The Mathematics of Secrets: Cryptography from Caesar Ciphers to Digital Encryption
The Mathematics of Secrets takes readers on a fascinating tour of the mathematics behind cryptography-the science of sending secret messages. Using a wide range of historical anecdotes and real-world examples, Joshua Holden shows how mathematical principles underpin the ways that different codes and...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Princeton, NJ
Princeton University Press
[2019]
|
Schlagworte: | |
Online-Zugang: | FAB01 FAW01 FCO01 FHA01 FKE01 FLA01 TUM01 UBY01 UPA01 URL des Erstveröffentlichers |
Zusammenfassung: | The Mathematics of Secrets takes readers on a fascinating tour of the mathematics behind cryptography-the science of sending secret messages. Using a wide range of historical anecdotes and real-world examples, Joshua Holden shows how mathematical principles underpin the ways that different codes and ciphers work. He focuses on both code making and code breaking and discusses most of the ancient and modern ciphers that are currently known. He begins by looking at substitution ciphers, and then discusses how to introduce flexibility and additional notation. Holden goes on to explore polyalphabetic substitution ciphers, transposition ciphers, connections between ciphers and computer encryption, stream ciphers, public-key ciphers, and ciphers involving exponentiation. He concludes by looking at the future of ciphers and where cryptography might be headed. The Mathematics of Secrets reveals the mathematics working stealthily in the science of coded messages.A blog describing new developments and historical discoveries in cryptography related to the material in this book is accessible at http://press.princeton.edu/titles/10826.html |
Beschreibung: | 1 online resource |
ISBN: | 9780691184555 |
DOI: | 10.1515/9780691184555 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV045928394 | ||
003 | DE-604 | ||
005 | 20210416 | ||
007 | cr|uuu---uuuuu | ||
008 | 190612s2019 |||| o||u| ||||||eng d | ||
020 | |a 9780691184555 |9 978-0-691-18455-5 | ||
024 | 7 | |a 10.1515/9780691184555 |2 doi | |
035 | |a (ZDB-23-DGG)9780691184555 | ||
035 | |a (OCoLC)1104916940 | ||
035 | |a (DE-599)BVBBV045928394 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-1046 |a DE-739 |a DE-860 |a DE-859 |a DE-Aug4 |a DE-91 |a DE-706 |a DE-1043 |a DE-858 | ||
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
084 | |a DAT 465n |2 stub | ||
084 | |a DAT 465f |2 stub | ||
100 | 1 | |a Holden, Joshua |d 1970- |e Verfasser |0 (DE-588)1140951904 |4 aut | |
245 | 1 | 0 | |a The Mathematics of Secrets |b Cryptography from Caesar Ciphers to Digital Encryption |c Joshua Holden |
264 | 1 | |a Princeton, NJ |b Princeton University Press |c [2019] | |
264 | 4 | |c © 2018 | |
300 | |a 1 online resource | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
520 | |a The Mathematics of Secrets takes readers on a fascinating tour of the mathematics behind cryptography-the science of sending secret messages. Using a wide range of historical anecdotes and real-world examples, Joshua Holden shows how mathematical principles underpin the ways that different codes and ciphers work. He focuses on both code making and code breaking and discusses most of the ancient and modern ciphers that are currently known. He begins by looking at substitution ciphers, and then discusses how to introduce flexibility and additional notation. Holden goes on to explore polyalphabetic substitution ciphers, transposition ciphers, connections between ciphers and computer encryption, stream ciphers, public-key ciphers, and ciphers involving exponentiation. He concludes by looking at the future of ciphers and where cryptography might be headed. The Mathematics of Secrets reveals the mathematics working stealthily in the science of coded messages.A blog describing new developments and historical discoveries in cryptography related to the material in this book is accessible at http://press.princeton.edu/titles/10826.html | ||
650 | 0 | 7 | |a Mathematik |0 (DE-588)4037944-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Chiffrierung |0 (DE-588)4352893-4 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptologie |0 (DE-588)4033329-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 0 | 1 | |a Chiffrierung |0 (DE-588)4352893-4 |D s |
689 | 0 | 2 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 3 | |a Mathematik |0 (DE-588)4037944-9 |D s |
689 | 0 | |5 DE-604 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-0-691-14175-6 |
856 | 4 | 0 | |u https://doi.org/10.1515/9780691184555 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-23-DGG |a ZDB-23-DMA |a ZDB-23-DEI | ||
940 | 1 | |q ZDB-23-DEI19 | |
999 | |a oai:aleph.bib-bvb.de:BVB01-031310831 | ||
966 | e | |u https://doi.org/10.1515/9780691184555?locatt=mode:legacy |l FAB01 |p ZDB-23-DGG |q FAB_PDA_DGG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1515/9780691184555?locatt=mode:legacy |l FAW01 |p ZDB-23-DGG |q FAW_PDA_DGG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1515/9780691184555?locatt=mode:legacy |l FCO01 |p ZDB-23-DGG |q FCO_PDA_DGG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1515/9780691184555?locatt=mode:legacy |l FHA01 |p ZDB-23-DGG |q FHA_PDA_DGG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1515/9780691184555?locatt=mode:legacy |l FKE01 |p ZDB-23-DGG |q FKE_PDA_DGG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1515/9780691184555?locatt=mode:legacy |l FLA01 |p ZDB-23-DGG |q FLA_PDA_DGG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1515/9780691184555?locatt=mode:legacy |l TUM01 |p ZDB-23-DMA |q TUM_Paketkauf |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1515/9780691184555?locatt=mode:legacy |l UBY01 |p ZDB-23-DEI |q ZDB-23-DEI19 |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1515/9780691184555?locatt=mode:legacy |l UPA01 |p ZDB-23-DGG |q UPA_PDA_DGG |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804180113434083328 |
---|---|
any_adam_object | |
author | Holden, Joshua 1970- |
author_GND | (DE-588)1140951904 |
author_facet | Holden, Joshua 1970- |
author_role | aut |
author_sort | Holden, Joshua 1970- |
author_variant | j h jh |
building | Verbundindex |
bvnumber | BV045928394 |
classification_rvk | ST 276 |
classification_tum | DAT 465n DAT 465f |
collection | ZDB-23-DGG ZDB-23-DMA ZDB-23-DEI |
ctrlnum | (ZDB-23-DGG)9780691184555 (OCoLC)1104916940 (DE-599)BVBBV045928394 |
discipline | Informatik |
doi_str_mv | 10.1515/9780691184555 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04102nmm a2200601zc 4500</leader><controlfield tag="001">BV045928394</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20210416 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">190612s2019 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780691184555</subfield><subfield code="9">978-0-691-18455-5</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1515/9780691184555</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-23-DGG)9780691184555</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1104916940</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV045928394</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-860</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-91</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-1043</subfield><subfield code="a">DE-858</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 465n</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 465f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Holden, Joshua</subfield><subfield code="d">1970-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1140951904</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">The Mathematics of Secrets</subfield><subfield code="b">Cryptography from Caesar Ciphers to Digital Encryption</subfield><subfield code="c">Joshua Holden</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Princeton, NJ</subfield><subfield code="b">Princeton University Press</subfield><subfield code="c">[2019]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2018</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">The Mathematics of Secrets takes readers on a fascinating tour of the mathematics behind cryptography-the science of sending secret messages. Using a wide range of historical anecdotes and real-world examples, Joshua Holden shows how mathematical principles underpin the ways that different codes and ciphers work. He focuses on both code making and code breaking and discusses most of the ancient and modern ciphers that are currently known. He begins by looking at substitution ciphers, and then discusses how to introduce flexibility and additional notation. Holden goes on to explore polyalphabetic substitution ciphers, transposition ciphers, connections between ciphers and computer encryption, stream ciphers, public-key ciphers, and ciphers involving exponentiation. He concludes by looking at the future of ciphers and where cryptography might be headed. The Mathematics of Secrets reveals the mathematics working stealthily in the science of coded messages.A blog describing new developments and historical discoveries in cryptography related to the material in this book is accessible at http://press.princeton.edu/titles/10826.html</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Mathematik</subfield><subfield code="0">(DE-588)4037944-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Chiffrierung</subfield><subfield code="0">(DE-588)4352893-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Chiffrierung</subfield><subfield code="0">(DE-588)4352893-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Mathematik</subfield><subfield code="0">(DE-588)4037944-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-0-691-14175-6</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1515/9780691184555</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-23-DGG</subfield><subfield code="a">ZDB-23-DMA</subfield><subfield code="a">ZDB-23-DEI</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-23-DEI19</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-031310831</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1515/9780691184555?locatt=mode:legacy</subfield><subfield code="l">FAB01</subfield><subfield code="p">ZDB-23-DGG</subfield><subfield code="q">FAB_PDA_DGG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1515/9780691184555?locatt=mode:legacy</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-23-DGG</subfield><subfield code="q">FAW_PDA_DGG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1515/9780691184555?locatt=mode:legacy</subfield><subfield code="l">FCO01</subfield><subfield code="p">ZDB-23-DGG</subfield><subfield code="q">FCO_PDA_DGG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1515/9780691184555?locatt=mode:legacy</subfield><subfield code="l">FHA01</subfield><subfield code="p">ZDB-23-DGG</subfield><subfield code="q">FHA_PDA_DGG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1515/9780691184555?locatt=mode:legacy</subfield><subfield code="l">FKE01</subfield><subfield code="p">ZDB-23-DGG</subfield><subfield code="q">FKE_PDA_DGG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1515/9780691184555?locatt=mode:legacy</subfield><subfield code="l">FLA01</subfield><subfield code="p">ZDB-23-DGG</subfield><subfield code="q">FLA_PDA_DGG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1515/9780691184555?locatt=mode:legacy</subfield><subfield code="l">TUM01</subfield><subfield code="p">ZDB-23-DMA</subfield><subfield code="q">TUM_Paketkauf</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1515/9780691184555?locatt=mode:legacy</subfield><subfield code="l">UBY01</subfield><subfield code="p">ZDB-23-DEI</subfield><subfield code="q">ZDB-23-DEI19</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1515/9780691184555?locatt=mode:legacy</subfield><subfield code="l">UPA01</subfield><subfield code="p">ZDB-23-DGG</subfield><subfield code="q">UPA_PDA_DGG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV045928394 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T08:30:36Z |
institution | BVB |
isbn | 9780691184555 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-031310831 |
oclc_num | 1104916940 |
open_access_boolean | |
owner | DE-1046 DE-739 DE-860 DE-859 DE-Aug4 DE-91 DE-BY-TUM DE-706 DE-1043 DE-858 |
owner_facet | DE-1046 DE-739 DE-860 DE-859 DE-Aug4 DE-91 DE-BY-TUM DE-706 DE-1043 DE-858 |
physical | 1 online resource |
psigel | ZDB-23-DGG ZDB-23-DMA ZDB-23-DEI ZDB-23-DEI19 ZDB-23-DGG FAB_PDA_DGG ZDB-23-DGG FAW_PDA_DGG ZDB-23-DGG FCO_PDA_DGG ZDB-23-DGG FHA_PDA_DGG ZDB-23-DGG FKE_PDA_DGG ZDB-23-DGG FLA_PDA_DGG ZDB-23-DMA TUM_Paketkauf ZDB-23-DEI ZDB-23-DEI19 ZDB-23-DGG UPA_PDA_DGG |
publishDate | 2019 |
publishDateSearch | 2019 |
publishDateSort | 2019 |
publisher | Princeton University Press |
record_format | marc |
spelling | Holden, Joshua 1970- Verfasser (DE-588)1140951904 aut The Mathematics of Secrets Cryptography from Caesar Ciphers to Digital Encryption Joshua Holden Princeton, NJ Princeton University Press [2019] © 2018 1 online resource txt rdacontent c rdamedia cr rdacarrier The Mathematics of Secrets takes readers on a fascinating tour of the mathematics behind cryptography-the science of sending secret messages. Using a wide range of historical anecdotes and real-world examples, Joshua Holden shows how mathematical principles underpin the ways that different codes and ciphers work. He focuses on both code making and code breaking and discusses most of the ancient and modern ciphers that are currently known. He begins by looking at substitution ciphers, and then discusses how to introduce flexibility and additional notation. Holden goes on to explore polyalphabetic substitution ciphers, transposition ciphers, connections between ciphers and computer encryption, stream ciphers, public-key ciphers, and ciphers involving exponentiation. He concludes by looking at the future of ciphers and where cryptography might be headed. The Mathematics of Secrets reveals the mathematics working stealthily in the science of coded messages.A blog describing new developments and historical discoveries in cryptography related to the material in this book is accessible at http://press.princeton.edu/titles/10826.html Mathematik (DE-588)4037944-9 gnd rswk-swf Chiffrierung (DE-588)4352893-4 gnd rswk-swf Kryptologie (DE-588)4033329-2 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Kryptologie (DE-588)4033329-2 s Chiffrierung (DE-588)4352893-4 s Computersicherheit (DE-588)4274324-2 s Mathematik (DE-588)4037944-9 s DE-604 Erscheint auch als Druck-Ausgabe 978-0-691-14175-6 https://doi.org/10.1515/9780691184555 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Holden, Joshua 1970- The Mathematics of Secrets Cryptography from Caesar Ciphers to Digital Encryption Mathematik (DE-588)4037944-9 gnd Chiffrierung (DE-588)4352893-4 gnd Kryptologie (DE-588)4033329-2 gnd Computersicherheit (DE-588)4274324-2 gnd |
subject_GND | (DE-588)4037944-9 (DE-588)4352893-4 (DE-588)4033329-2 (DE-588)4274324-2 |
title | The Mathematics of Secrets Cryptography from Caesar Ciphers to Digital Encryption |
title_auth | The Mathematics of Secrets Cryptography from Caesar Ciphers to Digital Encryption |
title_exact_search | The Mathematics of Secrets Cryptography from Caesar Ciphers to Digital Encryption |
title_full | The Mathematics of Secrets Cryptography from Caesar Ciphers to Digital Encryption Joshua Holden |
title_fullStr | The Mathematics of Secrets Cryptography from Caesar Ciphers to Digital Encryption Joshua Holden |
title_full_unstemmed | The Mathematics of Secrets Cryptography from Caesar Ciphers to Digital Encryption Joshua Holden |
title_short | The Mathematics of Secrets |
title_sort | the mathematics of secrets cryptography from caesar ciphers to digital encryption |
title_sub | Cryptography from Caesar Ciphers to Digital Encryption |
topic | Mathematik (DE-588)4037944-9 gnd Chiffrierung (DE-588)4352893-4 gnd Kryptologie (DE-588)4033329-2 gnd Computersicherheit (DE-588)4274324-2 gnd |
topic_facet | Mathematik Chiffrierung Kryptologie Computersicherheit |
url | https://doi.org/10.1515/9780691184555 |
work_keys_str_mv | AT holdenjoshua themathematicsofsecretscryptographyfromcaesarcipherstodigitalencryption |