Decrypted secrets: methods and maxims of cryptology
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English German |
Veröffentlicht: |
Berlin [u.a.]
Springer
2002
|
Ausgabe: | 3., rev. and upd. ed. |
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | XII, 473 S. Ill., graph. Darst. |
ISBN: | 3540426744 |
Internformat
MARC
LEADER | 00000nam a22000008c 4500 | ||
---|---|---|---|
001 | BV013981679 | ||
003 | DE-604 | ||
005 | 20160302 | ||
007 | t| | ||
008 | 011023s2002 gw ad|| |||| 00||| eng d | ||
016 | 7 | |a 962816086 |2 DE-101 | |
020 | |a 3540426744 |9 3-540-42674-4 | ||
035 | |a (OCoLC)48390885 | ||
035 | |a (DE-599)BVBBV013981679 | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 1 | |a eng |h ger | |
044 | |a gw |c DE | ||
049 | |a DE-739 |a DE-29T |a DE-824 |a DE-M347 |a DE-11 |a DE-91G | ||
050 | 0 | |a QA76.9.A25 | |
082 | 0 | |a 005.8 |2 21 | |
084 | |a SK 170 |0 (DE-625)143221: |2 rvk | ||
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
084 | |a DAT 465f |2 stub | ||
100 | 1 | |a Bauer, Friedrich L. |d 1924-2015 |e Verfasser |0 (DE-588)10427459X |4 aut | |
245 | 1 | 0 | |a Decrypted secrets |b methods and maxims of cryptology |c Friedrich L. Bauer |
250 | |a 3., rev. and upd. ed. | ||
264 | 1 | |a Berlin [u.a.] |b Springer |c 2002 | |
300 | |a XII, 473 S. |b Ill., graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
650 | 4 | |a Computer security | |
650 | 4 | |a Cryptography | |
650 | 0 | 7 | |a Kryptologie |0 (DE-588)4033329-2 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 0 | |5 DE-604 | |
856 | 4 | 2 | |m DNB Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=009571462&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-009571462 |
Datensatz im Suchindex
_version_ | 1816444522079453184 |
---|---|
adam_text |
CONTENTS
PART
I:
CRYPTOGRAPHY
.
1
1
INTRODUCTORY
SYNOPSIS
.
8
1.1
CRYPTOGRAPHY
AND
STEGANOGRAPHY
.
8
1.2
SEMAGRAMS
.
9
1.3
OPEN
CODE:
MASKING
.
12
1.4
CUES
.
16
1.5
OPEN
CODE:
VEILING
BY
NULLS
.
18
1.6
OPEN
CODE:
VEILING
BY
GRILLES
.
22
1.7
CLASSIFICATION
OF
CRYPTOGRAPHIC
METHODS
.
24
2
AIMS
AND
METHODS
OF
CRYPTOGRAPHY
.
25
2.1
THE
NATURE
OF
CRYPTOGRAPHY
.
25
2.2
ENCRYPTION
.
31
2.3
CRYPTOSYSTEMS
.
33
2.4
POLYPHONY
.
35
2.5
CHARACTER
SETS
.
37
2.6
KEYS
.
40
3
ENCRYPTION
STEPS:
SIMPLE
SUBSTITUTION
.
42
3.1
CASE
0
1
)
----
W
(UNIPARTITE
SIMPLE
SUBSTITUTIONS)
.
42
3.2
SPECIAL
CASE
V
-
-
V
(PERMUTATIONS)
.
44
3.3
CASE
0
1
)
W
M
(MULTIPARTITE
SIMPLE
SUBSTITUTIONS)
.
51
3.4
THE
GENERAL
CASE
0
1
)
----
JY(
M
)
(
STRADDLING
.
53
4
ENCRYPTION
STEPS:
POLYGRAPHIC
SUBSTITUTION
AND
CODING
.
56
4.1
CASE
V
2
----
(DIGRAPHIC
SUBSTITUTIONS)
.
56
4.2
SPECIAL
CASES
OF
PLAYFAIR
AND
DELASTELLE:
TOMOGRAPHIC
METHODS
.
62
4.3
CASE
V
3
-
(TRIGRAPHIC
SUBSTITUTIONS)
.
66
4.4
THE
GENERAL
CASE
0
"
)
-
W
M
)
:
CODES
.
66
5
ENCRYPTION
STEPS:
LINEAR
SUBSTITUTION
.
78
5.1
SELF-RECIPROCAL
LINEAR
SUBSTITUTIONS
.
80
5.2
HOMOGENEOUS
LINEAR
SUBSTITUTIONS
.
80
5.3
BINARY
LINEAR
SUBSTITUTIONS
.
84
5.4
GENERAL
LINEAR
SUBSTITUTIONS
.
84
X
CONTENTS
5.5
DECOMPOSED
LINEAR
SUBSTITUTIONS
.
85
5.6
DECIMATED
ALPHABETS
.
88
5.7
LINEAR
SUBSTITUTIONS
WITH
DECIMAL
AND
BINARY
NUMBERS
.
89
6
ENCRYPTION
STEPS:
TRANSPOSITION
.
91
6.1
SIMPLEST
METHODS
.
91
6.2
COLUMNAR
TRANSPOSITIONS
.
95
6.3
ANAGRAMS
.
98
7
POLYALPHABETIC
ENCRYPTION:
FAMILIES
OF
ALPHABETS
.
101
7.1
ITERATED
SUBSTITUTIONS
.
101
7.2
SHIFTED
AND
ROTATED
ALPHABETS
.
102
7.3
ROTOR
CRYPTO
MACHINES
.
105
7.4
SHIFTED
STANDARD
ALPHABETS:
VIGENERE
AND
BEAUFORT
.
114
7.5
UNRELATED
ALPHABETS
.
117
8
POLYALPHABETIC
ENCRYPTION:
KEYS
.
126
8.1
EARLY
METHODS
WITH
PERIODIC
KEYS
.
126
8.2
'
DOUBLE
KEY
'
.
128
8.3
VERNAM
ENCRYPTION
.
129
8.4
QUASI-NONPERIODIC
KEYS
.
131
8.5
MACHINES
THAT
GENERATE
THEIR
OWN
KEY
SEQUENCES
.
132
8.6
OFF-LINE
FORMING
OF
KEY
SEQUENCES
.
143
8.7
NONPERIODIC
KEYS
.
144
8.8
INDIVIDUAL,
ONE-TIME
KEYS
.
148
8.9
KEY
NEGOTIATION
AND
KEY
MANAGEMENT
.
151
9
COMPOSITION
OF
CLASSES
OF
METHODS
.
155
9.1
GROUP
PROPERTY
.
155
9.2
SUPERENCRYPTION
.
157
9.3
SIMILARITY
OF
ENCRYPTION
METHODS
.
159
9.4
SHANNON
'
S
'
PASTRY
DOUGH
MIXING
'
.
160
9.5
CONFUSION
AND
DIFFUSION
BY
ARITHMETICAL
OPERATIONS
.
166
9.6
DES
AND
IDEA
.
170
10
OPEN
ENCRYPTION
KEY
SYSTEMS
.
179
10.1
SYMMETRIC
AND
ASYMMETRIC
ENCRYPTION
METHODS
.
180
10.2
ONE-WAY
FUNCTIONS
.
182
10.3
RSA
METHOD
.
189
10.4
CRYPTANALYTIC
ATTACK
UPON
RSA
.
191
10.5
SECRECY
VERSUS
AUTHENTICATION
.
194
10.6
SECURITY
OF
PUBLIC
KEY
SYSTEMS
.
196
11
ENCRYPTION
SECURITY
.197
11.1
CRYPTOGRAPHIC
FAULTS
.
197
11.2
MAXIMS
OF
CRYPTOLOGY
.
205
11.3
SHANNON
'
S
YARDSTICKS
.
210
11.4
CRYPTOLOGY
AND
HUMAN
RIGHTS
.
211
CONTENTS
XI
PART
II:
CRYPTANALYSIS
.
217
12
EXHAUSTING
COMBINATORIAL
COMPLEXITY
.
220
12.1
MONOALPHABETIC
SIMPLE
ENCRYPTIONS
.
221
12.2
MONOALPHABETIC
POLYGRAPHIC
ENCRYPTIONS
.
222
12.3
POLYALPHABETIC
ENCRYPTIONS
.
225
12.4
GENERAL
REMARKS
ON
COMBINATORIAL
COMPLEXITY
.
227
12.5
CRYPTANALYSIS
BY
EXHAUSTION
.
227
12.6
UNICITY
DISTANCE
.
229
12.7
PRACTICAL
EXECUTION
OF
EXHAUSTION
.
231
12.8
MECHANIZING
THE
EXHAUSTION
.
234
13
ANATOMY
OF
LANGUAGE:
PATTERNS
.
235
13.1
INVARIANCE
OF
REPETITION
PATTERNS
.
235
13.2
EXCLUSION
OF
ENCRYPTION
METHODS
.
237
13.3
PATTERN
FINDING
.
238
13.4
FINDING
OF
POLYGRAPHIC
PATTERNS
.
242
13.5
THE
METHOD
OF
THE
PROBABLE
WORD
.
242
13.6
AUTOMATIC
EXHAUSTION
OF
THE
INSTANTIATIONS
OF
A
PATTERN
.
247
13.7
PANGRAMS
.
249
14
POLYALPHABETIC
CASE:
PROBABLE
WORDS
.
251
14.1
NON-COINCIDENCE
EXHAUSTION
OF
PROBABLE
WORD
POSITION
.
251
14.2
BINARY
NON-COINCIDENCE
EXHAUSTION
OF
PROBABLE
WORD
POSITION
.
254
14.3
THE
DE
VIARIS
ATTACK
.
255
14.4
ZIG-ZAG
EXHAUSTION
OF
PROBABLE
WORD
POSITION
.
263
14.5
THE
METHOD
OF
ISOMORPHS
.
264
14.6
COVERT
PLAINTEXT-CRYPTOTEXT
COMPROMISE
.
270
15
ANATOMY
OF
LANGUAGE:
FREQUENCIES
.
271
15.1
EXCLUSION
OF
ENCRYPTION
METHODS
.
271
15.2
INVARIANCE
OF
PARTITIONS
.
272
15.3
INTUITIVE
METHOD:
FREQUENCY
PROFILE
.
274
15.4
FREQUENCY
ORDERING
.
275
15.5
CLIQUES
AND
MATCHING
OF
PARTITIONS
.
278
15.6
OPTIMAL
MATCHING
.
284
15.7
FREQUENCY
OF
MULTIGRAMS
.
286
15.8
THE
COMBINED
METHOD
OF
FREQUENCY
MATCHING
.
291
15.9
FREQUENCY
MATCHING
FOR
POLYGRAPHIC
SUBSTITUTIONS
.
297
15.10
FREE-STYLE
METHODS
.
298
15.11
UNICITY
DISTANCE
REVISITED
.
299
16
KAPPA
AND
CHI
.
301
16.1
DEFINITION
AND
INVARIANCE
OF
KAPPA
.
301
16.2
DEFINITION
AND
INVARIANCE
OF
CHI
.
304
16.3
THE
KAPPA-CHI
THEOREM
.
306
16.4
THE
KAPPA-PHI
THEOREM
.
307
16.5
SYMMETRIC
FUNCTIONS
OF
CHARACTER
FREQUENCIES
.
309
XII
CONTENTS
17
PERIODICITY
EXAMINATION
.
311
17.1
THE
KAPPA
TEST
OF
FRIEDMAN
.
312
17.2
KAPPA
TEST
FOR
MULTIGRAMS
.
313
17.3
CRYPTANALYSIS
BY
MACHINES
.
314
17.4
KASISKI
EXAMINATION
.
320
17.5
BUILDING
A
DEPTH
AND
PHI
TEST
OF
KULLBACK
.
326
17.6
ESTIMATING
THE
PERIOD
LENGTH
.
329
18
ALIGNMENT
OF
ACCOMPANYING
ALPHABETS
.
331
18.1
MATCHING
THE
PROFILE
.
331
18.2
ALIGNING
AGAINST
KNOWN
ALPHABET
.
335
18.3
CHI
TEST:
MUTUAL
ALIGNMENT
OF
ACCOMPANYING
ALPHABETS
.
339
18.4
RECONSTRUCTION
OF
THE
PRIMARY
ALPHABET
.
344
18.5
KERCKHOFFS
'
SYMMETRY
OF
POSITION
.
346
18.6
STRIPPING
OFF
SUPERENCRYPTION:
DIFFERENCE
METHOD
.
351
18.7
DECRYPTION
OF
CODE
.
354
18.8
RECONSTRUCTION
OF
THE
PASSWORD
.
354
19
COMPROMISES
.
356
19.1
KERCKHOFFS
'
SUPERIMPOSITION
.
356
19.2
SUPERIMPOSITION
FOR
ENCRYPTIONS
WITH
A
KEY
GROUP
.
358
19.3
IN-PHASE
SUPERIMPOSITION
OF
SUPERENCRYPTED
CODE
.
373
19.4
CRYPTOTEXT-CRYPTOTEXT
COMPROMISES
.
376
19.5
A
METHOD
OF
SINKOV
.
381
19.6
CRYPTOTEXT-CRYPTOTEXT
COMPROMISE:
INDICATOR
DOUBLING
.
388
19.7
PLAINTEXT-CRYPTOTEXT
COMPROMISE:
FEEDBACK
CYCLE
.
403
20
LINEAR
BASIS
ANALYSIS
.
413
20.1
REDUCTION
OF
LINEAR
POLYGRAPHIC
SUBSTITUTIONS
.
413
20.2
RECONSTRUCTION
OF
THE
KEY
.
414
20.3
RECONSTRUCTION
OF
A
LINEAR
SHIFT
REGISTER
.
415
21
ANAGRAMMING
.
418
21.1
TRANSPOSITION
.
418
21.2
DOUBLE
COLUMNAR
TRANSPOSITION
.
421
21.3
MULTIPLE
ANAGRAMMING
.
421
22
CONCLUDING
REMARKS
.
424
22.1
SUCCESS
IN
BREAKING
.
425
22.2
MODE
OF
OPERATION
OF
THE
UNAUTHORIZED
DECRYPTOR
.
430
22.3
ILLUSORY
SECURITY
.
435
22.4
IMPORTANCE
OF
CRYPTOLOGY
.
436
APPENDIX:
AXIOMATIC
INFORMATION
THEORY
.
439
BIBLIOGRAPHY
.
449
INDEX
.
453
PHOTO
CREDITS
.
474 |
any_adam_object | 1 |
author | Bauer, Friedrich L. 1924-2015 |
author_GND | (DE-588)10427459X |
author_facet | Bauer, Friedrich L. 1924-2015 |
author_role | aut |
author_sort | Bauer, Friedrich L. 1924-2015 |
author_variant | f l b fl flb |
building | Verbundindex |
bvnumber | BV013981679 |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 |
callnumber-search | QA76.9.A25 |
callnumber-sort | QA 276.9 A25 |
callnumber-subject | QA - Mathematics |
classification_rvk | SK 170 ST 276 |
classification_tum | DAT 465f |
ctrlnum | (OCoLC)48390885 (DE-599)BVBBV013981679 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik Mathematik |
edition | 3., rev. and upd. ed. |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a22000008c 4500</leader><controlfield tag="001">BV013981679</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20160302</controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">011023s2002 gw ad|| |||| 00||| eng d</controlfield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">962816086</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">3540426744</subfield><subfield code="9">3-540-42674-4</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)48390885</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV013981679</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="1" ind2=" "><subfield code="a">eng</subfield><subfield code="h">ger</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">gw</subfield><subfield code="c">DE</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-739</subfield><subfield code="a">DE-29T</subfield><subfield code="a">DE-824</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-11</subfield><subfield code="a">DE-91G</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">QA76.9.A25</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">21</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">SK 170</subfield><subfield code="0">(DE-625)143221:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 465f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Bauer, Friedrich L.</subfield><subfield code="d">1924-2015</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)10427459X</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Decrypted secrets</subfield><subfield code="b">methods and maxims of cryptology</subfield><subfield code="c">Friedrich L. Bauer</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">3., rev. and upd. ed.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2002</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XII, 473 S.</subfield><subfield code="b">Ill., graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cryptography</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">DNB Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=009571462&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-009571462</subfield></datafield></record></collection> |
id | DE-604.BV013981679 |
illustrated | Illustrated |
indexdate | 2024-11-22T17:28:05Z |
institution | BVB |
isbn | 3540426744 |
language | English German |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-009571462 |
oclc_num | 48390885 |
open_access_boolean | |
owner | DE-739 DE-29T DE-824 DE-M347 DE-11 DE-91G DE-BY-TUM |
owner_facet | DE-739 DE-29T DE-824 DE-M347 DE-11 DE-91G DE-BY-TUM |
physical | XII, 473 S. Ill., graph. Darst. |
publishDate | 2002 |
publishDateSearch | 2002 |
publishDateSort | 2002 |
publisher | Springer |
record_format | marc |
spelling | Bauer, Friedrich L. 1924-2015 Verfasser (DE-588)10427459X aut Decrypted secrets methods and maxims of cryptology Friedrich L. Bauer 3., rev. and upd. ed. Berlin [u.a.] Springer 2002 XII, 473 S. Ill., graph. Darst. txt rdacontent n rdamedia nc rdacarrier Computer security Cryptography Kryptologie (DE-588)4033329-2 gnd rswk-swf Kryptologie (DE-588)4033329-2 s DE-604 DNB Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=009571462&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Bauer, Friedrich L. 1924-2015 Decrypted secrets methods and maxims of cryptology Computer security Cryptography Kryptologie (DE-588)4033329-2 gnd |
subject_GND | (DE-588)4033329-2 |
title | Decrypted secrets methods and maxims of cryptology |
title_auth | Decrypted secrets methods and maxims of cryptology |
title_exact_search | Decrypted secrets methods and maxims of cryptology |
title_full | Decrypted secrets methods and maxims of cryptology Friedrich L. Bauer |
title_fullStr | Decrypted secrets methods and maxims of cryptology Friedrich L. Bauer |
title_full_unstemmed | Decrypted secrets methods and maxims of cryptology Friedrich L. Bauer |
title_short | Decrypted secrets |
title_sort | decrypted secrets methods and maxims of cryptology |
title_sub | methods and maxims of cryptology |
topic | Computer security Cryptography Kryptologie (DE-588)4033329-2 gnd |
topic_facet | Computer security Cryptography Kryptologie |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=009571462&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT bauerfriedrichl decryptedsecretsmethodsandmaximsofcryptology |