Start Over Please hold this item Export MARC Display Return To Browse
 
     
Limit search to available items
Record: Previous Record Next Record
Author Holden, Joshua, 1970- author.
Title The mathematics of secrets : cryptography from Caesar ciphers to digital encryption / Joshua Holden.
Publisher Princeton : Princeton University Press, [2017]



Descript 1 online resource (xiv, 373 pages) : illustrations
Content text txt
Media computer c
Carrier online resource cr
Descript text file PDF rda
Contents Introduction to ciphers and substitution. Alice and Bob and Carl and Julius: terminology and Caesar Cipher ; The key to the matter: generalizing the Caesar Cipher ; Multiplicative ciphers ; Affine ciphers ; Attack at dawn: cryptanalysis of sample substitution ciphers ; Just to get up that hill: polygraphic substitution ciphers ; Known-plaintext attacks ; Looking forward -- Polyalphabetic substitution ciphers. Homophonic ciphers ; Coincidence or conspiracy? ; Alberti ciphers ; It's hip to be square: Tabula Recta or Vigenère Square ciphers ; How many is many? ; Determining the number of alphabets ; Superman is staying for dinner: superimposition and reduction ; Products of polyalphabetic ciphers ; Pinwheel machines and rotor machines ; Looking forward -- Transposition ciphers. This is Sparta! The Scytale ; Rails and routes: geometric transposition ciphers ; Permutations and permutation ciphers ; Permutation products ; Keyed columnar transposition ciphers ; Determining the width of the rectangle ; Anagramming ; Looking forward -- Ciphers and computers. Bringing home the bacon: polyliteral ciphers and binary numerals ; Fractionating ciphers ; How to design a digital cipher: SP-networks and feistel networks ; The data encryption standard ; The advanced encryption standard ; Looking forward -- Stream ciphers. Running-key ciphers ; One-time pads ; Baby you can drive my car: autokey ciphers ; Linear feedback shift registers ; Adding nonlinearity to LFSRs ; Looking forward -- Ciphers involving exponentiation. Encrypting using exponentiation ; Fermat's little theorem ; Decrypting using exponentiation ; The discrete logarithm problem ; Composite moduli ; The Euler Phi function ; Decryption with composite moduli ; Looking forward -- Public-key ciphers. Right out in public: the idea of public-key ciphers ; Diffie-Hellman key agreement ; Asymmetric-key cryptography ; RSA ; Priming the pump: primality testing ; Why is RSA a (Good) public-key system? ; Cryptanalysis of RSA ; Looking forward -- Other public-key systems. The three-pass protocol ; ElGamal ; Elliptic curve cryptography ; Digital signatures ; Looking forward -- The future of cryptography. Quantum computing ; Postquantum cryptogaphy ; Quantum cryptography ; Looking forward.
Note In English.
ISBN 1400885620 (ebk)
9781400885626
9780691184555 (electronic book)
0691184550 (electronic book)
0691141754
9780691141756
Standard # 10.1515/9781400885626 doi
Standard no. 99974545040
Click on the terms below to find similar items in the catalogue
Author Holden, Joshua, 1970- author.
Subject Cryptography -- Mathematics.
Ciphers.
Computer security.
Descript 1 online resource (xiv, 373 pages) : illustrations
Content text txt
Media computer c
Carrier online resource cr
Descript text file PDF rda
Contents Introduction to ciphers and substitution. Alice and Bob and Carl and Julius: terminology and Caesar Cipher ; The key to the matter: generalizing the Caesar Cipher ; Multiplicative ciphers ; Affine ciphers ; Attack at dawn: cryptanalysis of sample substitution ciphers ; Just to get up that hill: polygraphic substitution ciphers ; Known-plaintext attacks ; Looking forward -- Polyalphabetic substitution ciphers. Homophonic ciphers ; Coincidence or conspiracy? ; Alberti ciphers ; It's hip to be square: Tabula Recta or Vigenère Square ciphers ; How many is many? ; Determining the number of alphabets ; Superman is staying for dinner: superimposition and reduction ; Products of polyalphabetic ciphers ; Pinwheel machines and rotor machines ; Looking forward -- Transposition ciphers. This is Sparta! The Scytale ; Rails and routes: geometric transposition ciphers ; Permutations and permutation ciphers ; Permutation products ; Keyed columnar transposition ciphers ; Determining the width of the rectangle ; Anagramming ; Looking forward -- Ciphers and computers. Bringing home the bacon: polyliteral ciphers and binary numerals ; Fractionating ciphers ; How to design a digital cipher: SP-networks and feistel networks ; The data encryption standard ; The advanced encryption standard ; Looking forward -- Stream ciphers. Running-key ciphers ; One-time pads ; Baby you can drive my car: autokey ciphers ; Linear feedback shift registers ; Adding nonlinearity to LFSRs ; Looking forward -- Ciphers involving exponentiation. Encrypting using exponentiation ; Fermat's little theorem ; Decrypting using exponentiation ; The discrete logarithm problem ; Composite moduli ; The Euler Phi function ; Decryption with composite moduli ; Looking forward -- Public-key ciphers. Right out in public: the idea of public-key ciphers ; Diffie-Hellman key agreement ; Asymmetric-key cryptography ; RSA ; Priming the pump: primality testing ; Why is RSA a (Good) public-key system? ; Cryptanalysis of RSA ; Looking forward -- Other public-key systems. The three-pass protocol ; ElGamal ; Elliptic curve cryptography ; Digital signatures ; Looking forward -- The future of cryptography. Quantum computing ; Postquantum cryptogaphy ; Quantum cryptography ; Looking forward.
Note In English.
ISBN 1400885620 (ebk)
9781400885626
9780691184555 (electronic book)
0691184550 (electronic book)
0691141754
9780691141756
Standard # 10.1515/9781400885626 doi
Standard no. 99974545040
Author Holden, Joshua, 1970- author.
Subject Cryptography -- Mathematics.
Ciphers.
Computer security.

Subject Cryptography -- Mathematics.
Ciphers.
Computer security.
Descript 1 online resource (xiv, 373 pages) : illustrations
Content text txt
Media computer c
Carrier online resource cr
Descript text file PDF rda
Contents Introduction to ciphers and substitution. Alice and Bob and Carl and Julius: terminology and Caesar Cipher ; The key to the matter: generalizing the Caesar Cipher ; Multiplicative ciphers ; Affine ciphers ; Attack at dawn: cryptanalysis of sample substitution ciphers ; Just to get up that hill: polygraphic substitution ciphers ; Known-plaintext attacks ; Looking forward -- Polyalphabetic substitution ciphers. Homophonic ciphers ; Coincidence or conspiracy? ; Alberti ciphers ; It's hip to be square: Tabula Recta or Vigenère Square ciphers ; How many is many? ; Determining the number of alphabets ; Superman is staying for dinner: superimposition and reduction ; Products of polyalphabetic ciphers ; Pinwheel machines and rotor machines ; Looking forward -- Transposition ciphers. This is Sparta! The Scytale ; Rails and routes: geometric transposition ciphers ; Permutations and permutation ciphers ; Permutation products ; Keyed columnar transposition ciphers ; Determining the width of the rectangle ; Anagramming ; Looking forward -- Ciphers and computers. Bringing home the bacon: polyliteral ciphers and binary numerals ; Fractionating ciphers ; How to design a digital cipher: SP-networks and feistel networks ; The data encryption standard ; The advanced encryption standard ; Looking forward -- Stream ciphers. Running-key ciphers ; One-time pads ; Baby you can drive my car: autokey ciphers ; Linear feedback shift registers ; Adding nonlinearity to LFSRs ; Looking forward -- Ciphers involving exponentiation. Encrypting using exponentiation ; Fermat's little theorem ; Decrypting using exponentiation ; The discrete logarithm problem ; Composite moduli ; The Euler Phi function ; Decryption with composite moduli ; Looking forward -- Public-key ciphers. Right out in public: the idea of public-key ciphers ; Diffie-Hellman key agreement ; Asymmetric-key cryptography ; RSA ; Priming the pump: primality testing ; Why is RSA a (Good) public-key system? ; Cryptanalysis of RSA ; Looking forward -- Other public-key systems. The three-pass protocol ; ElGamal ; Elliptic curve cryptography ; Digital signatures ; Looking forward -- The future of cryptography. Quantum computing ; Postquantum cryptogaphy ; Quantum cryptography ; Looking forward.
Note In English.
ISBN 1400885620 (ebk)
9781400885626
9780691184555 (electronic book)
0691184550 (electronic book)
0691141754
9780691141756
Standard # 10.1515/9781400885626 doi
Standard no. 99974545040

Links and services for this item: