Real Life Cryptology:
A large number of enciphered documents survived from early modern Hungary. This area was a particularly fertile territory where cryptographic methods proliferated, because a large portion of the population was living in the frontier zone, and participated (or was forced to participate) in the networ...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Amsterdam
Amsterdam University Press
[2018]
|
Schlagworte: | |
Online-Zugang: | FAW01 FHA01 FKE01 FLA01 UPA01 UBG01 FAB01 FCO01 Volltext |
Zusammenfassung: | A large number of enciphered documents survived from early modern Hungary. This area was a particularly fertile territory where cryptographic methods proliferated, because a large portion of the population was living in the frontier zone, and participated (or was forced to participate) in the network of the information flow. A quantitative analysis of sixteenth-century to seventeenth-century Hungarian ciphers (300 cipher keys and 1,600 partly or entirely enciphered letters) reveals that besides the dominance of diplomatic use of cryptography, there were many examples of ŸprivateŒ applications too. This book reconstructs the main reasons and goals why historical actors chose to use ciphers in a diplomatic letter, a military order, a diary or a private letter, what they decided to encrypt, and how they perceived the dangers threatening their messages |
Beschreibung: | Description based on online resource; title from PDF title page (publisher's Web site, viewed 30. Apr 2019) |
Beschreibung: | 1 online resource |
ISBN: | 9789048536696 |
DOI: | 10.1515/9789048536696 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV045930858 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 190612s2018 |||| o||u| ||||||eng d | ||
020 | |a 9789048536696 |9 978-90-485-3669-6 | ||
024 | 7 | |a 10.1515/9789048536696 |2 doi | |
035 | |a (ZDB-23-DGG)9789048536696 | ||
035 | |a (OCoLC)1104879821 | ||
035 | |a (DE-599)BVBBV045930858 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-473 |a DE-1046 |a DE-739 |a DE-860 |a DE-859 |a DE-Aug4 |a DE-1043 |a DE-858 | ||
100 | 1 | |a Lang, Benedek |e Verfasser |4 aut | |
245 | 1 | 0 | |a Real Life Cryptology |c Benedek Lang |
264 | 1 | |a Amsterdam |b Amsterdam University Press |c [2018] | |
264 | 4 | |c © 2018 | |
300 | |a 1 online resource | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Description based on online resource; title from PDF title page (publisher's Web site, viewed 30. Apr 2019) | ||
520 | |a A large number of enciphered documents survived from early modern Hungary. This area was a particularly fertile territory where cryptographic methods proliferated, because a large portion of the population was living in the frontier zone, and participated (or was forced to participate) in the network of the information flow. A quantitative analysis of sixteenth-century to seventeenth-century Hungarian ciphers (300 cipher keys and 1,600 partly or entirely enciphered letters) reveals that besides the dominance of diplomatic use of cryptography, there were many examples of ŸprivateŒ applications too. This book reconstructs the main reasons and goals why historical actors chose to use ciphers in a diplomatic letter, a military order, a diary or a private letter, what they decided to encrypt, and how they perceived the dangers threatening their messages | ||
546 | |a In English | ||
648 | 7 | |a Geschichte 1470-1756 |2 gnd |9 rswk-swf | |
650 | 7 | |a HISTORY / Europe / Austria & Hungary |2 bisacsh | |
650 | 0 | 7 | |a Geheimschrift |0 (DE-588)4156317-7 |2 gnd |9 rswk-swf |
651 | 7 | |a Ungarn |0 (DE-588)4078541-5 |2 gnd |9 rswk-swf | |
689 | 0 | 0 | |a Ungarn |0 (DE-588)4078541-5 |D g |
689 | 0 | 1 | |a Geheimschrift |0 (DE-588)4156317-7 |D s |
689 | 0 | 2 | |a Geschichte 1470-1756 |A z |
689 | 0 | |8 1\p |5 DE-604 | |
856 | 4 | 0 | |u https://doi.org/10.1515/9789048536696 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-23-DGG | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-031313295 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
966 | e | |u https://doi.org/10.1515/9789048536696 |l FAW01 |p ZDB-23-DGG |q FAW_PDA_DGG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1515/9789048536696 |l FHA01 |p ZDB-23-DGG |q FHA_PDA_DGG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1515/9789048536696 |l FKE01 |p ZDB-23-DGG |q FKE_PDA_DGG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1515/9789048536696 |l FLA01 |p ZDB-23-DGG |q FLA_PDA_DGG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1515/9789048536696 |l UPA01 |p ZDB-23-DGG |q UPA_PDA_DGG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1515/9789048536696 |l UBG01 |p ZDB-23-DGG |q UBG_PDA_DGG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1515/9789048536696 |l FAB01 |p ZDB-23-DGG |q FAB_PDA_DGG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1515/9789048536696 |l FCO01 |p ZDB-23-DGG |q FCO_PDA_DGG |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804180118919184384 |
---|---|
any_adam_object | |
author | Lang, Benedek |
author_facet | Lang, Benedek |
author_role | aut |
author_sort | Lang, Benedek |
author_variant | b l bl |
building | Verbundindex |
bvnumber | BV045930858 |
collection | ZDB-23-DGG |
ctrlnum | (ZDB-23-DGG)9789048536696 (OCoLC)1104879821 (DE-599)BVBBV045930858 |
doi_str_mv | 10.1515/9789048536696 |
era | Geschichte 1470-1756 gnd |
era_facet | Geschichte 1470-1756 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03359nmm a2200553zc 4500</leader><controlfield tag="001">BV045930858</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">190612s2018 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9789048536696</subfield><subfield code="9">978-90-485-3669-6</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1515/9789048536696</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-23-DGG)9789048536696</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1104879821</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV045930858</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-473</subfield><subfield code="a">DE-1046</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-860</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-1043</subfield><subfield code="a">DE-858</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Lang, Benedek</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Real Life Cryptology</subfield><subfield code="c">Benedek Lang</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Amsterdam</subfield><subfield code="b">Amsterdam University Press</subfield><subfield code="c">[2018]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2018</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Description based on online resource; title from PDF title page (publisher's Web site, viewed 30. Apr 2019)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">A large number of enciphered documents survived from early modern Hungary. This area was a particularly fertile territory where cryptographic methods proliferated, because a large portion of the population was living in the frontier zone, and participated (or was forced to participate) in the network of the information flow. A quantitative analysis of sixteenth-century to seventeenth-century Hungarian ciphers (300 cipher keys and 1,600 partly or entirely enciphered letters) reveals that besides the dominance of diplomatic use of cryptography, there were many examples of ŸprivateŒ applications too. This book reconstructs the main reasons and goals why historical actors chose to use ciphers in a diplomatic letter, a military order, a diary or a private letter, what they decided to encrypt, and how they perceived the dangers threatening their messages</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">In English</subfield></datafield><datafield tag="648" ind1=" " ind2="7"><subfield code="a">Geschichte 1470-1756</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">HISTORY / Europe / Austria & Hungary</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Geheimschrift</subfield><subfield code="0">(DE-588)4156317-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="651" ind1=" " ind2="7"><subfield code="a">Ungarn</subfield><subfield code="0">(DE-588)4078541-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Ungarn</subfield><subfield code="0">(DE-588)4078541-5</subfield><subfield code="D">g</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Geheimschrift</subfield><subfield code="0">(DE-588)4156317-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Geschichte 1470-1756</subfield><subfield code="A">z</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1515/9789048536696</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-23-DGG</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-031313295</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1515/9789048536696</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-23-DGG</subfield><subfield code="q">FAW_PDA_DGG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1515/9789048536696</subfield><subfield code="l">FHA01</subfield><subfield code="p">ZDB-23-DGG</subfield><subfield code="q">FHA_PDA_DGG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1515/9789048536696</subfield><subfield code="l">FKE01</subfield><subfield code="p">ZDB-23-DGG</subfield><subfield code="q">FKE_PDA_DGG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1515/9789048536696</subfield><subfield code="l">FLA01</subfield><subfield code="p">ZDB-23-DGG</subfield><subfield code="q">FLA_PDA_DGG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1515/9789048536696</subfield><subfield code="l">UPA01</subfield><subfield code="p">ZDB-23-DGG</subfield><subfield code="q">UPA_PDA_DGG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1515/9789048536696</subfield><subfield code="l">UBG01</subfield><subfield code="p">ZDB-23-DGG</subfield><subfield code="q">UBG_PDA_DGG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1515/9789048536696</subfield><subfield code="l">FAB01</subfield><subfield code="p">ZDB-23-DGG</subfield><subfield code="q">FAB_PDA_DGG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1515/9789048536696</subfield><subfield code="l">FCO01</subfield><subfield code="p">ZDB-23-DGG</subfield><subfield code="q">FCO_PDA_DGG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
geographic | Ungarn (DE-588)4078541-5 gnd |
geographic_facet | Ungarn |
id | DE-604.BV045930858 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T08:30:41Z |
institution | BVB |
isbn | 9789048536696 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-031313295 |
oclc_num | 1104879821 |
open_access_boolean | |
owner | DE-473 DE-BY-UBG DE-1046 DE-739 DE-860 DE-859 DE-Aug4 DE-1043 DE-858 |
owner_facet | DE-473 DE-BY-UBG DE-1046 DE-739 DE-860 DE-859 DE-Aug4 DE-1043 DE-858 |
physical | 1 online resource |
psigel | ZDB-23-DGG ZDB-23-DGG FAW_PDA_DGG ZDB-23-DGG FHA_PDA_DGG ZDB-23-DGG FKE_PDA_DGG ZDB-23-DGG FLA_PDA_DGG ZDB-23-DGG UPA_PDA_DGG ZDB-23-DGG UBG_PDA_DGG ZDB-23-DGG FAB_PDA_DGG ZDB-23-DGG FCO_PDA_DGG |
publishDate | 2018 |
publishDateSearch | 2018 |
publishDateSort | 2018 |
publisher | Amsterdam University Press |
record_format | marc |
spelling | Lang, Benedek Verfasser aut Real Life Cryptology Benedek Lang Amsterdam Amsterdam University Press [2018] © 2018 1 online resource txt rdacontent c rdamedia cr rdacarrier Description based on online resource; title from PDF title page (publisher's Web site, viewed 30. Apr 2019) A large number of enciphered documents survived from early modern Hungary. This area was a particularly fertile territory where cryptographic methods proliferated, because a large portion of the population was living in the frontier zone, and participated (or was forced to participate) in the network of the information flow. A quantitative analysis of sixteenth-century to seventeenth-century Hungarian ciphers (300 cipher keys and 1,600 partly or entirely enciphered letters) reveals that besides the dominance of diplomatic use of cryptography, there were many examples of ŸprivateŒ applications too. This book reconstructs the main reasons and goals why historical actors chose to use ciphers in a diplomatic letter, a military order, a diary or a private letter, what they decided to encrypt, and how they perceived the dangers threatening their messages In English Geschichte 1470-1756 gnd rswk-swf HISTORY / Europe / Austria & Hungary bisacsh Geheimschrift (DE-588)4156317-7 gnd rswk-swf Ungarn (DE-588)4078541-5 gnd rswk-swf Ungarn (DE-588)4078541-5 g Geheimschrift (DE-588)4156317-7 s Geschichte 1470-1756 z 1\p DE-604 https://doi.org/10.1515/9789048536696 Verlag URL des Erstveröffentlichers Volltext 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Lang, Benedek Real Life Cryptology HISTORY / Europe / Austria & Hungary bisacsh Geheimschrift (DE-588)4156317-7 gnd |
subject_GND | (DE-588)4156317-7 (DE-588)4078541-5 |
title | Real Life Cryptology |
title_auth | Real Life Cryptology |
title_exact_search | Real Life Cryptology |
title_full | Real Life Cryptology Benedek Lang |
title_fullStr | Real Life Cryptology Benedek Lang |
title_full_unstemmed | Real Life Cryptology Benedek Lang |
title_short | Real Life Cryptology |
title_sort | real life cryptology |
topic | HISTORY / Europe / Austria & Hungary bisacsh Geheimschrift (DE-588)4156317-7 gnd |
topic_facet | HISTORY / Europe / Austria & Hungary Geheimschrift Ungarn |
url | https://doi.org/10.1515/9789048536696 |
work_keys_str_mv | AT langbenedek reallifecryptology |