咨询与建议

看过本文的还看了

相关文献

该作者的其他文献

文献详情 >Secret History: The Story of C... 收藏

Secret History: The Story of Cryptology

丛 书 名:Discrete mathematics and its applications

版本说明:1

作     者:Craig P. Bauer 

I S B N:(纸本) 1466561866;9781466561861 

出 版 社:Chapman and Hall/CRC 

出 版 年:2013年

页      数:603页

主 题 词:Data encryption (Computer science).Computer security..Cryptography.Ciphers. 

学科分类:07[理学] 08[工学] 0839[工学-网络空间安全] 070104[理学-应用数学] 0701[理学-数学] 081201[工学-计算机系统结构] 0812[工学-计算机科学与技术(可授工学、理学学位)] 

馆 藏 号:201100841...

摘      要:Most available cryptology books primarily focus on either mathematics or history. Breaking this mold, Secret History: The Story of Cryptology gives a thorough yet accessible treatment of both the mathematics and history of cryptology. Requiring minimal mathematical prerequisites, the book presents the mathematics in sufficient detail and weaves the history throughout the chapters. In addition to the fascinating historical and political sides of cryptology, the authora former Scholar-in-Residence at the U.S. National Security Agency (NSA) Center for Cryptologic Historyincludes interesting instances of codes and ciphers in crime, literature, music, and art. Following a mainly chronological development of concepts, the book focuses on classical cryptology in the first part. It covers Greek and Viking cryptography, the Vigenre cipher, the one-time pad, transposition ciphers, Jeffersons cipher wheel, the Playfair cipher, ADFGX, matrix encryption, World War II cipher systems (including a detailed examination of Enigma), and many other classical methods introduced before World War II. The second part of the book examines modern cryptology. The author looks at the work of Claude Shannon and the origin and current status of the NSA, including some of its Suite B algorithms such as elliptic curve cryptography and the Advanced Encryption Standard. He also details the controversy that surrounded the Data Encryption Standard and the early years of public key cryptography. The book not only provides the how-to of the Diffie-Hellman key exchange and RSA algorithm, but also covers many attacks on the latter. Additionally, it discusses Elgamal, digital signatures, PGP, and stream ciphers and explores future directions such as quantum cryptography and DNA computing. With numerous real-world examples and extensive references, this book skillfully balances the historical aspects of cryptology with its mathematical details. It provides readers with a sound foundation in this dynamic fie

实体馆藏
馆藏地名称 定位 索书号 条码号 文献状态
外文图书借阅室 查看 TN918.1-09/B344/X 020048896 可借

读者评论 与其他读者分享你的观点

用户名:未登录
我的评分