![](https://image.librarything.com/pics/fugue21/magnifier-left.png)
![Codes and Ciphers: Julius Caesar, the…](https://images-na.ssl-images-amazon.com/images/P/0521008905.01._SX180_SCLZZZZZZZ_.jpg)
Fai clic su di un'immagine per andare a Google Ricerca Libri.
Sto caricando le informazioni... Codes and Ciphers: Julius Caesar, the Enigma, and the Internet (edizione 2001)di Robert Churchhouse (Autore)
Informazioni sull'operaCodes and Ciphers: Julius Caesar, the Enigma, and the Internet di R. F. Churchhouse
![]() Nessuno Sto caricando le informazioni...
![]() Iscriviti per consentire a LibraryThing di scoprire se ti piacerà questo libro. Attualmente non vi sono conversazioni su questo libro. ![]() Some years back I read a similarly broad overview of the history of cryptography (possibly the Code Book by Simon Singh) in which I was thoroughly taken with the Vigenere cipher and disgusted by Playfair. This was primarily because I can use Vigenere by hand without crib sheets - slowly, but I can - and even crack it; whereas Playfair requires a lot more effort just to use, and cracking is more effort than I can be bothered putting in without significant stakes. This book got me closer to resigning myself to Playfair. It also got me perilously close to kinda sorta understanding what people were thinking when they came up with Enigma, RSA, DES, etc. It goes over the mathematics of them in sufficient detail for mathematically-minded people to follow along; I'm not mathematically-minded in that sense so I didn't bother reading all the appendices, but they were there and isn't that the important thing? nessuna recensione | aggiungi una recensione
The design of code and cipher systems has undergone major changes in modern times. Powerful personal computers have resulted in an explosion of e-banking, e-commerce and e-mail, and as a consequence the encryption of communications to ensure security has become a matter of public interest and importance. This book describes and analyses many cipher systems ranging from the earliest and elementary to the more recent and sophisticated, such as RSA and DES, as well as wartime machines such as the ENIGMA and Hagelin, and ciphers used by spies. Security issues and possible methods of attack are discussed and illustrated by examples. The design of many systems involves advanced mathematical concepts and this is explained in detail in a major appendix. This book will appeal to anyone interested in codes and ciphers as used by private individuals, spies, governments and industry throughout history. Non sono state trovate descrizioni di biblioteche |
Discussioni correntiNessuno
![]() GeneriSistema Decimale Melvil (DDC)652.8Technology Management and auxiliary services Writing: Materials, Typewriters CryptographyClassificazione LCVotoMedia:![]()
Sei tu?Diventa un autore di LibraryThing. |