Decrypted Secrets: Methods and Maxims of Cryptology
Cryptology, for millennia a "secret science", is rapidly gaining in practical importance for the protection of communication channels, databases, and software. Beside its role in computerized information systems (public key systems), more and more applications within computer systems and n...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Berlin, Heidelberg
Springer Berlin Heidelberg
2000
|
Ausgabe: | 2nd ed. 2000 |
Schlagworte: | |
Online-Zugang: | UBY01 Volltext |
Zusammenfassung: | Cryptology, for millennia a "secret science", is rapidly gaining in practical importance for the protection of communication channels, databases, and software. Beside its role in computerized information systems (public key systems), more and more applications within computer systems and networks are appearing, which also extend to access rights and source file protection. The first part of this book treats secret codes and their uses - cryptography. The second part deals with the process of covertly decrypting a secret code - cryptanalysis - where in particular advice on assessing methods is given. The book presupposes only elementary mathematical knowledge. Spiced with a wealth of exciting, amusing, and sometimes personal stories from the history of cryptology, it will also interest general readers. Decrypted Secrets has become a standard book on cryptology. The new edition has been revised and extended in many details, particularly on the ENIGMA and other rotor machines, on cipher teletype machines, codenamed FISH by the British, and on key negotiation. "The best single book on cryptology today" (David Kahn, Cryptologia) "For those who work actively with cryptology this book is a must. For amateurs it is an important dictionary which in many cases will guide them to make their ciphers more secure." (Arne Fransén, International Intelligence History Study Group) |
Beschreibung: | 1 Online-Ressource (XII, 471 p. 136 illus., 17 illus. in color) |
ISBN: | 9783662040249 |
DOI: | 10.1007/978-3-662-04024-9 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV047064829 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 201216s2000 |||| o||u| ||||||eng d | ||
020 | |a 9783662040249 |9 978-3-662-04024-9 | ||
024 | 7 | |a 10.1007/978-3-662-04024-9 |2 doi | |
035 | |a (ZDB-2-SCS)978-3-662-04024-9 | ||
035 | |a (OCoLC)1227477345 | ||
035 | |a (DE-599)BVBBV047064829 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-706 | ||
082 | 0 | |a 005.82 |2 23 | |
084 | |a SK 170 |0 (DE-625)143221: |2 rvk | ||
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
100 | 1 | |a Bauer, Friedrich L. |e Verfasser |4 aut | |
245 | 1 | 0 | |a Decrypted Secrets |b Methods and Maxims of Cryptology |c by Friedrich L. Bauer |
250 | |a 2nd ed. 2000 | ||
264 | 1 | |a Berlin, Heidelberg |b Springer Berlin Heidelberg |c 2000 | |
300 | |a 1 Online-Ressource (XII, 471 p. 136 illus., 17 illus. in color) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
520 | |a Cryptology, for millennia a "secret science", is rapidly gaining in practical importance for the protection of communication channels, databases, and software. Beside its role in computerized information systems (public key systems), more and more applications within computer systems and networks are appearing, which also extend to access rights and source file protection. The first part of this book treats secret codes and their uses - cryptography. The second part deals with the process of covertly decrypting a secret code - cryptanalysis - where in particular advice on assessing methods is given. The book presupposes only elementary mathematical knowledge. Spiced with a wealth of exciting, amusing, and sometimes personal stories from the history of cryptology, it will also interest general readers. Decrypted Secrets has become a standard book on cryptology. The new edition has been revised and extended in many details, particularly on the ENIGMA and other rotor machines, on cipher teletype machines, codenamed FISH by the British, and on key negotiation. "The best single book on cryptology today" (David Kahn, Cryptologia) "For those who work actively with cryptology this book is a must. For amateurs it is an important dictionary which in many cases will guide them to make their ciphers more secure." (Arne Fransén, International Intelligence History Study Group) | ||
650 | 4 | |a Cryptology | |
650 | 4 | |a Coding and Information Theory | |
650 | 4 | |a Number Theory | |
650 | 4 | |a Applications of Mathematics | |
650 | 4 | |a Computers and Society | |
650 | 4 | |a Data encryption (Computer science) | |
650 | 4 | |a Coding theory | |
650 | 4 | |a Information theory | |
650 | 4 | |a Number theory | |
650 | 4 | |a Applied mathematics | |
650 | 4 | |a Engineering mathematics | |
650 | 4 | |a Computers and civilization | |
650 | 0 | 7 | |a Kryptologie |0 (DE-588)4033329-2 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 0 | |5 DE-604 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9783662040263 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9783662040256 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9783540668718 |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-662-04024-9 |x Verlag |z URL des Eerstveröffentlichers |3 Volltext |
912 | |a ZDB-2-SCS | ||
940 | 1 | |q ZDB-2-SCS_2000/2004 | |
999 | |a oai:aleph.bib-bvb.de:BVB01-032471941 | ||
966 | e | |u https://doi.org/10.1007/978-3-662-04024-9 |l UBY01 |p ZDB-2-SCS |q ZDB-2-SCS_2000/2004 |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804182063372304384 |
---|---|
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author | Bauer, Friedrich L. |
author_facet | Bauer, Friedrich L. |
author_role | aut |
author_sort | Bauer, Friedrich L. |
author_variant | f l b fl flb |
building | Verbundindex |
bvnumber | BV047064829 |
classification_rvk | SK 170 ST 276 |
collection | ZDB-2-SCS |
ctrlnum | (ZDB-2-SCS)978-3-662-04024-9 (OCoLC)1227477345 (DE-599)BVBBV047064829 |
dewey-full | 005.82 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.82 |
dewey-search | 005.82 |
dewey-sort | 15.82 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik Mathematik |
discipline_str_mv | Informatik Mathematik |
doi_str_mv | 10.1007/978-3-662-04024-9 |
edition | 2nd ed. 2000 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03519nmm a2200601zc 4500</leader><controlfield tag="001">BV047064829</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">201216s2000 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783662040249</subfield><subfield code="9">978-3-662-04024-9</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-662-04024-9</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-SCS)978-3-662-04024-9</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1227477345</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV047064829</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-706</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.82</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">SK 170</subfield><subfield code="0">(DE-625)143221:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Bauer, Friedrich L.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Decrypted Secrets</subfield><subfield code="b">Methods and Maxims of Cryptology</subfield><subfield code="c">by Friedrich L. Bauer</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">2nd ed. 2000</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin, Heidelberg</subfield><subfield code="b">Springer Berlin Heidelberg</subfield><subfield code="c">2000</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XII, 471 p. 136 illus., 17 illus. in color)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Cryptology, for millennia a "secret science", is rapidly gaining in practical importance for the protection of communication channels, databases, and software. Beside its role in computerized information systems (public key systems), more and more applications within computer systems and networks are appearing, which also extend to access rights and source file protection. The first part of this book treats secret codes and their uses - cryptography. The second part deals with the process of covertly decrypting a secret code - cryptanalysis - where in particular advice on assessing methods is given. The book presupposes only elementary mathematical knowledge. Spiced with a wealth of exciting, amusing, and sometimes personal stories from the history of cryptology, it will also interest general readers. Decrypted Secrets has become a standard book on cryptology. The new edition has been revised and extended in many details, particularly on the ENIGMA and other rotor machines, on cipher teletype machines, codenamed FISH by the British, and on key negotiation. "The best single book on cryptology today" (David Kahn, Cryptologia) "For those who work actively with cryptology this book is a must. For amateurs it is an important dictionary which in many cases will guide them to make their ciphers more secure." (Arne Fransén, International Intelligence History Study Group)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cryptology</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Coding and Information Theory</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Number Theory</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Applications of Mathematics</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers and Society</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Coding theory</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information theory</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Number theory</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Applied mathematics</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Engineering mathematics</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers and civilization</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9783662040263</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9783662040256</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9783540668718</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-662-04024-9</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Eerstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-SCS_2000/2004</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-032471941</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-04024-9</subfield><subfield code="l">UBY01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="q">ZDB-2-SCS_2000/2004</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV047064829 |
illustrated | Not Illustrated |
index_date | 2024-07-03T16:12:23Z |
indexdate | 2024-07-10T09:01:35Z |
institution | BVB |
isbn | 9783662040249 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-032471941 |
oclc_num | 1227477345 |
open_access_boolean | |
owner | DE-706 |
owner_facet | DE-706 |
physical | 1 Online-Ressource (XII, 471 p. 136 illus., 17 illus. in color) |
psigel | ZDB-2-SCS ZDB-2-SCS_2000/2004 ZDB-2-SCS ZDB-2-SCS_2000/2004 |
publishDate | 2000 |
publishDateSearch | 2000 |
publishDateSort | 2000 |
publisher | Springer Berlin Heidelberg |
record_format | marc |
spelling | Bauer, Friedrich L. Verfasser aut Decrypted Secrets Methods and Maxims of Cryptology by Friedrich L. Bauer 2nd ed. 2000 Berlin, Heidelberg Springer Berlin Heidelberg 2000 1 Online-Ressource (XII, 471 p. 136 illus., 17 illus. in color) txt rdacontent c rdamedia cr rdacarrier Cryptology, for millennia a "secret science", is rapidly gaining in practical importance for the protection of communication channels, databases, and software. Beside its role in computerized information systems (public key systems), more and more applications within computer systems and networks are appearing, which also extend to access rights and source file protection. The first part of this book treats secret codes and their uses - cryptography. The second part deals with the process of covertly decrypting a secret code - cryptanalysis - where in particular advice on assessing methods is given. The book presupposes only elementary mathematical knowledge. Spiced with a wealth of exciting, amusing, and sometimes personal stories from the history of cryptology, it will also interest general readers. Decrypted Secrets has become a standard book on cryptology. The new edition has been revised and extended in many details, particularly on the ENIGMA and other rotor machines, on cipher teletype machines, codenamed FISH by the British, and on key negotiation. "The best single book on cryptology today" (David Kahn, Cryptologia) "For those who work actively with cryptology this book is a must. For amateurs it is an important dictionary which in many cases will guide them to make their ciphers more secure." (Arne Fransén, International Intelligence History Study Group) Cryptology Coding and Information Theory Number Theory Applications of Mathematics Computers and Society Data encryption (Computer science) Coding theory Information theory Number theory Applied mathematics Engineering mathematics Computers and civilization Kryptologie (DE-588)4033329-2 gnd rswk-swf Kryptologie (DE-588)4033329-2 s DE-604 Erscheint auch als Druck-Ausgabe 9783662040263 Erscheint auch als Druck-Ausgabe 9783662040256 Erscheint auch als Druck-Ausgabe 9783540668718 https://doi.org/10.1007/978-3-662-04024-9 Verlag URL des Eerstveröffentlichers Volltext |
spellingShingle | Bauer, Friedrich L. Decrypted Secrets Methods and Maxims of Cryptology Cryptology Coding and Information Theory Number Theory Applications of Mathematics Computers and Society Data encryption (Computer science) Coding theory Information theory Number theory Applied mathematics Engineering mathematics Computers and civilization Kryptologie (DE-588)4033329-2 gnd |
subject_GND | (DE-588)4033329-2 |
title | Decrypted Secrets Methods and Maxims of Cryptology |
title_auth | Decrypted Secrets Methods and Maxims of Cryptology |
title_exact_search | Decrypted Secrets Methods and Maxims of Cryptology |
title_exact_search_txtP | Decrypted Secrets Methods and Maxims of Cryptology |
title_full | Decrypted Secrets Methods and Maxims of Cryptology by Friedrich L. Bauer |
title_fullStr | Decrypted Secrets Methods and Maxims of Cryptology by Friedrich L. Bauer |
title_full_unstemmed | Decrypted Secrets Methods and Maxims of Cryptology by Friedrich L. Bauer |
title_short | Decrypted Secrets |
title_sort | decrypted secrets methods and maxims of cryptology |
title_sub | Methods and Maxims of Cryptology |
topic | Cryptology Coding and Information Theory Number Theory Applications of Mathematics Computers and Society Data encryption (Computer science) Coding theory Information theory Number theory Applied mathematics Engineering mathematics Computers and civilization Kryptologie (DE-588)4033329-2 gnd |
topic_facet | Cryptology Coding and Information Theory Number Theory Applications of Mathematics Computers and Society Data encryption (Computer science) Coding theory Information theory Number theory Applied mathematics Engineering mathematics Computers and civilization Kryptologie |
url | https://doi.org/10.1007/978-3-662-04024-9 |
work_keys_str_mv | AT bauerfriedrichl decryptedsecretsmethodsandmaximsofcryptology |