A brief history of cryptology and cryptographic algorithms
(Book)

Book Cover
Published:
Cham : Springer, 2013.
Format:
Book
Physical Desc:
1 online resource (xii, 99 pages) : illustrations.
Status:
ASU Main (3rd floor)
QA76.9.A25 D66 2013
Copies
Location
Call Number
Status
ASU Main (3rd floor)
QA76.9.A25 D66 2013
On Shelf
Citations
APA Citation (style guide)

Dooley, J. (2013). A brief history of cryptology and cryptographic algorithms. Cham: Springer.

Chicago / Turabian - Author Date Citation (style guide)

Dooley, John, 1952-. 2013. A Brief History of Cryptology and Cryptographic Algorithms. Cham: Springer.

Chicago / Turabian - Humanities Citation (style guide)

Dooley, John, 1952-, A Brief History of Cryptology and Cryptographic Algorithms. Cham: Springer, 2013.

MLA Citation (style guide)

Dooley, John. A Brief History of Cryptology and Cryptographic Algorithms. Cham: Springer, 2013. Print.

Note! Citation formats are based on standards as of July 2010. Citations contain only title, author, edition, publisher, and year published. Citations should be used as a guideline and should be double checked for accuracy.
Description

The science of cryptology is made up of two halves. Cryptography is the study of how to create secure systems for communications. Cryptanalysis is the study of how to break those systems. The conflict between these two halves of cryptology is the story of secret writing. For over two thousand years governments, armies, and now individuals have wanted to protect their messages from the "enemy". This desire to communicate securely and secretly has resulted in the creation of numerous and increasingly complicated systems to protect one's messages. On the other hand, for every new system to protect messages there is a cryptanalyst creating a new technique to break that system. With the advent of computers the cryptographer seems to finally have the upper hand. New mathematically based cryptographic algorithms that use computers for encryption and decryption are so secure that brute-force techniques seem to be the only way to break them so far. This work traces the history of the conflict between cryptographer and cryptanalyst, explores in some depth the algorithms created to protect messages, and suggests where the field is going in the future.

Also in This Series
More Like This
More Details
Language:
English
ISBN:
9783319016283, 3319016288, 331901627X, 9783319016276
UPC:
10.1007/978-3-319-01628-3

Notes

Bibliography
Includes bibliographical references and index.
Description
The science of cryptology is made up of two halves. Cryptography is the study of how to create secure systems for communications. Cryptanalysis is the study of how to break those systems. The conflict between these two halves of cryptology is the story of secret writing. For over two thousand years governments, armies, and now individuals have wanted to protect their messages from the "enemy". This desire to communicate securely and secretly has resulted in the creation of numerous and increasingly complicated systems to protect one's messages. On the other hand, for every new system to protect messages there is a cryptanalyst creating a new technique to break that system. With the advent of computers the cryptographer seems to finally have the upper hand. New mathematically based cryptographic algorithms that use computers for encryption and decryption are so secure that brute-force techniques seem to be the only way to break them so far. This work traces the history of the conflict between cryptographer and cryptanalyst, explores in some depth the algorithms created to protect messages, and suggests where the field is going in the future.
More Copies In Prospector
Loading Prospector Copies...
Staff View
Grouped Work ID:
2aff9a7c-0021-1dff-4324-86593190b3e1
Go To GroupedWork

Record Information

Last File Modification TimeJul 26, 2019 02:22:13 AM
Last Grouped Work Modification TimeJul 26, 2019 01:05:07 AM

MARC Record

LEADER05397cam a2200805Ii 4500
001ocn860897407
003OCoLC
00520161107013112.1
006m     o  d        
007cr cnu---unuuu
008131017s2013    sz a    ob    001 0 eng d
019 |a 861559123
020 |a 9783319016283|q (electronic bk.)
020 |a 3319016288|q (electronic bk.)
020 |a 331901627X
020 |a 9783319016276
020 |z 9783319016276
0247 |a 10.1007/978-3-319-01628-3|2 doi
035 |a (OCoLC)860897407|z (OCoLC)861559123
040 |a GW5XE|b eng|e rda|e pn|c GW5XE|d ZMC|d OHS|d COO|d IDEBK|d CDX|d N$T|d GGVRL|d OHI|d YDXCP|d OCLCF|d EBLCP|d DEBSZ|d VT2|d COH|d OCLCQ|d OCLCO|d DIBIB
049 |a COM6
050 4|a QA76.9.A25
060 4|a QA76.9.A25
072 7|a U|2 bicssc
072 7|a TBX|2 bicssc
072 7|a COM080000|2 bisacsh
072 7|a COM|x 083000|2 bisacsh
08204|a 005.8/2|2 23
1001 |a Dooley, John,|d 1952-|0 http://id.loc.gov/authorities/names/no2011146703|e author.
24512|a A brief history of cryptology and cryptographic algorithms /|c John F. Dooley.
264 1|a Cham :|b Springer,|c 2013.
300 |a 1 online resource (xii, 99 pages) :|b illustrations.
336 |a text|b txt|2 rdacontent.
337 |a computer|b c|2 rdamedia.
338 |a online resource|b cr|2 rdacarrier.
4901 |a SpringerBriefs in computer science,|x 2191-5768.
50500|t Introduction: A Revolutionary Cipher --|t Cryptology Before 1500: A Bit of Magic --|t Black Chambers: 1500-1776 --|t Crypto Goes to War: 1861-1865 --|t Crypto and the War to End All Wars: 1914-1918 --|t Interwar Period 1919-1939 --|t Coming of the Machines.
504 |a Includes bibliographical references and index.
5880 |a Online resource; title from PDF title page (SpringerLink, viewed October 1, 2013).
520 |a The science of cryptology is made up of two halves. Cryptography is the study of how to create secure systems for communications. Cryptanalysis is the study of how to break those systems. The conflict between these two halves of cryptology is the story of secret writing. For over two thousand years governments, armies, and now individuals have wanted to protect their messages from the "enemy". This desire to communicate securely and secretly has resulted in the creation of numerous and increasingly complicated systems to protect one's messages. On the other hand, for every new system to protect messages there is a cryptanalyst creating a new technique to break that system. With the advent of computers the cryptographer seems to finally have the upper hand. New mathematically based cryptographic algorithms that use computers for encryption and decryption are so secure that brute-force techniques seem to be the only way to break them so far. This work traces the history of the conflict between cryptographer and cryptanalyst, explores in some depth the algorithms created to protect messages, and suggests where the field is going in the future.
650 0|a Data encryption (Computer science)|0 http://id.loc.gov/authorities/subjects/sh94001524|x History.|0 http://id.loc.gov/authorities/subjects/sh99005024.
650 0|a Cryptography|0 http://id.loc.gov/authorities/subjects/sh85034453|x History.|0 http://id.loc.gov/authorities/subjects/sh99005024.
650 2|a Information Systems|x history.|0 https://id.nlm.nih.gov/mesh/D007256Q000266.
65010|a Computer science.|0 http://id.loc.gov/authorities/subjects/sh89003285.
63000|a History of computing.|0 http://id.loc.gov/authorities/names/n90634416.
65024|a Data Structures, Cryptology and Information Theory.
60010|a Spangenburg, Ray,|d 1939-|t History of science.|0 http://id.loc.gov/authorities/names/n2003013919.
650 7|a COMPUTERS|x Security|x Cryptography.|2 bisacsh.
650 7|a Cryptography.|2 fast|0 (OCoLC)fst00884552.
650 7|a Data encryption (Computer science)|2 fast|0 (OCoLC)fst00887935.
655 7|a History.|2 fast|0 (OCoLC)fst01411628.
655 7|a Ebook.|2 local.
7102 |a SpringerLink (Online service)|0 http://id.loc.gov/authorities/names/no2005046756.
77608|i Print version:|a Dooley, John F.|t A Brief History of Cryptology and Cryptographic Algorithms.|d Dordrecht : Springer, ©2013|z 9783319016276.
830 0|a SpringerBriefs in computer science.|0 http://id.loc.gov/authorities/names/no2011109396|x 2191-5768.
907 |a .b41144922|b multi|c -|d 131206|e 190102
998 |a as|a cue|a cu|b 161129|c m|d z |e -|f eng|g sz |h 2|i 3
948 |a MARCIVE Comp, Dec. 10, 2018
948 |a MARCIVE Comp, May 22, 2018
948 |a MARCIVE August, 2017
948 |a MARCIVE extract Aug 5, 2017
994 |a 92|b COM
995 |a Loaded with m2btab.ltiac in 2018.12
995 |a Loaded with m2btab.ltiac in 2018.06
995 |a Loaded with m2btab.ltiac in 2017.08
995 |a Loaded with m2btab.elec in 2016
995 |a Loaded with m2btab.elec in 2016
995 |a OCLC offline update by CMU
989 |a QA76.9.A25 D66 2013|d as |b 1010002124414|e  - - |f  - - |g - |h 0|i 0|j 18|k 140627|l $0.00|m  |n  - - |o -|p 0|q 0|t 0|x 0|1 .i84533493
989 |d cueme|e  - - |f  - - |g j |h 0|i 0|j 188|k 161129|l $0.00|m  |n  - - |o -|p 0|q 0|t 0|x 0|w SpringerLink|1 .i107511733|u http://ezproxy.coloradomesa.edu/login?url=http://link.springer.com/10.1007/978-3-319-01628-3|3 SpringerLink|z Click here for access