The Resource The mathematics of secrets : cryptography from Caesar ciphers to digital encryption, Joshua Holden
The mathematics of secrets : cryptography from Caesar ciphers to digital encryption, Joshua Holden
Resource Information
The item The mathematics of secrets : cryptography from Caesar ciphers to digital encryption, Joshua Holden represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in University of San Diego Libraries.This item is available to borrow from 1 library branch.
Resource Information
The item The mathematics of secrets : cryptography from Caesar ciphers to digital encryption, Joshua Holden represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in University of San Diego Libraries.
This item is available to borrow from 1 library branch.
 Summary
 "The Mathematics of Secrets takes readers on a tour of the mathematics behind cryptographythe science of sending secret messages. Joshua Holden shows how mathematical principles underpin the ways that different codes and ciphers operate, as he focuses on both code making and code breaking. He discusses the majority of ancient and modern ciphers currently known, beginning by looking at substitution ciphers, built by substituting one letter or block of letters for another. Explaining one of the simplest and historically wellknown ciphers, the Caesar cipher, Holden establishes the key mathematical idea behind the cipher and discusses how to introduce flexibility and additional notation. He explores polyalphabetic substitution ciphers, transposition ciphers, including one developed by the Spartans, connections between ciphers and computer encryption, stream ciphers, ciphers involving exponentiation, and publickey ciphers, where the methods used to encrypt messages are public knowledge, and yet, intended recipients are still the only ones who are able to read the message. Only basic mathematics up to high school algebra is needed to understand and enjoy the book."Adapted from jacket flap
 Language
 eng
 Extent
 1 online resource (xiv, 373 pages)
 Contents

 Looking forward
 Polyalphabetic substitution ciphers.
 Homophonic ciphers
 Coincidence or conspiracy?
 Alberti ciphers
 It's hip to be square: Tabula Recta or Vigenère Square ciphers
 How many is many?
 Determining the number of alphabets
 Superman is staying for dinner: superimposition and reduction
 Products of polyalphabetic ciphers
 Introduction to ciphers and substitution.
 Pinwheel machines and rotor machines
 Looking forward
 Transposition ciphers.
 This is Sparta! The Scytale
 Rails and routes: geometric transposition ciphers
 Permutations and permutation ciphers
 Permutation products
 Keyed columnar transposition ciphers
 Determining the width of the rectangle
 Anagramming
 Alice and Bob and Carl and Julius: terminology and Caesar Cipher
 Looking forward
 Ciphers and computers.
 Bringing home the bacon: polyliteral ciphers and binary numerals
 Fractionating ciphers
 How to design a digital cipher: SPnetworks and feistel networks
 The data encryption standard
 The advanced encryption standard
 Looking forward
 Stream ciphers.
 Runningkey ciphers
 The key to the matter: generalizing the Caesar Cipher
 Onetime pads
 Baby you can drive my car: autokey ciphers
 Linear feedback shift registers
 Adding nonlinearity to LFSRs
 Looking forward
 Ciphers involving exponentiation.
 Encrypting using exponentiation
 Fermat's little theorem
 Decrypting using exponentiation
 The discrete logarithm problem
 Multiplicative ciphers
 Composite moduli
 The Euler Phi function
 Decryption with composite moduli
 Looking forward
 Publickey ciphers.
 Right out in public: the idea of publickey ciphers
 DiffieHellman key agreement
 Asymmetrickey cryptography
 RSA
 Priming the pump: primality testing
 Affine ciphers
 Why is RSA a (Good) publickey system?
 Cryptanalysis of RSA
 Looking forward
 Other publickey systems.
 The threepass protocol
 ElGamal
 Elliptic curve cryptography
 Digital signatures
 Looking forward
 The future of cryptography.
 Attack at dawn: cryptanalysis of sample substitution ciphers
 Quantum computing
 Postquantum cryptogaphy
 Quantum cryptography
 Looking forward
 Just to get up that hill: polygraphic substitution ciphers
 Knownplaintext attacks
 Isbn
 9780691184555
 Label
 The mathematics of secrets : cryptography from Caesar ciphers to digital encryption
 Title
 The mathematics of secrets
 Title remainder
 cryptography from Caesar ciphers to digital encryption
 Statement of responsibility
 Joshua Holden
 Language
 eng
 Summary
 "The Mathematics of Secrets takes readers on a tour of the mathematics behind cryptographythe science of sending secret messages. Joshua Holden shows how mathematical principles underpin the ways that different codes and ciphers operate, as he focuses on both code making and code breaking. He discusses the majority of ancient and modern ciphers currently known, beginning by looking at substitution ciphers, built by substituting one letter or block of letters for another. Explaining one of the simplest and historically wellknown ciphers, the Caesar cipher, Holden establishes the key mathematical idea behind the cipher and discusses how to introduce flexibility and additional notation. He explores polyalphabetic substitution ciphers, transposition ciphers, including one developed by the Spartans, connections between ciphers and computer encryption, stream ciphers, ciphers involving exponentiation, and publickey ciphers, where the methods used to encrypt messages are public knowledge, and yet, intended recipients are still the only ones who are able to read the message. Only basic mathematics up to high school algebra is needed to understand and enjoy the book."Adapted from jacket flap
 Cataloging source
 IDEBK
 http://library.link/vocab/creatorDate
 1970
 http://library.link/vocab/creatorName
 Holden, Joshua
 Illustrations
 illustrations
 Index
 index present
 Language note
 In English
 Literary form
 non fiction
 Nature of contents

 dictionaries
 bibliography
 http://library.link/vocab/subjectName

 Cryptography
 Ciphers
 Computer security
 Ciphers
 COMPUTERS
 Ciphers
 Computer security
 Cryptography
 Chiffre
 Chiffrierung
 Computersicherheit
 Kryptologie
 Mathematik
 Label
 The mathematics of secrets : cryptography from Caesar ciphers to digital encryption, Joshua Holden
 Bibliography note
 Includes bibliographical references and index
 Carrier category
 online resource
 Carrier category code

 cr
 Carrier MARC source
 rdacarrier
 Content category
 text
 Content type code

 txt
 Content type MARC source
 rdacontent
 Contents

 Looking forward
 Polyalphabetic substitution ciphers.
 Homophonic ciphers
 Coincidence or conspiracy?
 Alberti ciphers
 It's hip to be square: Tabula Recta or Vigenère Square ciphers
 How many is many?
 Determining the number of alphabets
 Superman is staying for dinner: superimposition and reduction
 Products of polyalphabetic ciphers
 Introduction to ciphers and substitution.
 Pinwheel machines and rotor machines
 Looking forward
 Transposition ciphers.
 This is Sparta! The Scytale
 Rails and routes: geometric transposition ciphers
 Permutations and permutation ciphers
 Permutation products
 Keyed columnar transposition ciphers
 Determining the width of the rectangle
 Anagramming
 Alice and Bob and Carl and Julius: terminology and Caesar Cipher
 Looking forward
 Ciphers and computers.
 Bringing home the bacon: polyliteral ciphers and binary numerals
 Fractionating ciphers
 How to design a digital cipher: SPnetworks and feistel networks
 The data encryption standard
 The advanced encryption standard
 Looking forward
 Stream ciphers.
 Runningkey ciphers
 The key to the matter: generalizing the Caesar Cipher
 Onetime pads
 Baby you can drive my car: autokey ciphers
 Linear feedback shift registers
 Adding nonlinearity to LFSRs
 Looking forward
 Ciphers involving exponentiation.
 Encrypting using exponentiation
 Fermat's little theorem
 Decrypting using exponentiation
 The discrete logarithm problem
 Multiplicative ciphers
 Composite moduli
 The Euler Phi function
 Decryption with composite moduli
 Looking forward
 Publickey ciphers.
 Right out in public: the idea of publickey ciphers
 DiffieHellman key agreement
 Asymmetrickey cryptography
 RSA
 Priming the pump: primality testing
 Affine ciphers
 Why is RSA a (Good) publickey system?
 Cryptanalysis of RSA
 Looking forward
 Other publickey systems.
 The threepass protocol
 ElGamal
 Elliptic curve cryptography
 Digital signatures
 Looking forward
 The future of cryptography.
 Attack at dawn: cryptanalysis of sample substitution ciphers
 Quantum computing
 Postquantum cryptogaphy
 Quantum cryptography
 Looking forward
 Just to get up that hill: polygraphic substitution ciphers
 Knownplaintext attacks
 Control code
 ocn972159290
 Dimensions
 unknown
 Extent
 1 online resource (xiv, 373 pages)
 Form of item
 online
 Isbn
 9780691184555
 Media category
 computer
 Media MARC source
 rdamedia
 Media type code

 c
 Note
 JSTOR
 Other control number

 10.1515/9781400885626
 99974545040
 Other physical details
 illustrations
 http://library.link/vocab/ext/overdrive/overdriveId
 984633
 Specific material designation
 remote
 System control number
 (OCoLC)972159290
 Label
 The mathematics of secrets : cryptography from Caesar ciphers to digital encryption, Joshua Holden
 Bibliography note
 Includes bibliographical references and index
 Carrier category
 online resource
 Carrier category code

 cr
 Carrier MARC source
 rdacarrier
 Content category
 text
 Content type code

 txt
 Content type MARC source
 rdacontent
 Contents

 Looking forward
 Polyalphabetic substitution ciphers.
 Homophonic ciphers
 Coincidence or conspiracy?
 Alberti ciphers
 It's hip to be square: Tabula Recta or Vigenère Square ciphers
 How many is many?
 Determining the number of alphabets
 Superman is staying for dinner: superimposition and reduction
 Products of polyalphabetic ciphers
 Introduction to ciphers and substitution.
 Pinwheel machines and rotor machines
 Looking forward
 Transposition ciphers.
 This is Sparta! The Scytale
 Rails and routes: geometric transposition ciphers
 Permutations and permutation ciphers
 Permutation products
 Keyed columnar transposition ciphers
 Determining the width of the rectangle
 Anagramming
 Alice and Bob and Carl and Julius: terminology and Caesar Cipher
 Looking forward
 Ciphers and computers.
 Bringing home the bacon: polyliteral ciphers and binary numerals
 Fractionating ciphers
 How to design a digital cipher: SPnetworks and feistel networks
 The data encryption standard
 The advanced encryption standard
 Looking forward
 Stream ciphers.
 Runningkey ciphers
 The key to the matter: generalizing the Caesar Cipher
 Onetime pads
 Baby you can drive my car: autokey ciphers
 Linear feedback shift registers
 Adding nonlinearity to LFSRs
 Looking forward
 Ciphers involving exponentiation.
 Encrypting using exponentiation
 Fermat's little theorem
 Decrypting using exponentiation
 The discrete logarithm problem
 Multiplicative ciphers
 Composite moduli
 The Euler Phi function
 Decryption with composite moduli
 Looking forward
 Publickey ciphers.
 Right out in public: the idea of publickey ciphers
 DiffieHellman key agreement
 Asymmetrickey cryptography
 RSA
 Priming the pump: primality testing
 Affine ciphers
 Why is RSA a (Good) publickey system?
 Cryptanalysis of RSA
 Looking forward
 Other publickey systems.
 The threepass protocol
 ElGamal
 Elliptic curve cryptography
 Digital signatures
 Looking forward
 The future of cryptography.
 Attack at dawn: cryptanalysis of sample substitution ciphers
 Quantum computing
 Postquantum cryptogaphy
 Quantum cryptography
 Looking forward
 Just to get up that hill: polygraphic substitution ciphers
 Knownplaintext attacks
 Control code
 ocn972159290
 Dimensions
 unknown
 Extent
 1 online resource (xiv, 373 pages)
 Form of item
 online
 Isbn
 9780691184555
 Media category
 computer
 Media MARC source
 rdamedia
 Media type code

 c
 Note
 JSTOR
 Other control number

 10.1515/9781400885626
 99974545040
 Other physical details
 illustrations
 http://library.link/vocab/ext/overdrive/overdriveId
 984633
 Specific material designation
 remote
 System control number
 (OCoLC)972159290
Library Links
Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa faexternallinksquare fafw"></i> Data from <span resource="http://link.sandiego.edu/portal/Themathematicsofsecretscryptographyfrom/hKMRNPEtyFc/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.sandiego.edu/portal/Themathematicsofsecretscryptographyfrom/hKMRNPEtyFc/">The mathematics of secrets : cryptography from Caesar ciphers to digital encryption, Joshua Holden</a></span>  <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.sandiego.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.sandiego.edu/">University of San Diego Libraries</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data  Experimental
Data Citation of the Item The mathematics of secrets : cryptography from Caesar ciphers to digital encryption, Joshua Holden
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa faexternallinksquare fafw"></i> Data from <span resource="http://link.sandiego.edu/portal/Themathematicsofsecretscryptographyfrom/hKMRNPEtyFc/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.sandiego.edu/portal/Themathematicsofsecretscryptographyfrom/hKMRNPEtyFc/">The mathematics of secrets : cryptography from Caesar ciphers to digital encryption, Joshua Holden</a></span>  <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.sandiego.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.sandiego.edu/">University of San Diego Libraries</a></span></span></span></span></div>