Decrypted secrets: methods and maxims of cryptology ; with 29 tables
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Berlin [u.a.]
Springer
2007
|
Ausgabe: | 4., rev. and extended ed. |
Schlagworte: | |
Online-Zugang: | BTU01 FHM01 UBG01 UBY01 UPA01 UBR01 Volltext Inhaltsverzeichnis |
Beschreibung: | Literaturverz. S. 497 - 500 |
Beschreibung: | 1 Online-Ressource (XII, 524 S.) Ill., graph. Darst. 24 cm, 960 gr. |
ISBN: | 3540245022 9783540245025 9783540481218 |
DOI: | 10.1007/978-3-540-48121-8 |
Internformat
MARC
LEADER | 00000nmm a2200000 c 4500 | ||
---|---|---|---|
001 | BV022307416 | ||
003 | DE-604 | ||
005 | 20070313 | ||
007 | cr|uuu---uuuuu | ||
008 | 070312s2007 gw |||| o||u| ||||||eng d | ||
015 | |a 06,A46,0013 |2 dnb | ||
020 | |a 3540245022 |c Pp. : EUR 85.55 (freier Pr.), sfr 135.50 (freier Pr.) |9 3-540-24502-2 | ||
020 | |a 9783540245025 |c Pp. : EUR 85.55 (freier Pr.), sfr 135.50 (freier Pr.) |9 978-3-540-24502-5 | ||
020 | |a 9783540481218 |c Online |9 978-3-540-48121-8 | ||
024 | 7 | |a 10.1007/978-3-540-48121-8 |2 doi | |
024 | 3 | |a 9783540245025 | |
028 | 5 | 2 | |a 11383826 |
035 | |a (OCoLC)255507974 | ||
035 | |a (DE-599)BVBBV022307416 | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 0 | |a eng | |
044 | |a gw |c XA-DE-BE | ||
049 | |a DE-473 |a DE-739 |a DE-706 |a DE-M347 |a DE-634 |a DE-355 | ||
082 | 0 | |a 005.8 | |
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
084 | |a DAT 465f |2 stub | ||
084 | |a 004 |2 sdnb | ||
100 | 1 | |a Bauer, Friedrich L. |d 1924-2015 |e Verfasser |0 (DE-588)10427459X |4 aut | |
245 | 1 | 0 | |a Decrypted secrets |b methods and maxims of cryptology ; with 29 tables |c Friedrich L. Bauer |
250 | |a 4., rev. and extended ed. | ||
264 | 1 | |a Berlin [u.a.] |b Springer |c 2007 | |
300 | |a 1 Online-Ressource (XII, 524 S.) |b Ill., graph. Darst. |c 24 cm, 960 gr. | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Literaturverz. S. 497 - 500 | ||
650 | 0 | 7 | |a Kryptologie |0 (DE-588)4033329-2 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 0 | |5 DE-604 | |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-540-48121-8 |x Verlag |3 Volltext |
856 | 4 | 2 | |m HBZ Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=015517294&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
912 | |a ZDB-2-SCS | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-015517294 | ||
966 | e | |u https://doi.org/10.1007/978-3-540-48121-8 |l BTU01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-540-48121-8 |l FHM01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-540-48121-8 |l UBG01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-540-48121-8 |l UBY01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-540-48121-8 |l UPA01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-540-48121-8 |l UBR01 |p ZDB-2-SCS |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804136327601455104 |
---|---|
adam_text | Contents
Part I: Cryptography—The People 1
1 Introductory Synopsis 9
1.1 Cryptography and Steganography 9
1.2 Semagrams 10
1.3 Open Code: Masking 13
1.4 Cues 17
1.5 Open Code: Veiling by Nulls 19
1.6 Open Code: Veiling by Grilles 23
1.7 Classification of Cryptographic Methods 24
2 Aims and Methods of Cryptography 26
2.1 The Nature of Cryptography 26
2.2 Encryption 32
2.3 Cryptosystems 34
2.4 Polyphony 36
2.5 Character Sets 39
2.6 Keys 41
3 Encryption Steps: Simple Substitution 44
3.1 Case V(1) —¦+ W (Unipartite Simple Substitutions) 44
3.2 Special Case V ¦ —? V (Permutations) 46
3.3 Case F(1) — Wm (Multipartite Simple Substitutions) 53
3.4 The General Case V^ —+ W^ , Straddling 55
4 Encryption Steps: Polygraphic Substitution and Coding . 58
4.1 Case V2 — W^ (Digraphic Substitutions) 58
4.2 Special Cases of Playfair and Delastelle: Tomographic Methods.... 64
4.3 Case V3—¦ W{m) (Trigraphic Substitutions) 68
4.4 The General Case V™ — W m) : Codes 68
5 Encryption Steps: Linear Substitution 80
5.1 Self reciprocal Linear Substitutions 82
5.2 Homogeneous Linear Substitutions 82
5.3 Binary Linear Substitutions 86
5.4 General Linear Substitutions 86
5.5 Decomposed Linear Substitutions 87
X Contents
5.6 Decimated Alphabets 90
5.7 Linear Substitutions with Decimal and Binary Numbers 91
6 Encryption Steps: Transposition 93
6.1 Simplest Methods 93
6.2 Columnar Transpositions 98
6.3 Anagrams 102
7 Polyalphabetic Encryption: Families of Alphabets 106
7.1 Iterated Substitutions 106
7.2 Cyclically Shifted and Rotated Alphabets 107
7.3 Rotor Crypto Machines 110
7.4 Shifted Standard Alphabets: Vigenere and Beaufort 127
7.5 Unrelated Alphabets 131
8 Polyalphabetic Encryption: Keys 139
8.1 Early Methods with Periodic Keys 139
8.2 Double Key 141
8.3 Vernam Encryption 142
8.4 Quasi nonperiodic Keys 144
8.5 Machines that Generate Their Own Key Sequences 145
8.6 Off Line Forming of Key Sequences 156
8.7 Nonperiodic Keys 158
8.8 Individual, One Time Keys 161
8.9 Key Negotiation and Key Management 165
9 Composition of Classes of Methods 169
9.1 Group Property 169
9.2 Superencryption 171
9.3 Similarity of Encryption Methods 173
9.4 Shannon s Pastry Dough Mixing 174
9.5 Confusion and Diffusion by Arithmetical Operations 180
9.6 DES and IDEA® 184
10 Open Encryption Key Systems 193
10.1 Symmetric and Asymmetric Encryption Methods 194
10.2 One Way Functions 196
10.3 RSA Method 203
10.4 Cryptanalytic Attack upon RSA 205
10.5 Secrecy Versus Authentication 208
10.6 Security of Public Key Systems 210
11 Encryption Security 211
11.1 Cryptographic Faults 211
11.2 Maxims of Cryptology 220
11.3 Shannon s Yardsticks 225
11.4 Cryptology and Human Rights 226
Contents XI
Part II: Cryptanalysis—The Machinery 233
12 Exhausting Combinatorial Complexity 237
12.1 Monoalphabetic Simple Encryptions 238
12.2 Monoalphabetic Polygraphic Encryptions 239
12.3 Polyalphabetic Encryptions 241
12.4 General Remarks on Combinatorial Complexity 244
12.5 Cryptanalysis by Exhaustion 244
12.6 Unicity Distance 246
12.7 Practical Execution of Exhaustion 248
12.8 Mechanizing the Exhaustion 251
13 Anatomy of Language: Patterns 252
13.1 Invariance of Repetition Patterns 252
13.2 Exclusion of Encryption Methods 254
13.3 Pattern Finding 255
13.4 Finding of Polygraphic Patterns 259
13.5 The Method of the Probable Word 259
13.6 Automatic Exhaustion of the Instantiations of a Pattern 264
13.7 Pangrams 266
14 Polyalphabetic Case: Probable Words 268
14.1 Non Coincidence Exhaustion of Probable Word Position 268
14.2 Binary Non Coincidence Exhaustion 271
14.3 The De Viaris Attack 272
14.4 Zig Zag Exhaustion of Probable Word Position 280
14.5 The Method of Isomorphs 281
14.6 A clever brute force method: EINSing 287
14.7 Covert Plaintext Cryptotext Compromise 288
15 Anatomy of Language: Frequencies 290
15.1 Exclusion of Encryption Methods 290
15.2 Invariance of Partitions 291
15.3 Intuitive Method: Frequency Profile 293
15.4 Frequency Ordering 294
15.5 Cliques and Matching of Partitions 297
15.6 Optimal Matching 303
15.7 Frequency of Multigrams 305
15.8 The Combined Method of Frequency Matching 310
15.9 Frequency Matching for Polygraphic Substitutions 316
15.10 Free Style Methods 317
15.11 Unicity Distance Revisited 318
16 Kappa and Chi 320
16.1 Definition and Invariance of Kappa 320
16.2 Definition and Invariance of Chi 323
16.3 The Kappa Chi Theorem 325
16.4 The Kappa Phi Theorem 326
16.5 Symmetric Functions of Character Frequencies 328
XII Contents
17 Periodicity Examination 330
17.1 The Kappa Test of Friedman 331
17.2 Kappa Test for Multigrams 332
17.3 Cryptanalysis by Machines: Searching for a period 333
17.4 Kasiski Examination 339
17.5 Building a Depth and Phi Test of Kullback 345
17.6 Estimating the Period Length 348
18 Alignment of Accompanying Alphabets 350
18.1 Matching the Profile 350
18.2 Aligning Against Known Alphabet 354
18.3 Chi Test: Mutual Alignment of Accompanying Alphabets 358
18.4 Reconstruction of the Primary Alphabet 363
18.5 Kerckhoffs Symmetry of Position 365
18.6 Stripping off Superencryption: Difference Method 370
18.7 Decryption of Code 373
18.8 Reconstruction of the Password 373
19 Compromises 375
19.1 Kerckhoffs Superimposition 375
19.2 Superimposition for Encryptions with a Key Group 377
19.3 COLOSSUS 401
19.4 Adjustment in depth of Messages 412
19.5 Cryptotext Cryptotext Compromises 419
19.6 Cryptotext Cryptotext Compromise: ENIGMA Indicator Doubling 431
19.7 Plaintext Cryptotext Compromise: Feedback Cycle 448
20 Linear Basis Analysis 459
20.1 Reduction of Linear Polygraphic Substitutions 459
20.2 Reconstruction of the Key 460
20.3 Reconstruction of a Linear Shift Register 461
21 Anagramming 464
21.1 Transposition 464
21.2 Double Columnar Transposition 467
21.3 Multiple Anagramming 467
22 Concluding Remarks 470
22.1 Success in Breaking 471
22.2 Mode of Operation of the Unauthorized Decryptor 476
22.3 Illusory Security 482
22.4 Importance of Cryptology 484
Appendix: Axiomatic Information Theory 487
Bibliography 497
Index 501
Photo Credits 525
List of Color Plates4
Plate A The disk of Phaistos
Plate B Brass cipher disks
Plate C The Cryptograph of Wheatstone
Plate D The US Army cylinder device M 94
Plate E The US strip device M 138 T4
Plate F The cipher machine of Kryha
Plate G The Hagelin Cryptographer C 36
Plate H The US Army M 209, Hagelin licensed
Plate I The cipher machine ENIGMA with four rotors
Plate K Rotors of the ENIGMA
Plate L The British rotor machine TYPEX
Plate M Uhr box of the German Wehrmacht
Plate N Cipher teletype machine Lorenz SZ 42
Plate O Russian one time pad
Plate P Modern crypto board
Plate Q CRAY Supercomputers
4 In the middle of the book, following page 232 .
|
adam_txt |
Contents
Part I: Cryptography—The People 1
1 Introductory Synopsis 9
1.1 Cryptography and Steganography 9
1.2 Semagrams 10
1.3 Open Code: Masking 13
1.4 Cues 17
1.5 Open Code: Veiling by Nulls 19
1.6 Open Code: Veiling by Grilles 23
1.7 Classification of Cryptographic Methods 24
2 Aims and Methods of Cryptography 26
2.1 The Nature of Cryptography 26
2.2 Encryption 32
2.3 Cryptosystems 34
2.4 Polyphony 36
2.5 Character Sets 39
2.6 Keys 41
3 Encryption Steps: Simple Substitution 44
3.1 Case V(1) —¦+ W (Unipartite Simple Substitutions) 44
3.2 Special Case V ¦ —? V (Permutations) 46
3.3 Case F(1) — Wm (Multipartite Simple Substitutions) 53
3.4 The General Case V^ —+ W^ , Straddling 55
4 Encryption Steps: Polygraphic Substitution and Coding . 58
4.1 Case V2 — W^ (Digraphic Substitutions) 58
4.2 Special Cases of Playfair and Delastelle: Tomographic Methods. 64
4.3 Case V3—¦ W{m) (Trigraphic Substitutions) 68
4.4 The General Case V™ — W m) : Codes 68
5 Encryption Steps: Linear Substitution 80
5.1 Self reciprocal Linear Substitutions 82
5.2 Homogeneous Linear Substitutions 82
5.3 Binary Linear Substitutions 86
5.4 General Linear Substitutions 86
5.5 Decomposed Linear Substitutions 87
X Contents
5.6 Decimated Alphabets 90
5.7 Linear Substitutions with Decimal and Binary Numbers 91
6 Encryption Steps: Transposition 93
6.1 Simplest Methods 93
6.2 Columnar Transpositions 98
6.3 Anagrams 102
7 Polyalphabetic Encryption: Families of Alphabets 106
7.1 Iterated Substitutions 106
7.2 Cyclically Shifted and Rotated Alphabets 107
7.3 Rotor Crypto Machines 110
7.4 Shifted Standard Alphabets: Vigenere and Beaufort 127
7.5 Unrelated Alphabets 131
8 Polyalphabetic Encryption: Keys 139
8.1 Early Methods with Periodic Keys 139
8.2 'Double Key' 141
8.3 Vernam Encryption 142
8.4 Quasi nonperiodic Keys 144
8.5 Machines that Generate Their Own Key Sequences 145
8.6 Off Line Forming of Key Sequences 156
8.7 Nonperiodic Keys 158
8.8 Individual, One Time Keys 161
8.9 Key Negotiation and Key Management 165
9 Composition of Classes of Methods 169
9.1 Group Property 169
9.2 Superencryption 171
9.3 Similarity of Encryption Methods 173
9.4 Shannon's 'Pastry Dough Mixing' 174
9.5 Confusion and Diffusion by Arithmetical Operations 180
9.6 DES and IDEA® 184
10 Open Encryption Key Systems 193
10.1 Symmetric and Asymmetric Encryption Methods 194
10.2 One Way Functions 196
10.3 RSA Method 203
10.4 Cryptanalytic Attack upon RSA 205
10.5 Secrecy Versus Authentication 208
10.6 Security of Public Key Systems 210
11 Encryption Security 211
11.1 Cryptographic Faults 211
11.2 Maxims of Cryptology 220
11.3 Shannon's Yardsticks 225
11.4 Cryptology and Human Rights 226
Contents XI
Part II: Cryptanalysis—The Machinery 233
12 Exhausting Combinatorial Complexity 237
12.1 Monoalphabetic Simple Encryptions 238
12.2 Monoalphabetic Polygraphic Encryptions 239
12.3 Polyalphabetic Encryptions 241
12.4 General Remarks on Combinatorial Complexity 244
12.5 Cryptanalysis by Exhaustion 244
12.6 Unicity Distance 246
12.7 Practical Execution of Exhaustion 248
12.8 Mechanizing the Exhaustion 251
13 Anatomy of Language: Patterns 252
13.1 Invariance of Repetition Patterns 252
13.2 Exclusion of Encryption Methods 254
13.3 Pattern Finding 255
13.4 Finding of Polygraphic Patterns 259
13.5 The Method of the Probable Word 259
13.6 Automatic Exhaustion of the Instantiations of a Pattern 264
13.7 Pangrams 266
14 Polyalphabetic Case: Probable Words 268
14.1 Non Coincidence Exhaustion of Probable Word Position 268
14.2 Binary Non Coincidence Exhaustion 271
14.3 The De Viaris Attack 272
14.4 Zig Zag Exhaustion of Probable Word Position 280
14.5 The Method of Isomorphs 281
14.6 A clever brute force method: EINSing 287
14.7 Covert Plaintext Cryptotext Compromise 288
15 Anatomy of Language: Frequencies 290
15.1 Exclusion of Encryption Methods 290
15.2 Invariance of Partitions 291
15.3 Intuitive Method: Frequency Profile 293
15.4 Frequency Ordering 294
15.5 Cliques and Matching of Partitions 297
15.6 Optimal Matching 303
15.7 Frequency of Multigrams 305
15.8 The Combined Method of Frequency Matching 310
15.9 Frequency Matching for Polygraphic Substitutions 316
15.10 Free Style Methods 317
15.11 Unicity Distance Revisited 318
16 Kappa and Chi 320
16.1 Definition and Invariance of Kappa 320
16.2 Definition and Invariance of Chi 323
16.3 The Kappa Chi Theorem 325
16.4 The Kappa Phi Theorem 326
16.5 Symmetric Functions of Character Frequencies 328
XII Contents
17 Periodicity Examination 330
17.1 The Kappa Test of Friedman 331
17.2 Kappa Test for Multigrams 332
17.3 Cryptanalysis by Machines: Searching for a period 333
17.4 Kasiski Examination 339
17.5 Building a Depth and Phi Test of Kullback 345
17.6 Estimating the Period Length 348
18 Alignment of Accompanying Alphabets 350
18.1 Matching the Profile 350
18.2 Aligning Against Known Alphabet 354
18.3 Chi Test: Mutual Alignment of Accompanying Alphabets 358
18.4 Reconstruction of the Primary Alphabet 363
18.5 Kerckhoffs' Symmetry of Position 365
18.6 Stripping off Superencryption: Difference Method 370
18.7 Decryption of Code 373
18.8 Reconstruction of the Password 373
19 Compromises 375
19.1 Kerckhoffs' Superimposition 375
19.2 Superimposition for Encryptions with a Key Group 377
19.3 COLOSSUS 401
19.4 Adjustment 'in depth' of Messages 412
19.5 Cryptotext Cryptotext Compromises 419
19.6 Cryptotext Cryptotext Compromise: ENIGMA Indicator Doubling 431
19.7 Plaintext Cryptotext Compromise: Feedback Cycle 448
20 Linear Basis Analysis 459
20.1 Reduction of Linear Polygraphic Substitutions 459
20.2 Reconstruction of the Key 460
20.3 Reconstruction of a Linear Shift Register 461
21 Anagramming 464
21.1 Transposition 464
21.2 Double Columnar Transposition 467
21.3 Multiple Anagramming 467
22 Concluding Remarks 470
22.1 Success in Breaking 471
22.2 Mode of Operation of the Unauthorized Decryptor 476
22.3 Illusory Security 482
22.4 Importance of Cryptology 484
Appendix: Axiomatic Information Theory 487
Bibliography 497
Index 501
Photo Credits 525
List of Color Plates4
Plate A The disk of Phaistos
Plate B Brass cipher disks
Plate C The 'Cryptograph' of Wheatstone
Plate D The US Army cylinder device M 94
Plate E The US strip device M 138 T4
Plate F The cipher machine of Kryha
Plate G The Hagelin 'Cryptographer' C 36
Plate H The US Army M 209, Hagelin licensed
Plate I The cipher machine ENIGMA with four rotors
Plate K Rotors of the ENIGMA
Plate L The British rotor machine TYPEX
Plate M Uhr box of the German Wehrmacht
Plate N Cipher teletype machine Lorenz SZ 42
Plate O Russian one time pad
Plate P Modern crypto board
Plate Q CRAY Supercomputers
4 In the middle of the book, following page 232 . |
any_adam_object | 1 |
any_adam_object_boolean | 1 |
author | Bauer, Friedrich L. 1924-2015 |
author_GND | (DE-588)10427459X |
author_facet | Bauer, Friedrich L. 1924-2015 |
author_role | aut |
author_sort | Bauer, Friedrich L. 1924-2015 |
author_variant | f l b fl flb |
building | Verbundindex |
bvnumber | BV022307416 |
classification_rvk | ST 276 |
classification_tum | DAT 465f |
collection | ZDB-2-SCS |
ctrlnum | (OCoLC)255507974 (DE-599)BVBBV022307416 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
discipline_str_mv | Informatik |
doi_str_mv | 10.1007/978-3-540-48121-8 |
edition | 4., rev. and extended ed. |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02511nmm a2200553 c 4500</leader><controlfield tag="001">BV022307416</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20070313 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">070312s2007 gw |||| o||u| ||||||eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">06,A46,0013</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">3540245022</subfield><subfield code="c">Pp. : EUR 85.55 (freier Pr.), sfr 135.50 (freier Pr.)</subfield><subfield code="9">3-540-24502-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783540245025</subfield><subfield code="c">Pp. : EUR 85.55 (freier Pr.), sfr 135.50 (freier Pr.)</subfield><subfield code="9">978-3-540-24502-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783540481218</subfield><subfield code="c">Online</subfield><subfield code="9">978-3-540-48121-8</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-540-48121-8</subfield><subfield code="2">doi</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9783540245025</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">11383826</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)255507974</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV022307416</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">gw</subfield><subfield code="c">XA-DE-BE</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-473</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-355</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 465f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">004</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Bauer, Friedrich L.</subfield><subfield code="d">1924-2015</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)10427459X</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Decrypted secrets</subfield><subfield code="b">methods and maxims of cryptology ; with 29 tables</subfield><subfield code="c">Friedrich L. Bauer</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">4., rev. and extended ed.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2007</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XII, 524 S.)</subfield><subfield code="b">Ill., graph. Darst.</subfield><subfield code="c">24 cm, 960 gr.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Literaturverz. S. 497 - 500</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-540-48121-8</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">HBZ Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=015517294&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-015517294</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-540-48121-8</subfield><subfield code="l">BTU01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-540-48121-8</subfield><subfield code="l">FHM01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-540-48121-8</subfield><subfield code="l">UBG01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-540-48121-8</subfield><subfield code="l">UBY01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-540-48121-8</subfield><subfield code="l">UPA01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-540-48121-8</subfield><subfield code="l">UBR01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV022307416 |
illustrated | Illustrated |
index_date | 2024-07-02T16:57:16Z |
indexdate | 2024-07-09T20:54:38Z |
institution | BVB |
isbn | 3540245022 9783540245025 9783540481218 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-015517294 |
oclc_num | 255507974 |
open_access_boolean | |
owner | DE-473 DE-BY-UBG DE-739 DE-706 DE-M347 DE-634 DE-355 DE-BY-UBR |
owner_facet | DE-473 DE-BY-UBG DE-739 DE-706 DE-M347 DE-634 DE-355 DE-BY-UBR |
physical | 1 Online-Ressource (XII, 524 S.) Ill., graph. Darst. 24 cm, 960 gr. |
psigel | ZDB-2-SCS |
publishDate | 2007 |
publishDateSearch | 2007 |
publishDateSort | 2007 |
publisher | Springer |
record_format | marc |
spelling | Bauer, Friedrich L. 1924-2015 Verfasser (DE-588)10427459X aut Decrypted secrets methods and maxims of cryptology ; with 29 tables Friedrich L. Bauer 4., rev. and extended ed. Berlin [u.a.] Springer 2007 1 Online-Ressource (XII, 524 S.) Ill., graph. Darst. 24 cm, 960 gr. txt rdacontent c rdamedia cr rdacarrier Literaturverz. S. 497 - 500 Kryptologie (DE-588)4033329-2 gnd rswk-swf Kryptologie (DE-588)4033329-2 s DE-604 https://doi.org/10.1007/978-3-540-48121-8 Verlag Volltext HBZ Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=015517294&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Bauer, Friedrich L. 1924-2015 Decrypted secrets methods and maxims of cryptology ; with 29 tables Kryptologie (DE-588)4033329-2 gnd |
subject_GND | (DE-588)4033329-2 |
title | Decrypted secrets methods and maxims of cryptology ; with 29 tables |
title_auth | Decrypted secrets methods and maxims of cryptology ; with 29 tables |
title_exact_search | Decrypted secrets methods and maxims of cryptology ; with 29 tables |
title_exact_search_txtP | Decrypted secrets methods and maxims of cryptology ; with 29 tables |
title_full | Decrypted secrets methods and maxims of cryptology ; with 29 tables Friedrich L. Bauer |
title_fullStr | Decrypted secrets methods and maxims of cryptology ; with 29 tables Friedrich L. Bauer |
title_full_unstemmed | Decrypted secrets methods and maxims of cryptology ; with 29 tables Friedrich L. Bauer |
title_short | Decrypted secrets |
title_sort | decrypted secrets methods and maxims of cryptology with 29 tables |
title_sub | methods and maxims of cryptology ; with 29 tables |
topic | Kryptologie (DE-588)4033329-2 gnd |
topic_facet | Kryptologie |
url | https://doi.org/10.1007/978-3-540-48121-8 http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=015517294&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT bauerfriedrichl decryptedsecretsmethodsandmaximsofcryptologywith29tables |