Logo

Cryptography, A Study on Secret Writings

Large book cover: Cryptography, A Study on Secret Writings

Cryptography, A Study on Secret Writings
by

Publisher: Aegean Park Press
ISBN/ASIN: 1125391731
Number of pages: 238

Description:
This book is a classic in cryptographic literature. Text is divided into parts: Descriptions of the principal systems of cryptography; Examples of deciphering (cryptanalysis); Lists and tables with bibliography; plus an important section titled 'The Playfair Cipher'. This latter section is written by Lt. Commander W.W. Smith, U.S. Navy. Here the student is taken step-by-step through the solution of a Playfair Cipher problem.

Home page url

Download or read it online for free here:
Download link
(multiple formats)

Similar books

Book cover: Coding Theory and CryptographyCoding Theory and Cryptography
by - Springer
This book concerns elementary and advanced aspects of coding theory and cryptography. The coding theory contributions deal mostly with algebraic coding theory. There are both historical and mathematical papers on cryptography.
(10165 views)
Book cover: Hacking Secret Ciphers with PythonHacking Secret Ciphers with Python
by
The book teaches complete beginners how to program in the Python programming language. The book features the source code to several ciphers and hacking programs for these ciphers. The programs include the Caesar cipher, transposition cipher, etc.
(14112 views)
Book cover: Visual Cryptography and Its ApplicationsVisual Cryptography and Its Applications
by - BookBoon
Visual cryptography provides a technique by which one secret can be distributed into two or more shares. When the shares are xeroxed onto transparencies and then superimposed, the original secret can be discovered without computer participation.
(6070 views)
Book cover: Public-Key Cryptography: Theory and PracticePublic-Key Cryptography: Theory and Practice
by - TU Darmstadt
Multiple aspects of public-key cryptography are examined. The author covers the theory of provably secure public-key cryptography and the implementation of exponentiation and multi-exponentiation. An introduction to provable security is provided.
(8269 views)