Skip to content

Secret History The Story of Cryptology

Best in textbook rentals since 2012!

ISBN-10: 1466561866

ISBN-13: 9781466561861

Edition: 2013

Authors: Craig P. Bauer

List price: $69.99
Blue ribbon 30 day, 100% satisfaction guarantee!
what's this?
Rush Rewards U
Members Receive:
Carrot Coin icon
XP icon
You have reached 400 XP and carrot coins. That is the daily max!

Description:

This reference is a definitive history of cryptography along with some mathematical ideas that is brought completely up to date. Written by a well-known author in the field of cryptology, the book presents the history and politics of cryptology. The author also covers interesting instances of the use of codes and cipher sin crime, literature, and music. The book includes copious illustrations of famous people in the field as well as other aspects never seen in book form.
Customers also bought

Book details

List price: $69.99
Copyright year: 2013
Publisher: Taylor & Francis Group
Publication date: 3/20/2013
Binding: Hardcover
Pages: 620
Size: 6.25" wide x 9.25" long x 1.50" tall
Weight: 2.244
Language: English

Note to the Reader
Introduction
Acknowledgments
Classical Cryptology
Ancient Roots
Caveman Crypto
Greek Cryptography
Skytale Cipher
Polybius Cipher
Viking Cryptography
Early Steganography
References and Further Reading
Monalphabetic Substitution Ciphers, or MASCs: Disguises for Messages
Caesar Cipher
Other MASC Systems
Edgar Allan Poe
Arthur Conan Doyle
Frequency Analysis
Biblical Cryptology
More Frequencies and Pattern Words
Vowel Recognition Algorithms
Sukhotin's Method
More MASCs
Cryptanalysis of a MASC
Unsolved Ciphers by a Killer and a Composer
Affine Ciphers
Morse Code and Huffman Coding
MASC Miscellanea
Nomenclators
Cryptanalysis of Nomenclators
Book Codes
References and Further Reading
Simple Progression to an Unbreakable Cipher
Vigen�re Cipher
History of the Vigen�re Cipher
Cryptanalysis of the Vigen�re Cipher
Kryptos
Autokeys
Running Key Cipher and Its Cryptanalysis
One-Time Pad or Vernam Cipher
Breaking the Unbreakable
Faking Randomness
Unsolved Cipher from 1915
OTPs and the SOE
History Rewritten!
References and Further Reading
Transposition Ciphers
Simple Rearrangements and Columnar Transposition
Rail-Fence Transposition
Rectangular Transposition
More Transposition Paths
Cryptanalysis of Columnar Transposition
Historic Uses
Anagrams
Double Transposition
Word Transposition
Civil War Reenactors
Transposition Devices
References and Further Reading
Shakespeare, Jefferson, and JFK
Shakespeare vs. Bacon
Thomas Jefferson: President, Cryptographer
Cipher Wheel Cryptanalysis
Playfair Cipher
Playfair Cryptanalysis
Computer Cryptanalysis
Kerckhoffs' Rules
References and Further Reading
World War I and Herbert O. Yardley
Zimmermann Telegram
ADFCX: A New Kind of Cipher
Cryptanalysis of ADFGX
Herbert O. Yardley
Peacetime Victory and a Tell-All Book
The Case of the Seized Manuscript
Cashing in, Again
Herbert O. Yardley: Traitor?
Censorship
References and Further Reading
Matrix Encryption
Levine and Hill
How Matrix Encryption Works
Levine's Attacks
Bauer and Millward's Attack
More Stories Left to Tell
References and Further Reading
World War II: The Enigma of Germany
Rise of the Machines
How Enigma Works
Calculating the Keyspace
Cryptanalysis Part 1. Recovering the Rotor Wirings
Cryptanalysis Part 2. Recovering the Daily Keys
After the Break
Alan Turing and Bletchley Park
Lorenz Cipher and Colossus
What if Enigma Had Never Been Broken?
Endings and New Beginnings
References and Further Reading
Cryptologic War against Japan
Forewarning of Pearl Harbor
Friedman's Team Assembles
Cryptanalysis of Red, a Japanese Diplomatic Cipher
Orange
Purple: How It Works
Purple Cryptanalysis
Practical Magic
Code Talkers
Code Talkers in Hollywood
Use of Languages as Oral Codes
References and Further Reading
Modern Cryptology
Claude Shannon
Entropy
One More Time
Unicity Points
Dazed and Confused
References and Further Reading
National Security Agency
Origins of NSA
TEMPEST
Size and Budget
The Liberty and the Pueblo
Church Committee Investigations
Post Cold War Downsizing
Some Speculation
2000 and Beyond
Interviewing with NSA
BRUSA, UKUSA, and Echelon
References and Further Reading
Data Encryption Standard
How DES Works
Reactions to and Cryptanalysis of DES
Objection 1: Key Size Matters
Objection 2: S-Box Secrecy
S-Boxes Revealed!
EFF vs. DES
Second Chance
Interesting Feature
Cryptologic Humor
Modes of Encryption
Levine's Methods
Modern Modes
References and Further Reading
Birth of Public Key Cryptography
Revolutionary Cryptologist
Diffie-Hellman Key Exchange
RSA: Solution from MIT
Fermat's Little Theorem (1640)
Euclidean Algorithm
Government Control of Cryptologic Research
RSA Patented, Alice and Bob Born Free
References and Further Reading
Attacking RSA
Eleven Non-Factoring Attacks
Attack 1. Common Modulus Attack
Attack 2. Man-in-the-Middle
Attack 3. Low Decryption Exponent
Attack 4. Partial Knowledge of p or q
Attack 5. Partial Knowledge of d
Attack 6. Low Encryption Exponent Attack
Attack 7. Common Enciphering Exponent Attack
Attack 8. Searching the Message Space
Attack 9. Adaptive Chosen Ciphertext Attacks
Attack 10. Timing Attack
Attack 11. Ron Was Wrong, Whit Is Right Attack
Factoring Challenge
Old Problem
Trial Division and the Sieve of Eratosthenes (ca. 284-204 BCE)
Fermat's Factorization Method
Euler's Factorization Method
Pollard's p-1 Algorithm
Dixon's Algorithm
Quadratic Sieve
Pollard's Number Field Sieve
Other Methods
Cryptological Humor
References and Further Reading
Primality Testing and Complexity Theory
Some Facts about Primes
Fermat Test
Miller-Rabin Test
Generating Primes
Deterministic Tests for Primality
AKS Primality Test (2002)
GIMPS
Complexity Classes, P vs. NP, Probabilistic vs. Deterministic
Cryptologic Humor
Ralph Merkle's Public Key Systems
Knapsack Encryption
Elgamal Encryption
References and Further Reading
Authenticity
Problem from World War II
Digital Signatures (and Some Attacks)
Attack 12. Chosen Ciphertext Attack
Attack 13. Insider's Factoring Attack on the Common Modulus
Attack 14. Insider's Nonfactoring Attack
Elgamal Signatures
Hash Functions: Speeding Things Up
Rivest's MD5 and NIST's SHA-1
Digital Signature Algorithm
References and Further Reading
Pretty Good Privacy
Best of Both Worlds
Birth of PGP
In Zimmermann's Own Words
Impact of PGP
Implementation Issues
References and Further Reading
Stream Ciphers
Congruential Generators
Linear Feedback Shift Registers
LFSR Attack
Cellphone Stream Cipher A5/1
RC4
References and Further Reading
Suite B All-Stars
Elliptic Curve Cryptography
Elgamal, ECC Style
Personalities behind ECC
Advanced Encryption Standard (AES)
SubBytes
ShiftRows
MixColumns
AddRoundKey
Putting It All Together: How AES-128 Works
AES Attacks
Security Guru Bruce Schneier
References and Further Reading
Possible Futures
Quantum Cryptography: How It Works
Quantum Cryptography: Historical Background
DNA Computing
References and Further Reading
Index