Logo

Cryptography, A Study on Secret Writings

Large book cover: Cryptography, A Study on Secret Writings

Cryptography, A Study on Secret Writings
by

Publisher: Aegean Park Press
ISBN/ASIN: 1125391731
Number of pages: 238

Description:
This book is a classic in cryptographic literature. Text is divided into parts: Descriptions of the principal systems of cryptography; Examples of deciphering (cryptanalysis); Lists and tables with bibliography; plus an important section titled 'The Playfair Cipher'. This latter section is written by Lt. Commander W.W. Smith, U.S. Navy. Here the student is taken step-by-step through the solution of a Playfair Cipher problem.

Home page url

Download or read it online for free here:
Download link
(multiple formats)

Similar books

Book cover: Invent with PythonInvent with Python
by - inventwithpython.com
This book describes several encryption programs for various ciphers, along with how to write programs that can break these ciphers. The book is for complete beginners, it will teach you how to encrypt and decrypt messages.
(5785 views)
Book cover: Mathematical CryptologyMathematical Cryptology
by - Tampere University of Technology
These notes contain the central mathematical background needed for understanding modern data encryption methods, and introduce applications in cryptography and various protocols. The fledgling quantum cryptography is briefly introduced.
(7793 views)
Book cover: Visual Cryptography and Its ApplicationsVisual Cryptography and Its Applications
by - BookBoon
Visual cryptography provides a technique by which one secret can be distributed into two or more shares. When the shares are xeroxed onto transparencies and then superimposed, the original secret can be discovered without computer participation.
(5519 views)
Book cover: Advances in Cryptology - CRYPTO'96Advances in Cryptology - CRYPTO'96
by - Springer
Contents: Universal Hashing and Multiple Authentication; Asymmetric Cryptography with a Hidden Monomial; Hidden Collisions on DSS; All Bits in ax + b mod p are Hard; Robust and Efficient Sharing of RSA Functions; Improved Differential Attacks on RC5.
(3660 views)