Cryptography, A Study on Secret Writings
by Andre Langie
Publisher: Aegean Park Press 1922
ISBN/ASIN: 1125391731
Number of pages: 238
Description:
This book is a classic in cryptographic literature. Text is divided into parts: Descriptions of the principal systems of cryptography; Examples of deciphering (cryptanalysis); Lists and tables with bibliography; plus an important section titled 'The Playfair Cipher'. This latter section is written by Lt. Commander W.W. Smith, U.S. Navy. Here the student is taken step-by-step through the solution of a Playfair Cipher problem.
Download or read it online for free here:
Download link
(multiple formats)
Similar books
An introduction to Cryptography
by Phil Zimmermann
This guide describes how to use PGP to manage your organization’s messages and data. It is an overview of the terminology and concepts of PGP products. It contains discussions of security, privacy, and the vulnerabilities inherent in PGP.
(17173 views)
by Phil Zimmermann
This guide describes how to use PGP to manage your organization’s messages and data. It is an overview of the terminology and concepts of PGP products. It contains discussions of security, privacy, and the vulnerabilities inherent in PGP.
(17173 views)
Military Cryptanalysis
by William F. Friedman - NSA
One of the most well-respected publications on cryptanalysis, as was written by William F. Friedman, one of the true experts in the field. Now declassified by the NSA, this book is key in helping individuals understand and solve cipher systems.
(16970 views)
by William F. Friedman - NSA
One of the most well-respected publications on cryptanalysis, as was written by William F. Friedman, one of the true experts in the field. Now declassified by the NSA, this book is key in helping individuals understand and solve cipher systems.
(16970 views)
Public-Key Cryptography: Theory and Practice
by Bodo Moeller - TU Darmstadt
Multiple aspects of public-key cryptography are examined. The author covers the theory of provably secure public-key cryptography and the implementation of exponentiation and multi-exponentiation. An introduction to provable security is provided.
(13601 views)
by Bodo Moeller - TU Darmstadt
Multiple aspects of public-key cryptography are examined. The author covers the theory of provably secure public-key cryptography and the implementation of exponentiation and multi-exponentiation. An introduction to provable security is provided.
(13601 views)
Invent with Python
by Al Sweigart - inventwithpython.com
This book describes several encryption programs for various ciphers, along with how to write programs that can break these ciphers. The book is for complete beginners, it will teach you how to encrypt and decrypt messages.
(13116 views)
by Al Sweigart - inventwithpython.com
This book describes several encryption programs for various ciphers, along with how to write programs that can break these ciphers. The book is for complete beginners, it will teach you how to encrypt and decrypt messages.
(13116 views)