Decrypted Secrets: Methods and Maxims of Cryptology free download online
Title: Decrypted Secrets: Methods and Maxims of Cryptology Author(s): Friedrich L. Bauer Pages: 525 Publisher: Springer; 4th ed. edition Publication date: 2006 Language: English Format: PDF ISBN-10: 3540245022 ISBN-13: Description: With 191 Figures, 29 Tables and 16 Color Plates.
In today's unsafe and increasingly wired world cryptology plays a vital role in protecting communication channels, databases, and software from unwanted intruders. This revised and extended third edition of the classic reference work on cryptology now contains many new technical and biographical details. The first part treats secret codes and their uses - cryptography. The second part deals with the process of covertly decrypting a secret code - cryptanalysis, where particular advice on assessing methods is given. The book presupposes only elementary mathematical knowledge. Spiced with a wealth of exciting, amusing, and sometimes personal stories from the history of cryptology, it will also interest general readers.
Written for:
Scientists, students and practitioners in applied mathematics, computer science and information technology, and the general reader
Review
"The best single book on cryptology today." --Cryptologia (from a review of a previous edition)
From the reviews of the fourth edition:
"This comprehensive updated edition is divided into two sections. The first part of the book deals with The People and the second concentrates on The Machinery. This volume includes 191 Figures, 29 Tables and 16 Color Plates, plus an Appendix. Friedrich L. Bauer Professor Emeritus of Mathematics and Computer Science has written an outstanding book on cryptology that belongs in your personal library or as a gift for a friend. There are other fascinating sidelights to this excellent book." (The Cryptogram, Page 15, 2007)
Part. I. Cryptography
1. Introductory Synopsis
2. Aims and Methods of Cryptography
3. Encryption Steps: Simple Substitution
4. Encryption Steps: Polygraphic Substitution and Coding
5. Encryption Steps: Linear Substitution
6. Encryption Steps: Transposition
7. Polyalphabetic Encryption: Families of Alphabets
8. Polyalphabetic Encryption: Keys
9. Composition of Classes of Methods
10. Open Encryption Key Systems
11. Encryption Security
Part. II. Cryptanalysis
12. Exhausting Combinatorial Complexity
13. Anatomy of Language: Patterns
14. Polyalphabetic Case: Probable Words
15. Anatomy of Language: Frequencies
16. Kappa and Chi
17. Periodicity Examination
18. Alignment of Accompanying Alphabets
19. Compromises
20. Linear Basis Analysis
21. Anagramming
22. Concluding Remarks
App. Axiomatic Information Theory
Bibliography
Index
Photo Credits
Decrypted Secrets: Methods and Maxims of Cryptology free download links: