000 02943 a2200313 4500
001 1032918195
005 20250328151429.0
008 250324042024xx 198 eng
020 _a9781032918198
_qBC
037 _bTaylor & Francis
_cGBP 55.99
_fBB
040 _a01
041 _aeng
072 7 _aPBD
_2thema
072 7 _aPBV
_2thema
072 7 _aPBCD
_2thema
072 7 _aPBD
_2bic
072 7 _aPBV
_2bic
072 7 _aPBCD
_2bic
072 7 _aCOM083000
_2bisac
072 7 _aMAT000000
_2bisac
072 7 _aMAT036000
_2bisac
072 7 _a005.82
_2bisac
100 1 _aCraig P. Bauer
245 1 0 _aSecret History
_bThe Story of Cryptology
250 _a1
260 _bChapman and Hall/CRC
_c20241014
300 _a620 p
520 _bWinner of an Outstanding Academic Title Award from CHOICE Magazine Most available cryptology books primarily focus on either mathematics or history. Breaking this mold, Secret History: The Story of Cryptology gives a thorough yet accessible treatment of both the mathematics and history of cryptology. Requiring minimal mathematical prerequisites, the book presents the mathematics in sufficient detail and weaves the history throughout the chapters. In addition to the fascinating historical and political sides of cryptology, the author—a former Scholar-in-Residence at the U.S. National Security Agency (NSA) Center for Cryptologic History—includes interesting instances of codes and ciphers in crime, literature, music, and art. Following a mainly chronological development of concepts, the book focuses on classical cryptology in the first part. It covers Greek and Viking cryptography, the Vigenère cipher, the one-time pad, transposition ciphers, Jefferson’s cipher wheel, the Playfair cipher, ADFGX, matrix encryption, World War II cipher systems (including a detailed examination of Enigma), and many other classical methods introduced before World War II. The second part of the book examines modern cryptology. The author looks at the work of Claude Shannon and the origin and current status of the NSA, including some of its Suite B algorithms such as elliptic curve cryptography and the Advanced Encryption Standard. He also details the controversy that surrounded the Data Encryption Standard and the early years of public key cryptography. The book not only provides the how-to of the Diffie-Hellman key exchange and RSA algorithm, but also covers many attacks on the latter. Additionally, it discusses Elgamal, digital signatures, PGP, and stream ciphers and explores future directions such as quantum cryptography and DNA computing. With numerous real-world examples and extensive references, this book skillfully balances the historical aspects of cryptology with its mathematical details. It provides readers with a sound foundation in this dynamic field. Please visit Dr. Bauer's website, which provides access to exercise sets: http://depts.ycp.edu/~cbauer/
999 _c8790
_d8790