A brief history of cryptology and cryptographic algorithms
Author:
Publisher:
Springer
Pub. Date:
2013
Language:
English
Subjects
Subjects
Chiffrement (Informatique)
Chiffrement (Informatique) -- Histoire
COMPUTERS
COMPUTERS -- Security -- Cryptography
Cryptographie
Cryptographie -- Histoire
Cryptography
Cryptography -- History
Data encryption (Computer science)
Data encryption (Computer science) -- History
Ebook
Histoire
History
Information Systems
Information Systems -- history
Security
Chiffrement (Informatique) -- Histoire
COMPUTERS
COMPUTERS -- Security -- Cryptography
Cryptographie
Cryptographie -- Histoire
Cryptography
Cryptography -- History
Data encryption (Computer science)
Data encryption (Computer science) -- History
Ebook
Histoire
History
Information Systems
Information Systems -- history
Security
Description
The science of cryptology is made up of two halves. Cryptography is the study of how to create secure systems for communications. Cryptanalysis is the study of how to break those systems. The conflict between these two halves of cryptology is the story of secret writing. For over two thousand years governments, armies, and now individuals have wanted to protect their messages from the "enemy". This desire to communicate securely and secretly has resulted in the creation of numerous and increasingly complicated systems to protect one's messages. On the other hand, for every new system to protect messages there is a cryptanalyst creating a new technique to break that system. With the advent of computers the cryptographer seems to finally have the upper hand. New mathematically based cryptographic algorithms that use computers for encryption and decryption are so secure that brute-force techniques seem to be the only way to break them so far. This work traces the history of the conflict between cryptographer and cryptanalyst, explores in some depth the algorithms created to protect messages, and suggests where the field is going in the future
More Details
Contributors:
ISBN:
9783319016276
9783319016283
9783319016283
More Copies In Prospector
Loading Prospector Copies...
Staff View
Grouping Information
Grouped Work ID | 87fd1be5-100b-767f-a97c-f5c0f02b8e33 |
---|---|
Grouping Title | brief history of cryptology and cryptographic algorithms |
Grouping Author | john dooley |
Grouping Category | book |
Grouping Language | English (eng) |
Last Grouping Update | 2024-03-20 17:09:14PM |
Last Indexed | 2024-04-23 00:02:00AM |
Solr Fields
accelerated_reader_point_value
0
accelerated_reader_reading_level
0
author
Dooley, John, 1952-
author2-role
SpringerLink (Online service)
author_display
Dooley, John
available_at_adams
Adams State University
collection_adams
Main Collection
detailed_location_adams
ASU Main (3rd floor)
display_description
The science of cryptology is made up of two halves. Cryptography is the study of how to create secure systems for communications. Cryptanalysis is the study of how to break those systems. The conflict between these two halves of cryptology is the story of secret writing. For over two thousand years governments, armies, and now individuals have wanted to protect their messages from the "enemy". This desire to communicate securely and secretly has resulted in the creation of numerous and increasingly complicated systems to protect one's messages. On the other hand, for every new system to protect messages there is a cryptanalyst creating a new technique to break that system. With the advent of computers the cryptographer seems to finally have the upper hand. New mathematically based cryptographic algorithms that use computers for encryption and decryption are so secure that brute-force techniques seem to be the only way to break them so far. This work traces the history of the conflict between cryptographer and cryptanalyst, explores in some depth the algorithms created to protect messages, and suggests where the field is going in the future
format_adams
Book
format_category_adams
Books
id
87fd1be5-100b-767f-a97c-f5c0f02b8e33
isbn
9783319016276
9783319016283
9783319016283
itype_adams
Book
last_indexed
2024-04-23T06:02:00.555Z
lexile_score
-1
literary_form
Non Fiction
literary_form_full
Non Fiction
local_callnumber_adams
QA76.9.A25 D66 2013
owning_library_adams
Adams State University
owning_location_adams
Adams State University
primary_isbn
9783319016276
publishDate
2013
publisher
Springer
recordtype
grouped_work
series
SpringerBriefs in computer science
series_with_volume
SpringerBriefs in computer science|
subject_facet
COMPUTERS -- Security -- Cryptography
Chiffrement (Informatique) -- Histoire
Cryptographie -- Histoire
Cryptography
Cryptography -- History
Data encryption (Computer science)
Data encryption (Computer science) -- History
Ebook
History
Information Systems -- history
Chiffrement (Informatique) -- Histoire
Cryptographie -- Histoire
Cryptography
Cryptography -- History
Data encryption (Computer science)
Data encryption (Computer science) -- History
Ebook
History
Information Systems -- history
title_display
A brief history of cryptology and cryptographic algorithms
title_full
A brief history of cryptology and cryptographic algorithms / John F. Dooley
title_short
A brief history of cryptology and cryptographic algorithms
topic_facet
COMPUTERS
Chiffrement (Informatique)
Cryptographie
Cryptography
Data encryption (Computer science)
Histoire
History
Information Systems
Security
history
Chiffrement (Informatique)
Cryptographie
Cryptography
Data encryption (Computer science)
Histoire
History
Information Systems
Security
history
Solr Details Tables
item_details
Bib Id | Item Id | Shelf Loc | Call Num | Format | Format Category | Num Copies | Is Order Item | Is eContent | eContent Source | eContent URL | Detailed Status | Last Checkin | Location |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
ils:.b41144922 | .i84533493 | ASU Main (3rd floor) | QA76.9.A25 D66 2013 | 1 | false | false | On Shelf | Aug 07, 2023 | as | ||||
external_econtent:ils:.b41144922 | .i150358520 | CMU Electronic Access | Web Content | eBook | 1 | false | true | SpringerLink | http://ezproxy.coloradomesa.edu/login?url=https://link.springer.com/10.1007/978-3-319-01628-3 | Available Online | cueme |
record_details
Bib Id | Format | Format Category | Edition | Language | Publisher | Publication Date | Physical Description | Abridged |
---|---|---|---|---|---|---|---|---|
ils:.b41144922 | Book | Books | English | Springer | 2013 | 1 online resource (xii, 99 pages) : illustrations. | ||
external_econtent:ils:.b41144922 | Web Content | eBook | English | Springer | 2013 | 1 online resource (xii, 99 pages) : illustrations. |
scoping_details_adams
Bib Id | Item Id | Grouped Status | Status | Locally Owned | Available | Holdable | Bookable | In Library Use Only | Library Owned | Holdable PTypes | Bookable PTypes | Local Url |
---|---|---|---|---|---|---|---|---|---|---|---|---|
ils:.b41144922 | .i84533493 | On Shelf | On Shelf | false | true | true | false | false | true | 56, 57, 58, 59 |