• Complain

John F. Dooley - History of Cryptography and Cryptanalysis: Codes, Ciphers, and Their Algorithms

Here you can read online John F. Dooley - History of Cryptography and Cryptanalysis: Codes, Ciphers, and Their Algorithms full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. year: 2018, publisher: Springer-Nature New York Inc, genre: Home and family. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

John F. Dooley History of Cryptography and Cryptanalysis: Codes, Ciphers, and Their Algorithms
  • Book:
    History of Cryptography and Cryptanalysis: Codes, Ciphers, and Their Algorithms
  • Author:
  • Publisher:
    Springer-Nature New York Inc
  • Genre:
  • Year:
    2018
  • Rating:
    5 / 5
  • Favourites:
    Add to favourites
  • Your mark:
    • 100
    • 1
    • 2
    • 3
    • 4
    • 5

History of Cryptography and Cryptanalysis: Codes, Ciphers, and Their Algorithms: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "History of Cryptography and Cryptanalysis: Codes, Ciphers, and Their Algorithms" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

This accessible textbook presents a fascinating review of cryptography and cryptanalysis across history. The text relates the earliest use of the monoalphabetic cipher in the ancient world, the development of the unbreakable Vigenre cipher, and an account of how cryptology entered the arsenal of military intelligence during the American Revolutionary War. Moving on to the American Civil War, the book explains how the Union solved the Vigenre ciphers used by the Confederates, before investigating the development of cipher machines throughout World War I and II. This is then followed by an exploration of cryptology in the computer age, from public-key cryptography and web security, to criminal cyber-attacks and cyber-warfare. Looking to the future, the role of cryptography in the Internet of Things is also discussed, along with the potential impact of quantum computing.

Topics and features: presents a history of cryptology from ancient Rome to the present day, with a focus on cryptology in the 20th and 21st centuries; reviews the different types of cryptographic algorithms used to create secret messages, and the various methods for breaking such secret messages; provides engaging examples throughout the book illustrating the use of cryptographic algorithms in different historical periods; describes the notable contributions to cryptology of Herbert Yardley, William and Elizebeth Smith Friedman, Lester Hill, Agnes Meyer Driscoll, and Claude Shannon; concludes with a review of tantalizing unsolved mysteries in cryptology, such as the Voynich Manuscript, the Beale Ciphers, and the Kryptos sculpture.This engaging work is ideal as both a primary text for courses on the history of cryptology, and as a supplementary text for advanced undergraduate courses on computer security. No prior background in mathematics is assumed, beyond what would be encountered in an introductory course on discrete mathematics.

John F. Dooley: author's other books


Who wrote History of Cryptography and Cryptanalysis: Codes, Ciphers, and Their Algorithms? Find out the surname, the name of the author of the book and a list of all author's works by series.

History of Cryptography and Cryptanalysis: Codes, Ciphers, and Their Algorithms — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "History of Cryptography and Cryptanalysis: Codes, Ciphers, and Their Algorithms" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make
Contents
Landmarks
History of Computing Editor-in-Chief Martin Campbell-Kelly University of - photo 1
History of Computing
Editor-in-Chief
Martin Campbell-Kelly
University of Warwick, Coventry, UK
Series Editor
Gerard Alberts
University of Amsterdam, Amsterdam, The Netherlands
Editorial Board
Jack Copeland
University of Canterbury, Christchurch, New Zealand
Ulf Hashagen
Deutsches Museum, Munich, Germany
Valrie Schafer
CNRS, Paris, France
John V. Tucker
Swansea University, Swansea, UK
Jeffrey R. Yost
University of Minnesota, Minneapolis, USA

The History of Computing series publishes high-quality books which address the history of computing, with an emphasis on the externalist view of this history, more accessible to a wider audience. The series examines content and history from four main quadrants: the history of relevant technologies, the history of the core science, the history of relevant business and economic developments, and the history of computing as it pertains to social history and societal developments.

Titles can span a variety of product types, including but not exclusively, themed volumes, biographies, profile books (with brief biographies of a number of key people), expansions of workshop proceedings, general readers, scholarly expositions, titles used as ancillary textbooks, revivals and new editions of previous worthy titles.

These books will appeal, varyingly, to academics and students in computer science, history, mathematics, business and technology studies. Some titles will also directly appeal to professionals and practitioners of different backgrounds.

More information about this series at http://www.springer.com/series/8442

John F. Dooley
History of Cryptography and Cryptanalysis Codes, Ciphers, and Their Algorithms
John F Dooley Knox College Galesburg IL USA ISSN 2190-6831 e-ISSN - photo 2
John F. Dooley
Knox College, Galesburg, IL, USA
ISSN 2190-6831 e-ISSN 2190-684X
History of Computing
ISBN 978-3-319-90442-9 e-ISBN 978-3-319-90443-6
https://doi.org/10.1007/978-3-319-90443-6
Library of Congress Control Number: 2018942943
Springer International Publishing AG, part of Springer Nature 2018
This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed.
The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use.
The publisher, the authors and the editors are safe to assume that the advice and information in this book are believed to be true and accurate at the date of publication. Neither the publisher nor the authors or the editors give a warranty, express or implied, with respect to the material contained herein or for any errors or omissions that may have been made. The publisher remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

This Springer imprint is published by the registered company Springer International Publishing AG part of Springer Nature.

The registered company address is: Gewerbestrasse 11, 6330 Cham, Switzerland

For Diane, Patrick, and for all my CS 330 students over the years.

Preface

Cryptology is the science of secret communications. You are likely to use some form of cryptology every day. If you login to a computer you are using cryptology in the form of a one-way hash function that protects your password. If you buy something over the Internet, you are using two different forms of cryptology public key cryptography to set up the encrypted network connection between you and the vendor and a symmetric key algorithm to finish your transaction. These days much of the cryptology that is in use is invisible, just like the examples above. It wasnt always so. The story of cryptology goes back at least 2500 years and for most of that time it was considered an arcane science, known only to a few and jealously guarded by governments, exiled kings and queens, and religious orders. For a time in the European Middle Ages it was even considered to be a form of magic. It is only recently, really beginning in the twentieth century, that cryptology has become known and studied outside the realms of secret government agencies. Even more recently, the study of cryptology has moved from a branch of linguistics to having a firm foundation in mathematics.

This book is a history of cryptology from the time of Julius Caesar up through around the year 2018. It also covers the different types of cryptographic algorithms used to create secret messages and it discusses methods for breaking secret messages. There are several examples in the text that illustrate the algorithms in use. It is, of course, not meant to be a comprehensive history of either cryptology or the algorithms themselves. Rather I have tried to touch on a substantial subset of the important stories in cryptologic history and the algorithms and people involved. Most of the chapters begin with a story that tries to illustrate the importance of cryptology in that particular time period.

I teach an upper-level undergraduate survey course in Cryptography and Computer Security and the contents of this book is covered in that course where I do a review of the different cryptographic algorithms from an historical perspective. My goal in that course is to give the students a better understanding of how we got from the early days of pencil and paper secret messages to a place where cryptology is pervasive and largely invisible. This book could easily serve as the text for part of a course on computer or network security, as a supplemental text for a stand-alone course on computer security, or as a primary text for a course on the history of cryptology. No mathematics is required beyond what a computer science or mathematics student would see in a course on discrete mathematics. If you want to pursue a more comprehensive treatment of the history of cryptology I recommend David Kahns excellent book The Codebreakers: The Story of Secret Writing, and for a more mathematical treatment, Craig Bauers equally good Secret History: The Story of Cryptology .

The book is organized chronologically. The main focus is on twentieth and twenty-first century cryptology, if, for no other reason, that there is much more written about these periods. Cryptology has begun to escape from the secret confines of governments. In the post-World War II era there is a lively and robust group of researchers and developers focusing on cryptology for private and business applications. At the end of each chapter are references to source material covered in the chapter and these usually include books, magazine articles, web pages and scholarly papers that will make good additional reading for interested readers.

John F. Dooley
Galesburg, IL, USA
Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «History of Cryptography and Cryptanalysis: Codes, Ciphers, and Their Algorithms»

Look at similar books to History of Cryptography and Cryptanalysis: Codes, Ciphers, and Their Algorithms. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «History of Cryptography and Cryptanalysis: Codes, Ciphers, and Their Algorithms»

Discussion, reviews of the book History of Cryptography and Cryptanalysis: Codes, Ciphers, and Their Algorithms and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.