A brief history of cryptology and cryptographic algorithms

Book Cover
Publisher:
Springer
Pub. Date:
2013
Language:
English
Description
The science of cryptology is made up of two halves. Cryptography is the study of how to create secure systems for communications. Cryptanalysis is the study of how to break those systems. The conflict between these two halves of cryptology is the story of secret writing. For over two thousand years governments, armies, and now individuals have wanted to protect their messages from the "enemy". This desire to communicate securely and secretly has resulted in the creation of numerous and increasingly complicated systems to protect one's messages. On the other hand, for every new system to protect messages there is a cryptanalyst creating a new technique to break that system. With the advent of computers the cryptographer seems to finally have the upper hand. New mathematically based cryptographic algorithms that use computers for encryption and decryption are so secure that brute-force techniques seem to be the only way to break them so far. This work traces the history of the conflict between cryptographer and cryptanalyst, explores in some depth the algorithms created to protect messages, and suggests where the field is going in the future
Also in This Series
More Like This
More Details
ISBN:
9783319016276
9783319016283
More Copies In Prospector
Loading Prospector Copies...
Staff View

Grouping Information

Grouped Work ID87fd1be5-100b-767f-a97c-f5c0f02b8e33
Grouping Titlebrief history of cryptology and cryptographic algorithms
Grouping Authorjohn dooley
Grouping Categorybook
Grouping LanguageEnglish (eng)
Last Grouping Update2024-03-20 17:09:14PM
Last Indexed2024-04-23 00:02:00AM

Solr Fields

accelerated_reader_point_value
0
accelerated_reader_reading_level
0
author
Dooley, John, 1952-
author2-role
SpringerLink (Online service)
author_display
Dooley, John
available_at_adams
Adams State University
collection_adams
Main Collection
detailed_location_adams
ASU Main (3rd floor)
display_description
The science of cryptology is made up of two halves. Cryptography is the study of how to create secure systems for communications. Cryptanalysis is the study of how to break those systems. The conflict between these two halves of cryptology is the story of secret writing. For over two thousand years governments, armies, and now individuals have wanted to protect their messages from the "enemy". This desire to communicate securely and secretly has resulted in the creation of numerous and increasingly complicated systems to protect one's messages. On the other hand, for every new system to protect messages there is a cryptanalyst creating a new technique to break that system. With the advent of computers the cryptographer seems to finally have the upper hand. New mathematically based cryptographic algorithms that use computers for encryption and decryption are so secure that brute-force techniques seem to be the only way to break them so far. This work traces the history of the conflict between cryptographer and cryptanalyst, explores in some depth the algorithms created to protect messages, and suggests where the field is going in the future
format_adams
Book
format_category_adams
Books
id
87fd1be5-100b-767f-a97c-f5c0f02b8e33
isbn
9783319016276
9783319016283
itype_adams
Book
last_indexed
2024-04-23T06:02:00.555Z
lexile_score
-1
literary_form
Non Fiction
literary_form_full
Non Fiction
local_callnumber_adams
QA76.9.A25 D66 2013
owning_library_adams
Adams State University
owning_location_adams
Adams State University
primary_isbn
9783319016276
publishDate
2013
publisher
Springer
recordtype
grouped_work
series
SpringerBriefs in computer science
series_with_volume
SpringerBriefs in computer science|
subject_facet
COMPUTERS -- Security -- Cryptography
Chiffrement (Informatique) -- Histoire
Cryptographie -- Histoire
Cryptography
Cryptography -- History
Data encryption (Computer science)
Data encryption (Computer science) -- History
Ebook
History
Information Systems -- history
title_display
A brief history of cryptology and cryptographic algorithms
title_full
A brief history of cryptology and cryptographic algorithms / John F. Dooley
title_short
A brief history of cryptology and cryptographic algorithms
topic_facet
COMPUTERS
Chiffrement (Informatique)
Cryptographie
Cryptography
Data encryption (Computer science)
Histoire
History
Information Systems
Security
history

Solr Details Tables

item_details

Bib IdItem IdShelf LocCall NumFormatFormat CategoryNum CopiesIs Order ItemIs eContenteContent SourceeContent URLDetailed StatusLast CheckinLocation
ils:.b41144922.i84533493ASU Main (3rd floor)QA76.9.A25 D66 20131falsefalseOn ShelfAug 07, 2023as
external_econtent:ils:.b41144922.i150358520CMU Electronic AccessWeb ContenteBook1falsetrueSpringerLinkhttp://ezproxy.coloradomesa.edu/login?url=https://link.springer.com/10.1007/978-3-319-01628-3Available Onlinecueme

record_details

Bib IdFormatFormat CategoryEditionLanguagePublisherPublication DatePhysical DescriptionAbridged
ils:.b41144922BookBooksEnglishSpringer20131 online resource (xii, 99 pages) : illustrations.
external_econtent:ils:.b41144922Web ContenteBookEnglishSpringer20131 online resource (xii, 99 pages) : illustrations.

scoping_details_adams

Bib IdItem IdGrouped StatusStatusLocally OwnedAvailableHoldableBookableIn Library Use OnlyLibrary OwnedHoldable PTypesBookable PTypesLocal Url
ils:.b41144922.i84533493On ShelfOn Shelffalsetruetruefalsefalsetrue56, 57, 58, 59