Logo

Cryptography, A Study on Secret Writings

Large book cover: Cryptography, A Study on Secret Writings

Cryptography, A Study on Secret Writings
by

Publisher: Aegean Park Press
ISBN/ASIN: 1125391731
Number of pages: 238

Description:
This book is a classic in cryptographic literature. Text is divided into parts: Descriptions of the principal systems of cryptography; Examples of deciphering (cryptanalysis); Lists and tables with bibliography; plus an important section titled 'The Playfair Cipher'. This latter section is written by Lt. Commander W.W. Smith, U.S. Navy. Here the student is taken step-by-step through the solution of a Playfair Cipher problem.

Home page url

Download or read it online for free here:
Download link
(multiple formats)

Similar books

Book cover: Handbook of Applied CryptographyHandbook of Applied Cryptography
by - CRC-Press
This Handbook will serve as a valuable reference for the novice as well as for the expert who needs a wider scope of coverage within the area of cryptography. It is a necessary and timely guide for professionals who practice the art of cryptography.
(33339 views)
Book cover: Basic CryptanalysisBasic Cryptanalysis
- United States Department of the Army
Introduction to cryptanalysis, monographic, polygraphic, and polyalphabetic substitution systems, transposition systems, analysis of code systems. Text also contains exhaustive material to aid in the solution of cipher systems.
(14211 views)
Book cover: Invent with PythonInvent with Python
by - inventwithpython.com
This book describes several encryption programs for various ciphers, along with how to write programs that can break these ciphers. The book is for complete beginners, it will teach you how to encrypt and decrypt messages.
(12911 views)
Book cover: A Graduate Course in Applied CryptographyA Graduate Course in Applied Cryptography
by - cryptobook.us
This book is about constructing practical cryptosystems for which we can argue security under plausible assumptions. The book covers many constructions for different tasks in cryptography. For each task we define a precise security goal ...
(5811 views)