Coverart for item
The Resource The mathematics of secrets : cryptography from Caesar ciphers to digital encryption, Joshua Holden

The mathematics of secrets : cryptography from Caesar ciphers to digital encryption, Joshua Holden

Label
The mathematics of secrets : cryptography from Caesar ciphers to digital encryption
Title
The mathematics of secrets
Title remainder
cryptography from Caesar ciphers to digital encryption
Statement of responsibility
Joshua Holden
Creator
Author
Subject
Genre
Language
eng
Summary
"The Mathematics of Secrets takes readers on a tour of the mathematics behind cryptography--the science of sending secret messages. Joshua Holden shows how mathematical principles underpin the ways that different codes and ciphers operate, as he focuses on both code making and code breaking. He discusses the majority of ancient and modern ciphers currently known, beginning by looking at substitution ciphers, built by substituting one letter or block of letters for another. Explaining one of the simplest and historically well-known ciphers, the Caesar cipher, Holden establishes the key mathematical idea behind the cipher and discusses how to introduce flexibility and additional notation. He explores polyalphabetic substitution ciphers, transposition ciphers, including one developed by the Spartans, connections between ciphers and computer encryption, stream ciphers, ciphers involving exponentiation, and public-key ciphers, where the methods used to encrypt messages are public knowledge, and yet, intended recipients are still the only ones who are able to read the message. Only basic mathematics up to high school algebra is needed to understand and enjoy the book."--Adapted from jacket flap
Cataloging source
IDEBK
http://library.link/vocab/creatorDate
1970-
http://library.link/vocab/creatorName
Holden, Joshua
Illustrations
illustrations
Index
index present
Language note
In English
Literary form
non fiction
Nature of contents
  • dictionaries
  • bibliography
http://library.link/vocab/subjectName
  • Cryptography
  • Ciphers
  • Computer security
  • Ciphers
  • COMPUTERS
  • Ciphers
  • Computer security
  • Cryptography
  • Chiffre
  • Chiffrierung
  • Computersicherheit
  • Kryptologie
  • Mathematik
Label
The mathematics of secrets : cryptography from Caesar ciphers to digital encryption, Joshua Holden
Instantiates
Publication
Bibliography note
Includes bibliographical references and index
Carrier category
online resource
Carrier category code
  • cr
Carrier MARC source
rdacarrier
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
  • Looking forward
  • Polyalphabetic substitution ciphers.
  • Homophonic ciphers
  • Coincidence or conspiracy?
  • Alberti ciphers
  • It's hip to be square: Tabula Recta or Vigenère Square ciphers
  • How many is many?
  • Determining the number of alphabets
  • Superman is staying for dinner: superimposition and reduction
  • Products of polyalphabetic ciphers
  • Introduction to ciphers and substitution.
  • Pinwheel machines and rotor machines
  • Looking forward
  • Transposition ciphers.
  • This is Sparta! The Scytale
  • Rails and routes: geometric transposition ciphers
  • Permutations and permutation ciphers
  • Permutation products
  • Keyed columnar transposition ciphers
  • Determining the width of the rectangle
  • Anagramming
  • Alice and Bob and Carl and Julius: terminology and Caesar Cipher
  • Looking forward
  • Ciphers and computers.
  • Bringing home the bacon: polyliteral ciphers and binary numerals
  • Fractionating ciphers
  • How to design a digital cipher: SP-networks and feistel networks
  • The data encryption standard
  • The advanced encryption standard
  • Looking forward
  • Stream ciphers.
  • Running-key ciphers
  • The key to the matter: generalizing the Caesar Cipher
  • One-time pads
  • Baby you can drive my car: autokey ciphers
  • Linear feedback shift registers
  • Adding nonlinearity to LFSRs
  • Looking forward
  • Ciphers involving exponentiation.
  • Encrypting using exponentiation
  • Fermat's little theorem
  • Decrypting using exponentiation
  • The discrete logarithm problem
  • Multiplicative ciphers
  • Composite moduli
  • The Euler Phi function
  • Decryption with composite moduli
  • Looking forward
  • Public-key ciphers.
  • Right out in public: the idea of public-key ciphers
  • Diffie-Hellman key agreement
  • Asymmetric-key cryptography
  • RSA
  • Priming the pump: primality testing
  • Affine ciphers
  • Why is RSA a (Good) public-key system?
  • Cryptanalysis of RSA
  • Looking forward
  • Other public-key systems.
  • The three-pass protocol
  • ElGamal
  • Elliptic curve cryptography
  • Digital signatures
  • Looking forward
  • The future of cryptography.
  • Attack at dawn: cryptanalysis of sample substitution ciphers
  • Quantum computing
  • Postquantum cryptogaphy
  • Quantum cryptography
  • Looking forward
  • Just to get up that hill: polygraphic substitution ciphers
  • Known-plaintext attacks
Control code
ocn972159290
Dimensions
unknown
Extent
1 online resource (xiv, 373 pages)
Form of item
online
Isbn
9780691184555
Media category
computer
Media MARC source
rdamedia
Media type code
  • c
Note
JSTOR
Other control number
  • 10.1515/9781400885626
  • 99974545040
Other physical details
illustrations
http://library.link/vocab/ext/overdrive/overdriveId
984633
Specific material designation
remote
System control number
(OCoLC)972159290
Label
The mathematics of secrets : cryptography from Caesar ciphers to digital encryption, Joshua Holden
Publication
Bibliography note
Includes bibliographical references and index
Carrier category
online resource
Carrier category code
  • cr
Carrier MARC source
rdacarrier
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
  • Looking forward
  • Polyalphabetic substitution ciphers.
  • Homophonic ciphers
  • Coincidence or conspiracy?
  • Alberti ciphers
  • It's hip to be square: Tabula Recta or Vigenère Square ciphers
  • How many is many?
  • Determining the number of alphabets
  • Superman is staying for dinner: superimposition and reduction
  • Products of polyalphabetic ciphers
  • Introduction to ciphers and substitution.
  • Pinwheel machines and rotor machines
  • Looking forward
  • Transposition ciphers.
  • This is Sparta! The Scytale
  • Rails and routes: geometric transposition ciphers
  • Permutations and permutation ciphers
  • Permutation products
  • Keyed columnar transposition ciphers
  • Determining the width of the rectangle
  • Anagramming
  • Alice and Bob and Carl and Julius: terminology and Caesar Cipher
  • Looking forward
  • Ciphers and computers.
  • Bringing home the bacon: polyliteral ciphers and binary numerals
  • Fractionating ciphers
  • How to design a digital cipher: SP-networks and feistel networks
  • The data encryption standard
  • The advanced encryption standard
  • Looking forward
  • Stream ciphers.
  • Running-key ciphers
  • The key to the matter: generalizing the Caesar Cipher
  • One-time pads
  • Baby you can drive my car: autokey ciphers
  • Linear feedback shift registers
  • Adding nonlinearity to LFSRs
  • Looking forward
  • Ciphers involving exponentiation.
  • Encrypting using exponentiation
  • Fermat's little theorem
  • Decrypting using exponentiation
  • The discrete logarithm problem
  • Multiplicative ciphers
  • Composite moduli
  • The Euler Phi function
  • Decryption with composite moduli
  • Looking forward
  • Public-key ciphers.
  • Right out in public: the idea of public-key ciphers
  • Diffie-Hellman key agreement
  • Asymmetric-key cryptography
  • RSA
  • Priming the pump: primality testing
  • Affine ciphers
  • Why is RSA a (Good) public-key system?
  • Cryptanalysis of RSA
  • Looking forward
  • Other public-key systems.
  • The three-pass protocol
  • ElGamal
  • Elliptic curve cryptography
  • Digital signatures
  • Looking forward
  • The future of cryptography.
  • Attack at dawn: cryptanalysis of sample substitution ciphers
  • Quantum computing
  • Postquantum cryptogaphy
  • Quantum cryptography
  • Looking forward
  • Just to get up that hill: polygraphic substitution ciphers
  • Known-plaintext attacks
Control code
ocn972159290
Dimensions
unknown
Extent
1 online resource (xiv, 373 pages)
Form of item
online
Isbn
9780691184555
Media category
computer
Media MARC source
rdamedia
Media type code
  • c
Note
JSTOR
Other control number
  • 10.1515/9781400885626
  • 99974545040
Other physical details
illustrations
http://library.link/vocab/ext/overdrive/overdriveId
984633
Specific material designation
remote
System control number
(OCoLC)972159290

Library Locations

    • Copley LibraryBorrow it
      5998 Alcalá Park, San Diego, CA, 92110-2492, US
      32.771354 -117.193327
Processing Feedback ...