Codes and ciphers: Julius Caesar, the Enigma, and the internet
The design of code and cipher systems has undergone major changes in modern times. Powerful personal computers have resulted in an explosion of e-banking, e-commerce and e-mail, and as a consequence the encryption of communications to ensure security has become a matter of public interest and import...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Cambridge
Cambridge University Press
2002
|
Schlagworte: | |
Online-Zugang: | BSB01 FHN01 URL des Erstveröffentlichers |
Zusammenfassung: | The design of code and cipher systems has undergone major changes in modern times. Powerful personal computers have resulted in an explosion of e-banking, e-commerce and e-mail, and as a consequence the encryption of communications to ensure security has become a matter of public interest and importance. This book describes and analyses many cipher systems ranging from the earliest and elementary to the more recent and sophisticated, such as RSA and DES, as well as wartime machines such as the ENIGMA and Hagelin, and ciphers used by spies. Security issues and possible methods of attack are discussed and illustrated by examples. The design of many systems involves advanced mathematical concepts and this is explained in detail in a major appendix. This book will appeal to anyone interested in codes and ciphers as used by private individuals, spies, governments and industry throughout history |
Beschreibung: | Title from publisher's bibliographic system (viewed on 05 Oct 2015) |
Beschreibung: | 1 online resource (x, 240 pages) |
ISBN: | 9780511542978 |
DOI: | 10.1017/CBO9780511542978 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043945276 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 161206s2002 |||| o||u| ||||||eng d | ||
020 | |a 9780511542978 |c Online |9 978-0-511-54297-8 | ||
024 | 7 | |a 10.1017/CBO9780511542978 |2 doi | |
035 | |a (ZDB-20-CBO)CR9780511542978 | ||
035 | |a (OCoLC)849882372 | ||
035 | |a (DE-599)BVBBV043945276 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-12 |a DE-92 | ||
082 | 0 | |a 652/.8 |2 21 | |
084 | |a SK 170 |0 (DE-625)143221: |2 rvk | ||
100 | 1 | |a Churchhouse, R. F. |e Verfasser |4 aut | |
245 | 1 | 0 | |a Codes and ciphers |b Julius Caesar, the Enigma, and the internet |c R.F. Churchhouse |
246 | 1 | 3 | |a Codes & Ciphers |
264 | 1 | |a Cambridge |b Cambridge University Press |c 2002 | |
300 | |a 1 online resource (x, 240 pages) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Title from publisher's bibliographic system (viewed on 05 Oct 2015) | ||
505 | 8 | 0 | |g 1 |t Introduction |g 2 |t From Julius Caesar to simple substitution |g 3 |t Polyalphabetic systems |g 4 |t Jigsaw ciphers |g 5 |t Two-letter ciphers |g 6 |t Codes |g 7 |t Ciphers for spies |g 8 |t Producing random numbers and letters |g 9 |t The Enigma cipher machine |g 10 |t The Hagelin cipher machine |g 11 |t Beyond the Enigma |g 12 |t Public key cryptography |g 13 |t Encipherment and the internet |
520 | |a The design of code and cipher systems has undergone major changes in modern times. Powerful personal computers have resulted in an explosion of e-banking, e-commerce and e-mail, and as a consequence the encryption of communications to ensure security has become a matter of public interest and importance. This book describes and analyses many cipher systems ranging from the earliest and elementary to the more recent and sophisticated, such as RSA and DES, as well as wartime machines such as the ENIGMA and Hagelin, and ciphers used by spies. Security issues and possible methods of attack are discussed and illustrated by examples. The design of many systems involves advanced mathematical concepts and this is explained in detail in a major appendix. This book will appeal to anyone interested in codes and ciphers as used by private individuals, spies, governments and industry throughout history | ||
650 | 4 | |a Cryptography | |
650 | 4 | |a Ciphers | |
650 | 0 | 7 | |a Geschichte |0 (DE-588)4020517-4 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Chiffre |0 (DE-588)4135212-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptologie |0 (DE-588)4033329-2 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Chiffre |0 (DE-588)4135212-9 |D s |
689 | 0 | 1 | |a Geschichte |0 (DE-588)4020517-4 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
689 | 1 | 0 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 1 | 1 | |a Geschichte |0 (DE-588)4020517-4 |D s |
689 | 1 | |8 2\p |5 DE-604 | |
776 | 0 | 8 | |i Erscheint auch als |n Druckausgabe |z 978-0-521-00890-7 |
776 | 0 | 8 | |i Erscheint auch als |n Druckausgabe |z 978-0-521-81054-8 |
856 | 4 | 0 | |u https://doi.org/10.1017/CBO9780511542978 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-20-CBO | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-029354246 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
883 | 1 | |8 2\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
966 | e | |u https://doi.org/10.1017/CBO9780511542978 |l BSB01 |p ZDB-20-CBO |q BSB_PDA_CBO |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1017/CBO9780511542978 |l FHN01 |p ZDB-20-CBO |q FHN_PDA_CBO |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804176891340390400 |
---|---|
any_adam_object | |
author | Churchhouse, R. F. |
author_facet | Churchhouse, R. F. |
author_role | aut |
author_sort | Churchhouse, R. F. |
author_variant | r f c rf rfc |
building | Verbundindex |
bvnumber | BV043945276 |
classification_rvk | SK 170 |
collection | ZDB-20-CBO |
contents | Introduction From Julius Caesar to simple substitution Polyalphabetic systems Jigsaw ciphers Two-letter ciphers Codes Ciphers for spies Producing random numbers and letters The Enigma cipher machine The Hagelin cipher machine Beyond the Enigma Public key cryptography Encipherment and the internet |
ctrlnum | (ZDB-20-CBO)CR9780511542978 (OCoLC)849882372 (DE-599)BVBBV043945276 |
dewey-full | 652/.8 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 652 - Processes of written communication |
dewey-raw | 652/.8 |
dewey-search | 652/.8 |
dewey-sort | 3652 18 |
dewey-tens | 650 - Management and auxiliary services |
discipline | Mathematik Wirtschaftswissenschaften |
doi_str_mv | 10.1017/CBO9780511542978 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03495nmm a2200577zc 4500</leader><controlfield tag="001">BV043945276</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">161206s2002 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780511542978</subfield><subfield code="c">Online</subfield><subfield code="9">978-0-511-54297-8</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1017/CBO9780511542978</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-20-CBO)CR9780511542978</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)849882372</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043945276</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-12</subfield><subfield code="a">DE-92</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">652/.8</subfield><subfield code="2">21</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">SK 170</subfield><subfield code="0">(DE-625)143221:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Churchhouse, R. F.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Codes and ciphers</subfield><subfield code="b">Julius Caesar, the Enigma, and the internet</subfield><subfield code="c">R.F. Churchhouse</subfield></datafield><datafield tag="246" ind1="1" ind2="3"><subfield code="a">Codes & Ciphers</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cambridge</subfield><subfield code="b">Cambridge University Press</subfield><subfield code="c">2002</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (x, 240 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Title from publisher's bibliographic system (viewed on 05 Oct 2015)</subfield></datafield><datafield tag="505" ind1="8" ind2="0"><subfield code="g">1</subfield><subfield code="t">Introduction</subfield><subfield code="g">2</subfield><subfield code="t">From Julius Caesar to simple substitution</subfield><subfield code="g">3</subfield><subfield code="t">Polyalphabetic systems</subfield><subfield code="g">4</subfield><subfield code="t">Jigsaw ciphers</subfield><subfield code="g">5</subfield><subfield code="t">Two-letter ciphers</subfield><subfield code="g">6</subfield><subfield code="t">Codes</subfield><subfield code="g">7</subfield><subfield code="t">Ciphers for spies</subfield><subfield code="g">8</subfield><subfield code="t">Producing random numbers and letters</subfield><subfield code="g">9</subfield><subfield code="t">The Enigma cipher machine</subfield><subfield code="g">10</subfield><subfield code="t">The Hagelin cipher machine</subfield><subfield code="g">11</subfield><subfield code="t">Beyond the Enigma</subfield><subfield code="g">12</subfield><subfield code="t">Public key cryptography</subfield><subfield code="g">13</subfield><subfield code="t">Encipherment and the internet</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">The design of code and cipher systems has undergone major changes in modern times. Powerful personal computers have resulted in an explosion of e-banking, e-commerce and e-mail, and as a consequence the encryption of communications to ensure security has become a matter of public interest and importance. This book describes and analyses many cipher systems ranging from the earliest and elementary to the more recent and sophisticated, such as RSA and DES, as well as wartime machines such as the ENIGMA and Hagelin, and ciphers used by spies. Security issues and possible methods of attack are discussed and illustrated by examples. The design of many systems involves advanced mathematical concepts and this is explained in detail in a major appendix. This book will appeal to anyone interested in codes and ciphers as used by private individuals, spies, governments and industry throughout history</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cryptography</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Ciphers</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Geschichte</subfield><subfield code="0">(DE-588)4020517-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Chiffre</subfield><subfield code="0">(DE-588)4135212-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Chiffre</subfield><subfield code="0">(DE-588)4135212-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Geschichte</subfield><subfield code="0">(DE-588)4020517-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Geschichte</subfield><subfield code="0">(DE-588)4020517-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="8">2\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druckausgabe</subfield><subfield code="z">978-0-521-00890-7</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druckausgabe</subfield><subfield code="z">978-0-521-81054-8</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1017/CBO9780511542978</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-20-CBO</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-029354246</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">2\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1017/CBO9780511542978</subfield><subfield code="l">BSB01</subfield><subfield code="p">ZDB-20-CBO</subfield><subfield code="q">BSB_PDA_CBO</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1017/CBO9780511542978</subfield><subfield code="l">FHN01</subfield><subfield code="p">ZDB-20-CBO</subfield><subfield code="q">FHN_PDA_CBO</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV043945276 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:39:23Z |
institution | BVB |
isbn | 9780511542978 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-029354246 |
oclc_num | 849882372 |
open_access_boolean | |
owner | DE-12 DE-92 |
owner_facet | DE-12 DE-92 |
physical | 1 online resource (x, 240 pages) |
psigel | ZDB-20-CBO ZDB-20-CBO BSB_PDA_CBO ZDB-20-CBO FHN_PDA_CBO |
publishDate | 2002 |
publishDateSearch | 2002 |
publishDateSort | 2002 |
publisher | Cambridge University Press |
record_format | marc |
spelling | Churchhouse, R. F. Verfasser aut Codes and ciphers Julius Caesar, the Enigma, and the internet R.F. Churchhouse Codes & Ciphers Cambridge Cambridge University Press 2002 1 online resource (x, 240 pages) txt rdacontent c rdamedia cr rdacarrier Title from publisher's bibliographic system (viewed on 05 Oct 2015) 1 Introduction 2 From Julius Caesar to simple substitution 3 Polyalphabetic systems 4 Jigsaw ciphers 5 Two-letter ciphers 6 Codes 7 Ciphers for spies 8 Producing random numbers and letters 9 The Enigma cipher machine 10 The Hagelin cipher machine 11 Beyond the Enigma 12 Public key cryptography 13 Encipherment and the internet The design of code and cipher systems has undergone major changes in modern times. Powerful personal computers have resulted in an explosion of e-banking, e-commerce and e-mail, and as a consequence the encryption of communications to ensure security has become a matter of public interest and importance. This book describes and analyses many cipher systems ranging from the earliest and elementary to the more recent and sophisticated, such as RSA and DES, as well as wartime machines such as the ENIGMA and Hagelin, and ciphers used by spies. Security issues and possible methods of attack are discussed and illustrated by examples. The design of many systems involves advanced mathematical concepts and this is explained in detail in a major appendix. This book will appeal to anyone interested in codes and ciphers as used by private individuals, spies, governments and industry throughout history Cryptography Ciphers Geschichte (DE-588)4020517-4 gnd rswk-swf Chiffre (DE-588)4135212-9 gnd rswk-swf Kryptologie (DE-588)4033329-2 gnd rswk-swf Chiffre (DE-588)4135212-9 s Geschichte (DE-588)4020517-4 s 1\p DE-604 Kryptologie (DE-588)4033329-2 s 2\p DE-604 Erscheint auch als Druckausgabe 978-0-521-00890-7 Erscheint auch als Druckausgabe 978-0-521-81054-8 https://doi.org/10.1017/CBO9780511542978 Verlag URL des Erstveröffentlichers Volltext 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk 2\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Churchhouse, R. F. Codes and ciphers Julius Caesar, the Enigma, and the internet Introduction From Julius Caesar to simple substitution Polyalphabetic systems Jigsaw ciphers Two-letter ciphers Codes Ciphers for spies Producing random numbers and letters The Enigma cipher machine The Hagelin cipher machine Beyond the Enigma Public key cryptography Encipherment and the internet Cryptography Ciphers Geschichte (DE-588)4020517-4 gnd Chiffre (DE-588)4135212-9 gnd Kryptologie (DE-588)4033329-2 gnd |
subject_GND | (DE-588)4020517-4 (DE-588)4135212-9 (DE-588)4033329-2 |
title | Codes and ciphers Julius Caesar, the Enigma, and the internet |
title_alt | Codes & Ciphers Introduction From Julius Caesar to simple substitution Polyalphabetic systems Jigsaw ciphers Two-letter ciphers Codes Ciphers for spies Producing random numbers and letters The Enigma cipher machine The Hagelin cipher machine Beyond the Enigma Public key cryptography Encipherment and the internet |
title_auth | Codes and ciphers Julius Caesar, the Enigma, and the internet |
title_exact_search | Codes and ciphers Julius Caesar, the Enigma, and the internet |
title_full | Codes and ciphers Julius Caesar, the Enigma, and the internet R.F. Churchhouse |
title_fullStr | Codes and ciphers Julius Caesar, the Enigma, and the internet R.F. Churchhouse |
title_full_unstemmed | Codes and ciphers Julius Caesar, the Enigma, and the internet R.F. Churchhouse |
title_short | Codes and ciphers |
title_sort | codes and ciphers julius caesar the enigma and the internet |
title_sub | Julius Caesar, the Enigma, and the internet |
topic | Cryptography Ciphers Geschichte (DE-588)4020517-4 gnd Chiffre (DE-588)4135212-9 gnd Kryptologie (DE-588)4033329-2 gnd |
topic_facet | Cryptography Ciphers Geschichte Chiffre Kryptologie |
url | https://doi.org/10.1017/CBO9780511542978 |
work_keys_str_mv | AT churchhouserf codesandciphersjuliuscaesartheenigmaandtheinternet AT churchhouserf codesciphers |