
-
Books
-
Education
-
eBooks
-
Audio Books
-
Film & TV
-
Calendars, Diaries & Stationery
-
Giftshop
RRP means 'Recommended Retail Price' and is the price our supplier recommends to retailers that the product be offered for sale. It does not necessarily mean the product has been offered or sold at the RRP by us or anyone else.
Winner of an Outstanding Academic Title Award from CHOICE Magazine
Most available cryptology books primarily focus on either mathematics or history. Breaking this mold, Secret History: The Story of Cryptology gives a thorough yet accessible treatment of both the mathematics and history of cryptology.… more
Winner of an Outstanding Academic Title Award from CHOICE Magazine
Most available cryptology books primarily focus on either mathematics or history. Breaking this mold, Secret History: The Story of Cryptology gives a thorough yet accessible treatment of both the mathematics and history of cryptology.
Requiring minimal mathematical prerequisites, the book presents the mathematics in sufficient detail and weaves the history throughout the chapters. In addition to the fascinating historical and political sides of cryptology, the author-a former Scholar-in-Residence at the U.S. National Security Agency (NSA) Center for Cryptologic History-includes interesting instances of codes and ciphers in crime, literature, music, and art.
Following a mainly chronological development of concepts, the book focuses on classical cryptology in the first part. It covers Greek and Viking cryptography, the Vigenere cipher, the one-time pad, transposition ciphers, Jefferson's cipher wheel, the Playfair cipher, ADFGX, matrix encryption, World War II cipher systems (including a detailed examination of Enigma), and many other classical methods introduced before World War II. The second part of the book examines modern cryptology. The author looks at the work of Claude Shannon and the origin and current status of the NSA, including some of its Suite B algorithms such as elliptic curve cryptography and the Advanced Encryption Standard. He also details the controversy that surrounded the Data Encryption Standard and the early years of public key cryptography.
The book not only provides the how-to of the Diffie-Hellman key exchange and RSA algorithm, but also covers many attacks on the latter. Additionally, it discusses Elgamal, digital signatures, PGP, and stream ciphers and explores future directions such as quantum cryptography and DNA computing. With numerous real-world examples and extensive references, this book skillfully balances the historical aspects of cryptology with its mathematical details. It provides readers with a sound foundation in this dynamic field. Please visit Dr. Bauer's website, which provides access to exercise sets: http://depts.ycp.edu/~cbauer/
lessThis title is in stock with our Australian supplier and should arrive at our Sydney warehouse within 2 - 3 weeks of you placing an order.
Once received into our warehouse we will despatch it to you with a Shipping Notification which includes online tracking.
Please check the estimated delivery times below for your region, for after your order is despatched from our warehouse:
Thanks for reviewing Secret History. We will process your review. Accepted reviews will be posted within 3-7 business days.
Be the first to know, stay up to date with what's trending and get staff picks in your inbox with our newsletter
Public: Allow anyone to view or shop your List
Private: No one can view or shop your List
We have kept your A&R details for your new Angus & Robertson account
We also noticed that you have previously shopped at Bookworld. Would you like us to keep your Bookworld order history?
We also noticed that you have an account on Bookworld. Would you like us to keep your Bookworld details, including delivery addresses, order history and citizenship information?
Share This Book