Fr. 262.80

Codes and Ciphers - Julius Caesar, the Enigma, and the Internet

Inglese · Copertina rigida

Spedizione di solito entro 1 a 3 settimane (non disponibile a breve termine)

Descrizione

Ulteriori informazioni

Informationen zum Autor Robert Churchhouse is Emeritus Professor of Computing Mathematics at Cardiff University and has lectured widely on mathematics and cryptanalysis at more than 50 Universities and Institutes throughout the the world. He is also the co-author of books on computers in mathematics, computers in literary and linguistic research, and numerical analysis. Klappentext The design of code and cipher systems has undergone major changes in modern times. Powerful personal computers have resulted in an explosion of e-banking, e-commerce and e-mail, and as a consequence the encryption of communications to ensure security has become a matter of public interest and importance. This book describes and analyses many cipher systems ranging from the earliest and elementary to the more recent and sophisticated, such as RSA and DES, as well as wartime machines such as the ENIGMA and Hagelin, and ciphers used by spies. Security issues and possible methods of attack are discussed and illustrated by examples. The design of many systems involves advanced mathematical concepts and this is explained in detail in a major appendix. This book will appeal to anyone interested in codes and ciphers as used by private individuals, spies, governments and industry throughout history. Zusammenfassung The design of code and cipher systems has undergone major changes in modern times! not least due to the advent of e-commerce. This book will appeal to anyone interested in codes and ciphers as used by private individuals! spies! governments and industry throughout history. Inhaltsverzeichnis Preface; 1. Introduction; 2. From Julius Caesar to simple substitution; 3. Polyalphabetic systems; 4. Jigsaw ciphers; 5. Two-letter ciphers; 6. Codes; 7. Ciphers for spies; 8. Producing random numbers and letters; 9. The Enigma cipher machine; 10. The Hagelin cipher machine; 11. Beyond the Enigma; 12. Public key cryptography; 13. Encipherment and the internet; Appendix; Solutions to problems; References; Name index; Subject index....

Recensioni dei clienti

Per questo articolo non c'è ancora nessuna recensione. Scrivi la prima recensione e aiuta gli altri utenti a scegliere.

Scrivi una recensione

Top o flop? Scrivi la tua recensione.

Per i messaggi a CeDe.ch si prega di utilizzare il modulo di contatto.

I campi contrassegnati da * sono obbligatori.

Inviando questo modulo si accetta la nostra dichiarazione protezione dati.