History of cryptography and cryptanalysis : codes, ciphers, and their algorithms (Record no. 32623)

000 -LEADER
fixed length control field nam a22 4500
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 231128b xxu||||| |||| 00| 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9783030080167
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 652.8
Item number DOO
100 ## - MAIN ENTRY--PERSONAL NAME
Personal name Dooley, John F
245 ## - TITLE STATEMENT
Title History of cryptography and cryptanalysis : codes, ciphers, and their algorithms
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Name of publisher, distributor, etc Springer,
Date of publication, distribution, etc 2018
Place of publication, distribution, etc Cham :
300 ## - PHYSICAL DESCRIPTION
Extent xiv, 303 p. ;
Other physical details ill., (some color) ,
Dimensions 23 cm
365 ## - TRADE PRICE
Price amount 39.99
Price type code EUR
Unit of pricing 91.70
490 ## - SERIES STATEMENT
Series statement History of computing
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc Includes bibliographical references and index.
520 ## - SUMMARY, ETC.
Summary, etc This accessible textbook presents a fascinating review of cryptography and cryptanalysis across history. The text relates the earliest use of the monoalphabetic cipher in the ancient world, the development of the “unbreakable” Vigenère cipher, and an account of how cryptology entered the arsenal of military intelligence during the American Revolutionary War. Moving on to the American Civil War, the book explains how the Union solved the Vigenère ciphers used by the Confederates, before investigating the development of cipher machines throughout World War I and II. This is then followed by an exploration of cryptology in the computer age, from public-key cryptography and web security, to criminal cyber-attacks and cyber-warfare. Looking to the future, the role of cryptography in the Internet of Things is also discussed, along with the potential impact of quantum computing. Topics and features: Presents a history of cryptology from ancient Rome to the present day, with a focus on cryptology in the 20th and 21st centuries Reviews the different types of cryptographic algorithms used to create secret messages, and the various methods for breaking such secret messages Provides engaging examples throughout the book illustrating the use of cryptographic algorithms in different historical periods Describes the notable contributions to cryptology of Herbert Yardley, William and Elizebeth Smith Friedman, Lester Hill, Agnes Meyer Driscoll, and Claude Shannon Concludes with a review of tantalizing unsolved mysteries in cryptology, such as the Voynich Manuscript, the Beale Ciphers, and the Kryptos sculpture This engaging work is ideal as both a primary text for courses on the history of cryptology, and as a supplementary text for advanced undergraduate courses on computer security. No prior background in mathematics is assumed, beyond what would be encountered in an introductory course on discrete mathematics. John F. Dooley is the William and Marilyn Ingersoll Professor Emeritus of Computer Science at Knox College in Galesburg, Illinois. Before returning to teaching in 2001, he spent more than 15 years in the software industry as a developer, designer, and manager working for companies such as Bell Telephone Laboratories, McDonnell Douglas, IBM, and Motorola. His other publications include the popular Springer title Codes, Ciphers and Spies: Tales of Military Intelligence in World War I.
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Vigenère cipher
Topical term or geographic name as entry element Transposition cipher
Topical term or geographic name as entry element SIGABA
Topical term or geographic name as entry element Quantum computers
Topical term or geographic name as entry element Public-key cryptography
Topical term or geographic name as entry element Plaintext
Topical term or geographic name as entry element Cryptogram
Topical term or geographic name as entry element Elliptic curve
Topical term or geographic name as entry element Cipher Bureau
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme
Item type Books
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Permanent location Current location Date acquired Cost, normal purchase price Full call number Barcode Date last seen Koha item type
          DAIICT DAIICT 2023-11-25 3667.08 652.8 DOO 034484 2023-11-28 Books

Powered by Koha