Logo

Cryptography, A Study on Secret Writings

Large book cover: Cryptography, A Study on Secret Writings

Cryptography, A Study on Secret Writings
by

Publisher: Aegean Park Press
ISBN/ASIN: 1125391731
Number of pages: 238

Description:
This book is a classic in cryptographic literature. Text is divided into parts: Descriptions of the principal systems of cryptography; Examples of deciphering (cryptanalysis); Lists and tables with bibliography; plus an important section titled 'The Playfair Cipher'. This latter section is written by Lt. Commander W.W. Smith, U.S. Navy. Here the student is taken step-by-step through the solution of a Playfair Cipher problem.

Home page url

Download or read it online for free here:
Download link
(multiple formats)

Similar books

Book cover: Elementary CryptanalysisElementary Cryptanalysis
by - American Photographic Publishing Co.
A classic introduction to codebreaking, focusing on techniques for deciphering simple ciphers. It covers substitution and transposition ciphers and methods to analyze encrypted messages, offering both theoretical insights and practical examples.
(3389 views)
Book cover: Hacking Secret Ciphers with PythonHacking Secret Ciphers with Python
by
The book teaches complete beginners how to program in the Python programming language. The book features the source code to several ciphers and hacking programs for these ciphers. The programs include the Caesar cipher, transposition cipher, etc.
(24550 views)
Book cover: Mathematical CryptologyMathematical Cryptology
by - Tampere University of Technology
These notes contain the central mathematical background needed for understanding modern data encryption methods, and introduce applications in cryptography and various protocols. The fledgling quantum cryptography is briefly introduced.
(15908 views)
Book cover: A brief introduction of quantum cryptography for engineersA brief introduction of quantum cryptography for engineers
by - arXiv
We present the principles behind quantum key distribution and discuss a few well-known QKD protocols. We focus more on the implementation of QKD protocols rather than security analysis. Another topic covered here is the security of QKD systems.
(15228 views)