available today (much of which we will discuss in this book), the day of a complete understanding of the ancient Mayan script and its civilization’s secrets may well be at hand. 10 is a photograph of the Pyramid of the Magician in Uxmal, Yucat´an, Mexico. 1. Antiquity 19 AD, part of the late classic period.

He invented a means of enciphering letters into pairs of numbers as follows. 1. Then, look at the intersection of any row and column (with row number listed first and column number listed second) as the representation of the letter in question. For instance, k is 25 and q is 41. Hence, the letters are plaintext and the numbers are ciphertext. This device is called the Polybius checkerboard or Polybius square. Polybius’ intended use of his square was to send messages great distances by means of torches and hilltops.

Download PDF sample

Rated 4.11 of 5 – based on 17 votes