Codes and ciphers : (Record no. 32187)

MARC details
000 -LEADER
fixed length control field 05551 a2200277 4500
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER
LC control number 2001037409
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 052181054X (hbk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 0521008905 (pbk.)
050 00 - LIBRARY OF CONGRESS CALL NUMBER
Classification number Z103
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 652
090 ## - LOCALLY ASSIGNED LC-TYPE CALL NUMBER (OCLC); LOCAL CALL NUMBER (RLIN)
-- 32642
-- 32642
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Churchhouse, R. F.
245 10 - TITLE STATEMENT
Title Codes and ciphers :
Remainder of title Julius Caesar, the Enigma, and the internet
Statement of responsibility, etc. R.F. Churchhouse
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. Cambridge ;
-- New York :
Name of publisher, distributor, etc. Cambridge University Press,
Date of publication, distribution, etc. 2002.
300 ## - PHYSICAL DESCRIPTION
Extent x, 240 p. :
Other physical details ill. ;
Dimensions 24 cm.
546 ## - LANGUAGE NOTE
Language note eng
500 ## - GENERAL NOTE
General note Bibliografie si index la sfarsitul cartii
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note Machine generated contents note: 1 Introduction 1 -- Some aspects of secure communication I -- Julius Caesar's cipher 2 -- Some basic definitions 3 -- Three stages to decryption identification, breaking and setting 4 -- Codes and ciphers 5 -- Assessing the strength ofa ciphersystem 7 -- Error detecting and correcting codes 8 -- Other methods of concealing messages 9 -- Ivlodulararithmetic 10 -- Modular addition and subtraction ofletters 11 -- Gender 11 -- End matter 12 -- Z FromJuliusCaesar tosimplesubstitution 13 -- Julius Caesarciphers and theirsolution 13 -- Simplesubstitutionciphers 15 -- How to solve a simple substitution cipher 17 -- Letter frequencies in languages other thanEnglish 24 -- How many letters are needed to solve a simple substitution cipher? 26 -- 3 Polyalphabeticsystems 28 -- StrengtheningJulius Caesar Vigentre ciphers 28 -- HowtosolveaVigenirecipher 30 -- Indicators 33 -- Depths 34 -- Recognising'depths' 34 -- How much text do we need to solveaVigenere cpher? 37 -- Jefferson's cylinder 37 -- 4 Jigsaw ciphers 40 -- Transpositions 40 -- Simple transposition 40 -- Doubletransposition 44 -- Other forms oftransposition 48 -- Assessment of the security of transposition ciphers 51 -- Double encipherment in general 52 -- 5 Two-letterciphers 54 -- Monograph to digraph 54 -- MDTM ciphers 56 -- Digraph to digraph 58 -- Playfair encipherment 59 -- Playfair decipherment 60 -- Cryptanaytic aspects of Playfair 61 -- DoublePlayfair 61 -- 6 Codes 64 -- Characteristics of codes 64 -- Onepartand to-part codes 65 -- Codeplusadditive 67 -- 7 Ciphersforspies 72 -- Stencil ciphers 73 -- Book ciphers 75 -- Letter frequencies in book ciphers 79 -- Solving a book cipher 79 -- Indicators 86 -- Disastrous errors in using a book cipher 86 -- 'GAito"sd phers 88 -- One-time pad 92 -- 8 Produciingrandomnumbersandletters 94 -- Random sequences 94 -- Producing random sequences 95 -- Coin spinning 95 -- Throwingdice 96 -- Lotterytype draws 97 -- Cosmic rays 97 -- Amplifier noise 97 -- Pseudo-random sequences 98 -- Linear recurrences 99 -- Using a binary stream ofkey for endpherment 100 -- Binarylinarsequences as key generators 101 -- Cryptanalysisofa linear recurrence 104 -- Improving the security of biary keys 104 -- Pseudo-randomnumbergenerators 106 -- The mid-square method 106 -- Linearcongruential generators 107 -- 9 TheEnigmaciphermachine 110 -- Historicalbackground 110 -- TheoriginalEnigma 112 -- Encipherment using wired wheels 116 -- EnciphermentbytheEnigma 118 -- The Enigmaplugboard 121 -- TheAchilles heelof the Enigma 121 -- The indicator 'chains' in the Enigma 125 -- Aligningthe chains 128 -- Identifying RI and its setting 128 -- Doublyenciphered Enigma messages 132 -- TheAbwehr Enigma 132 -- 10 TheHagelinciphermachine 133 -- Historical background 133 -- Structureofthellagelinmachine 134 -- Enciphermentonthe Hagelin 135 -- Choosing the cage for the Hagelin 138 -- The theoretical 'work factofo' fortheHagein 142 -- Solving the Hagelin from a stretch of ke 143 -- Additional featursof rheHagelin machine 147 -- Theslide 147 -- Idenrifying the slide in a cipher message 148 -- Overlapping 148 -- solving the Hagelin from cipher texts only 150 -- 11 BeyondtheEnigmia 153 -- TheSZ42: a pre-electronic machine 153 -- Description of the 742 machine 155 -- EnciphermentontheSZ42 t55 -- Breakingandsettingthe5Z42 158 -- Modifications tothe SZ42 159 -- 12 Publickeycryptography 161 -- Historicalbackground 161 -- Securityissues 163 -- Protection ofprogramsand data 163 -- Encipherment of programs, dataand messages 164 -- The key distribution problem 166 -- The Difie-Hellman key exchange system 166 -- Strength of the Diffie-Hellman system 168 -- 13 Encipherment and the internet 170 -- Generalisation of simple substitution 170 -- Factorisation of large integers 171 -- The standard method of factorisation 172 -- Fermat's'itde Theorem' 174 -- The Fermat-Euler Theorem (as needed in theRSA sstem) 175 -- Enciphermen and decipherment keys in the RSA system 175 -- The encipherment and decipherment processes in the RSA sysem 178 -- How does the key-owner reply tocorrespondents? 182 -- The Data Encryption Standard (DES) 183 -- Security of te DES 184 -- Chaining 186 -- Implementation of the DES 186 -- Using both RSA and DES 186 -- A salutary note 187 -- Beyond dteDES 187 -- Authentication and signature verification 188 -- Ellipticcurvecryptography 189 -- Appendix 190 -- Solutions to problems 218 -- References 230 -- Name index 235 -- Subject index 237.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Cryptography.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Ciphers.
856 41 - ELECTRONIC LOCATION AND ACCESS
Materials specified Sample text
Uniform Resource Identifier <a href="http://www.loc.gov/catdir/samples/cam033/2001037409.html">http://www.loc.gov/catdir/samples/cam033/2001037409.html</a>
856 42 - ELECTRONIC LOCATION AND ACCESS
Materials specified Publisher description
Uniform Resource Identifier <a href="http://www.loc.gov/catdir/description/cam022/2001037409.html">http://www.loc.gov/catdir/description/cam022/2001037409.html</a>
856 41 - ELECTRONIC LOCATION AND ACCESS
Materials specified Table of contents
Uniform Resource Identifier <a href="http://www.loc.gov/catdir/toc/fy02/2001037409.html">http://www.loc.gov/catdir/toc/fy02/2001037409.html</a>
856 42 - ELECTRONIC LOCATION AND ACCESS
Materials specified Contributor biographical information
Uniform Resource Identifier <a href="http://www.loc.gov/catdir/enhancements/fy0731/2001037409-b.html">http://www.loc.gov/catdir/enhancements/fy0731/2001037409-b.html</a>
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Institution code [OBSOLETE] IMAR
Koha item type Carti
Call number prefix 652
Serial record flag EP
Holdings
Withdrawn status Lost status Damaged status Not for loan Home library Current library Date acquired Inventory number Full call number Barcode Date last seen Price effective from Koha item type
        IMAR IMAR 03/21/2024 ? 652.8 0037501 03/21/2024 03/21/2024 Carti

Powered by Koha