The Mathematics of Secrets: Cryptography from Caesar Ciphers to Digital Encryption
The Mathematics of Secrets takes readers on a fascinating tour of the mathematics behind cryptography--the science of sending secret messages. Most books about cryptography are organized historically, or around how codes and ciphers have been used, such as in government and military intelligence or...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | |
container_start_page | |
container_title | |
container_volume | |
creator | Holden, Joshua |
description | The Mathematics of Secrets takes readers on a fascinating tour of the mathematics behind cryptography--the science of sending secret messages. Most books about cryptography are organized historically, or around how codes and ciphers have been used, such as in government and military intelligence or bank transactions. Joshua Holden instead shows how mathematical principles underpin the ways that different codes and ciphers operate. Holden focuses on both code making and code breaking and he discusses the majority of ancient and modern ciphers currently known. Holden begins by looking at substitution ciphers, built by substituting one letter or block of letters for another. Explaining one of the simplest and historically well-known ciphers, the Caesar cipher, Holden establishes the key mathematical idea behind the cipher and discusses how to introduce flexibility and additional notation. Holden goes on to explore polyalphabetic substitution ciphers, transposition ciphers, including one developed by the Spartans, connections between ciphers and computer encryption, stream ciphers, and ciphers involving exponentiation. He also examines public-key ciphers, where the methods used to encrypt messages are public knowledge, and yet, intended recipients are still the only ones who are able to read the message. He concludes with a look at the future of ciphers and where cryptography might be headed. Only basic mathematics up to high school algebra is needed to understand and enjoy the book. With a plethora of historical anecdotes and real-world examples, The Mathematics of Secrets reveals the mathematics working stealthily in the science of coded messages. |
doi_str_mv | 10.1515/9780691184555 |
format | Book |
fullrecord | <record><control><sourceid>jstor_askew</sourceid><recordid>TN_cdi_askewsholts_vlebooks_9780691184555</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><jstor_id>j.ctvc775xv</jstor_id><sourcerecordid>j.ctvc775xv</sourcerecordid><originalsourceid>FETCH-LOGICAL-a44109-1eeb56a2d728e2347f0523aec5c2cf8e8ea94ef78f513951de744c4d5463d8003</originalsourceid><addsrcrecordid>eNqNkctLAzEQxiOi-OrRi4IUL-Khmtck2aMWX6BYsHoNaTrb3bpt6mat-t-7usV609PM8P2Ybx6E7DJ6woDBaaINVQljRgLACtn6Kejq72KdbCaac5NQyjdIK8YxrTMpjFJqk-z1M2zfuSrDiatyH9shbT-gL7GKO2QtdUXE1iJuk6fLi373unN7f3XTPbvtOCkZTToMcQDK8aHmBrmQOqXAhUMPnvvUoEGXSEy1SYGJBNgQtZReDkEqMTSUim1y3DR28RnfYhaKKtp5gYMQnqOt12SSUmNAcfU3uzxJzR417KwML68YK_uNeZxWpSvsxXm3Pg_lSv6DlDrR4tt_f0FiWeAo2MZYC6HB1OpBo45jFcqFNra-mnut4X2-NMpHs9dBkccsn47srMwnrvywvcfeef0cUPprpMOG9C66Ip_mdhKmYVS6WRYtgJISqPgEvjaWNA</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>book</recordtype><pqid>EBC4797326</pqid></control><display><type>book</type><title>The Mathematics of Secrets: Cryptography from Caesar Ciphers to Digital Encryption</title><source>De Gruyter eBooks</source><creator>Holden, Joshua</creator><creatorcontrib>Holden, Joshua</creatorcontrib><description>The Mathematics of Secrets takes readers on a fascinating tour of the mathematics behind cryptography--the science of sending secret messages. Most books about cryptography are organized historically, or around how codes and ciphers have been used, such as in government and military intelligence or bank transactions. Joshua Holden instead shows how mathematical principles underpin the ways that different codes and ciphers operate. Holden focuses on both code making and code breaking and he discusses the majority of ancient and modern ciphers currently known. Holden begins by looking at substitution ciphers, built by substituting one letter or block of letters for another. Explaining one of the simplest and historically well-known ciphers, the Caesar cipher, Holden establishes the key mathematical idea behind the cipher and discusses how to introduce flexibility and additional notation. Holden goes on to explore polyalphabetic substitution ciphers, transposition ciphers, including one developed by the Spartans, connections between ciphers and computer encryption, stream ciphers, and ciphers involving exponentiation. He also examines public-key ciphers, where the methods used to encrypt messages are public knowledge, and yet, intended recipients are still the only ones who are able to read the message. He concludes with a look at the future of ciphers and where cryptography might be headed. Only basic mathematics up to high school algebra is needed to understand and enjoy the book. With a plethora of historical anecdotes and real-world examples, The Mathematics of Secrets reveals the mathematics working stealthily in the science of coded messages.</description><edition>NED - New edition</edition><identifier>ISBN: 0691184550</identifier><identifier>ISBN: 9780691184555</identifier><identifier>ISBN: 9780691141756</identifier><identifier>ISBN: 1400885620</identifier><identifier>ISBN: 0691141754</identifier><identifier>ISBN: 9781400885626</identifier><identifier>ISBN: 0691183317</identifier><identifier>ISBN: 9780691183312</identifier><identifier>EISBN: 0691184550</identifier><identifier>EISBN: 9780691184555</identifier><identifier>EISBN: 1400885620</identifier><identifier>EISBN: 9781400885626</identifier><identifier>DOI: 10.1515/9780691184555</identifier><identifier>OCLC: 972289002</identifier><identifier>OCLC: 1050718744</identifier><identifier>LCCallNum: Z103</identifier><language>eng</language><publisher>Princeton: Princeton University Press</publisher><subject>Ciphers ; Computer programming, programs, data ; Computer security ; COMPUTERS ; Cryptography ; Cryptography -- Mathematics ; Mathematics ; Technology</subject><creationdate>2018</creationdate><tpages>391</tpages><format>391</format><rights>2017 Princeton University Press</rights><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Uhttp://portal.igpublish.com/iglibrary/amazonbuffer/PUPB0005674_null_0_320.png</thumbnail><link.rule.ids>306,776,780,782,24759,27902</link.rule.ids></links><search><creatorcontrib>Holden, Joshua</creatorcontrib><title>The Mathematics of Secrets: Cryptography from Caesar Ciphers to Digital Encryption</title><description>The Mathematics of Secrets takes readers on a fascinating tour of the mathematics behind cryptography--the science of sending secret messages. Most books about cryptography are organized historically, or around how codes and ciphers have been used, such as in government and military intelligence or bank transactions. Joshua Holden instead shows how mathematical principles underpin the ways that different codes and ciphers operate. Holden focuses on both code making and code breaking and he discusses the majority of ancient and modern ciphers currently known. Holden begins by looking at substitution ciphers, built by substituting one letter or block of letters for another. Explaining one of the simplest and historically well-known ciphers, the Caesar cipher, Holden establishes the key mathematical idea behind the cipher and discusses how to introduce flexibility and additional notation. Holden goes on to explore polyalphabetic substitution ciphers, transposition ciphers, including one developed by the Spartans, connections between ciphers and computer encryption, stream ciphers, and ciphers involving exponentiation. He also examines public-key ciphers, where the methods used to encrypt messages are public knowledge, and yet, intended recipients are still the only ones who are able to read the message. He concludes with a look at the future of ciphers and where cryptography might be headed. Only basic mathematics up to high school algebra is needed to understand and enjoy the book. With a plethora of historical anecdotes and real-world examples, The Mathematics of Secrets reveals the mathematics working stealthily in the science of coded messages.</description><subject>Ciphers</subject><subject>Computer programming, programs, data</subject><subject>Computer security</subject><subject>COMPUTERS</subject><subject>Cryptography</subject><subject>Cryptography -- Mathematics</subject><subject>Mathematics</subject><subject>Technology</subject><isbn>0691184550</isbn><isbn>9780691184555</isbn><isbn>9780691141756</isbn><isbn>1400885620</isbn><isbn>0691141754</isbn><isbn>9781400885626</isbn><isbn>0691183317</isbn><isbn>9780691183312</isbn><isbn>0691184550</isbn><isbn>9780691184555</isbn><isbn>1400885620</isbn><isbn>9781400885626</isbn><fulltext>true</fulltext><rsrctype>book</rsrctype><creationdate>2018</creationdate><recordtype>book</recordtype><sourceid>I4C</sourceid><recordid>eNqNkctLAzEQxiOi-OrRi4IUL-Khmtck2aMWX6BYsHoNaTrb3bpt6mat-t-7usV609PM8P2Ybx6E7DJ6woDBaaINVQljRgLACtn6Kejq72KdbCaac5NQyjdIK8YxrTMpjFJqk-z1M2zfuSrDiatyH9shbT-gL7GKO2QtdUXE1iJuk6fLi373unN7f3XTPbvtOCkZTToMcQDK8aHmBrmQOqXAhUMPnvvUoEGXSEy1SYGJBNgQtZReDkEqMTSUim1y3DR28RnfYhaKKtp5gYMQnqOt12SSUmNAcfU3uzxJzR417KwML68YK_uNeZxWpSvsxXm3Pg_lSv6DlDrR4tt_f0FiWeAo2MZYC6HB1OpBo45jFcqFNra-mnut4X2-NMpHs9dBkccsn47srMwnrvywvcfeef0cUPprpMOG9C66Ip_mdhKmYVS6WRYtgJISqPgEvjaWNA</recordid><startdate>2018</startdate><enddate>2018</enddate><creator>Holden, Joshua</creator><general>Princeton University Press</general><scope>I4C</scope><scope>E06</scope><scope>YSPEL</scope></search><sort><creationdate>2018</creationdate><title>The Mathematics of Secrets</title><author>Holden, Joshua</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-a44109-1eeb56a2d728e2347f0523aec5c2cf8e8ea94ef78f513951de744c4d5463d8003</frbrgroupid><rsrctype>books</rsrctype><prefilter>books</prefilter><language>eng</language><creationdate>2018</creationdate><topic>Ciphers</topic><topic>Computer programming, programs, data</topic><topic>Computer security</topic><topic>COMPUTERS</topic><topic>Cryptography</topic><topic>Cryptography -- Mathematics</topic><topic>Mathematics</topic><topic>Technology</topic><toplevel>online_resources</toplevel><creatorcontrib>Holden, Joshua</creatorcontrib><collection>Casalini Torrossa eBook Single Purchase</collection><collection>Princeton University Press eBooks</collection><collection>Perlego</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Holden, Joshua</au><format>book</format><genre>book</genre><ristype>BOOK</ristype><btitle>The Mathematics of Secrets: Cryptography from Caesar Ciphers to Digital Encryption</btitle><date>2018</date><risdate>2018</risdate><isbn>0691184550</isbn><isbn>9780691184555</isbn><isbn>9780691141756</isbn><isbn>1400885620</isbn><isbn>0691141754</isbn><isbn>9781400885626</isbn><isbn>0691183317</isbn><isbn>9780691183312</isbn><eisbn>0691184550</eisbn><eisbn>9780691184555</eisbn><eisbn>1400885620</eisbn><eisbn>9781400885626</eisbn><abstract>The Mathematics of Secrets takes readers on a fascinating tour of the mathematics behind cryptography--the science of sending secret messages. Most books about cryptography are organized historically, or around how codes and ciphers have been used, such as in government and military intelligence or bank transactions. Joshua Holden instead shows how mathematical principles underpin the ways that different codes and ciphers operate. Holden focuses on both code making and code breaking and he discusses the majority of ancient and modern ciphers currently known. Holden begins by looking at substitution ciphers, built by substituting one letter or block of letters for another. Explaining one of the simplest and historically well-known ciphers, the Caesar cipher, Holden establishes the key mathematical idea behind the cipher and discusses how to introduce flexibility and additional notation. Holden goes on to explore polyalphabetic substitution ciphers, transposition ciphers, including one developed by the Spartans, connections between ciphers and computer encryption, stream ciphers, and ciphers involving exponentiation. He also examines public-key ciphers, where the methods used to encrypt messages are public knowledge, and yet, intended recipients are still the only ones who are able to read the message. He concludes with a look at the future of ciphers and where cryptography might be headed. Only basic mathematics up to high school algebra is needed to understand and enjoy the book. With a plethora of historical anecdotes and real-world examples, The Mathematics of Secrets reveals the mathematics working stealthily in the science of coded messages.</abstract><cop>Princeton</cop><pub>Princeton University Press</pub><doi>10.1515/9780691184555</doi><oclcid>972289002</oclcid><oclcid>1050718744</oclcid><tpages>391</tpages><edition>NED - New edition</edition></addata></record> |
fulltext | fulltext |
identifier | ISBN: 0691184550 |
ispartof | |
issn | |
language | eng |
recordid | cdi_askewsholts_vlebooks_9780691184555 |
source | De Gruyter eBooks |
subjects | Ciphers Computer programming, programs, data Computer security COMPUTERS Cryptography Cryptography -- Mathematics Mathematics Technology |
title | The Mathematics of Secrets: Cryptography from Caesar Ciphers to Digital Encryption |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-13T15%3A16%3A55IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-jstor_askew&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=book&rft.btitle=The%20Mathematics%20of%20Secrets:%20Cryptography%20from%20Caesar%20Ciphers%20to%20Digital%20Encryption&rft.au=Holden,%20Joshua&rft.date=2018&rft.isbn=0691184550&rft.isbn_list=9780691184555&rft.isbn_list=9780691141756&rft.isbn_list=1400885620&rft.isbn_list=0691141754&rft.isbn_list=9781400885626&rft_id=info:doi/10.1515/9780691184555&rft_dat=%3Cjstor_askew%3Ej.ctvc775xv%3C/jstor_askew%3E%3Curl%3E%3C/url%3E&rft.eisbn=0691184550&rft.eisbn_list=9780691184555&rft.eisbn_list=1400885620&rft.eisbn_list=9781400885626&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=EBC4797326&rft_id=info:pmid/&rft_jstor_id=j.ctvc775xv&rfr_iscdi=true |