The Mathematics of Secrets: Cryptography from Caesar Ciphers to Digital Encryption

The Mathematics of Secrets takes readers on a fascinating tour of the mathematics behind cryptography--the science of sending secret messages. Most books about cryptography are organized historically, or around how codes and ciphers have been used, such as in government and military intelligence or...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
1. Verfasser: Holden, Joshua
Format: Buch
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator Holden, Joshua
description The Mathematics of Secrets takes readers on a fascinating tour of the mathematics behind cryptography--the science of sending secret messages. Most books about cryptography are organized historically, or around how codes and ciphers have been used, such as in government and military intelligence or bank transactions. Joshua Holden instead shows how mathematical principles underpin the ways that different codes and ciphers operate. Holden focuses on both code making and code breaking and he discusses the majority of ancient and modern ciphers currently known. Holden begins by looking at substitution ciphers, built by substituting one letter or block of letters for another. Explaining one of the simplest and historically well-known ciphers, the Caesar cipher, Holden establishes the key mathematical idea behind the cipher and discusses how to introduce flexibility and additional notation. Holden goes on to explore polyalphabetic substitution ciphers, transposition ciphers, including one developed by the Spartans, connections between ciphers and computer encryption, stream ciphers, and ciphers involving exponentiation. He also examines public-key ciphers, where the methods used to encrypt messages are public knowledge, and yet, intended recipients are still the only ones who are able to read the message. He concludes with a look at the future of ciphers and where cryptography might be headed. Only basic mathematics up to high school algebra is needed to understand and enjoy the book. With a plethora of historical anecdotes and real-world examples, The Mathematics of Secrets reveals the mathematics working stealthily in the science of coded messages.
doi_str_mv 10.1515/9780691184555
format Book
fullrecord <record><control><sourceid>jstor_askew</sourceid><recordid>TN_cdi_askewsholts_vlebooks_9780691184555</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><jstor_id>j.ctvc775xv</jstor_id><sourcerecordid>j.ctvc775xv</sourcerecordid><originalsourceid>FETCH-LOGICAL-a44109-1eeb56a2d728e2347f0523aec5c2cf8e8ea94ef78f513951de744c4d5463d8003</originalsourceid><addsrcrecordid>eNqNkctLAzEQxiOi-OrRi4IUL-Khmtck2aMWX6BYsHoNaTrb3bpt6mat-t-7usV609PM8P2Ybx6E7DJ6woDBaaINVQljRgLACtn6Kejq72KdbCaac5NQyjdIK8YxrTMpjFJqk-z1M2zfuSrDiatyH9shbT-gL7GKO2QtdUXE1iJuk6fLi373unN7f3XTPbvtOCkZTToMcQDK8aHmBrmQOqXAhUMPnvvUoEGXSEy1SYGJBNgQtZReDkEqMTSUim1y3DR28RnfYhaKKtp5gYMQnqOt12SSUmNAcfU3uzxJzR417KwML68YK_uNeZxWpSvsxXm3Pg_lSv6DlDrR4tt_f0FiWeAo2MZYC6HB1OpBo45jFcqFNra-mnut4X2-NMpHs9dBkccsn47srMwnrvywvcfeef0cUPprpMOG9C66Ip_mdhKmYVS6WRYtgJISqPgEvjaWNA</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>book</recordtype><pqid>EBC4797326</pqid></control><display><type>book</type><title>The Mathematics of Secrets: Cryptography from Caesar Ciphers to Digital Encryption</title><source>De Gruyter eBooks</source><creator>Holden, Joshua</creator><creatorcontrib>Holden, Joshua</creatorcontrib><description>The Mathematics of Secrets takes readers on a fascinating tour of the mathematics behind cryptography--the science of sending secret messages. Most books about cryptography are organized historically, or around how codes and ciphers have been used, such as in government and military intelligence or bank transactions. Joshua Holden instead shows how mathematical principles underpin the ways that different codes and ciphers operate. Holden focuses on both code making and code breaking and he discusses the majority of ancient and modern ciphers currently known. Holden begins by looking at substitution ciphers, built by substituting one letter or block of letters for another. Explaining one of the simplest and historically well-known ciphers, the Caesar cipher, Holden establishes the key mathematical idea behind the cipher and discusses how to introduce flexibility and additional notation. Holden goes on to explore polyalphabetic substitution ciphers, transposition ciphers, including one developed by the Spartans, connections between ciphers and computer encryption, stream ciphers, and ciphers involving exponentiation. He also examines public-key ciphers, where the methods used to encrypt messages are public knowledge, and yet, intended recipients are still the only ones who are able to read the message. He concludes with a look at the future of ciphers and where cryptography might be headed. Only basic mathematics up to high school algebra is needed to understand and enjoy the book. With a plethora of historical anecdotes and real-world examples, The Mathematics of Secrets reveals the mathematics working stealthily in the science of coded messages.</description><edition>NED - New edition</edition><identifier>ISBN: 0691184550</identifier><identifier>ISBN: 9780691184555</identifier><identifier>ISBN: 9780691141756</identifier><identifier>ISBN: 1400885620</identifier><identifier>ISBN: 0691141754</identifier><identifier>ISBN: 9781400885626</identifier><identifier>ISBN: 0691183317</identifier><identifier>ISBN: 9780691183312</identifier><identifier>EISBN: 0691184550</identifier><identifier>EISBN: 9780691184555</identifier><identifier>EISBN: 1400885620</identifier><identifier>EISBN: 9781400885626</identifier><identifier>DOI: 10.1515/9780691184555</identifier><identifier>OCLC: 972289002</identifier><identifier>OCLC: 1050718744</identifier><identifier>LCCallNum: Z103</identifier><language>eng</language><publisher>Princeton: Princeton University Press</publisher><subject>Ciphers ; Computer programming, programs, data ; Computer security ; COMPUTERS ; Cryptography ; Cryptography -- Mathematics ; Mathematics ; Technology</subject><creationdate>2018</creationdate><tpages>391</tpages><format>391</format><rights>2017 Princeton University Press</rights><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Uhttp://portal.igpublish.com/iglibrary/amazonbuffer/PUPB0005674_null_0_320.png</thumbnail><link.rule.ids>306,776,780,782,24759,27902</link.rule.ids></links><search><creatorcontrib>Holden, Joshua</creatorcontrib><title>The Mathematics of Secrets: Cryptography from Caesar Ciphers to Digital Encryption</title><description>The Mathematics of Secrets takes readers on a fascinating tour of the mathematics behind cryptography--the science of sending secret messages. Most books about cryptography are organized historically, or around how codes and ciphers have been used, such as in government and military intelligence or bank transactions. Joshua Holden instead shows how mathematical principles underpin the ways that different codes and ciphers operate. Holden focuses on both code making and code breaking and he discusses the majority of ancient and modern ciphers currently known. Holden begins by looking at substitution ciphers, built by substituting one letter or block of letters for another. Explaining one of the simplest and historically well-known ciphers, the Caesar cipher, Holden establishes the key mathematical idea behind the cipher and discusses how to introduce flexibility and additional notation. Holden goes on to explore polyalphabetic substitution ciphers, transposition ciphers, including one developed by the Spartans, connections between ciphers and computer encryption, stream ciphers, and ciphers involving exponentiation. He also examines public-key ciphers, where the methods used to encrypt messages are public knowledge, and yet, intended recipients are still the only ones who are able to read the message. He concludes with a look at the future of ciphers and where cryptography might be headed. Only basic mathematics up to high school algebra is needed to understand and enjoy the book. With a plethora of historical anecdotes and real-world examples, The Mathematics of Secrets reveals the mathematics working stealthily in the science of coded messages.</description><subject>Ciphers</subject><subject>Computer programming, programs, data</subject><subject>Computer security</subject><subject>COMPUTERS</subject><subject>Cryptography</subject><subject>Cryptography -- Mathematics</subject><subject>Mathematics</subject><subject>Technology</subject><isbn>0691184550</isbn><isbn>9780691184555</isbn><isbn>9780691141756</isbn><isbn>1400885620</isbn><isbn>0691141754</isbn><isbn>9781400885626</isbn><isbn>0691183317</isbn><isbn>9780691183312</isbn><isbn>0691184550</isbn><isbn>9780691184555</isbn><isbn>1400885620</isbn><isbn>9781400885626</isbn><fulltext>true</fulltext><rsrctype>book</rsrctype><creationdate>2018</creationdate><recordtype>book</recordtype><sourceid>I4C</sourceid><recordid>eNqNkctLAzEQxiOi-OrRi4IUL-Khmtck2aMWX6BYsHoNaTrb3bpt6mat-t-7usV609PM8P2Ybx6E7DJ6woDBaaINVQljRgLACtn6Kejq72KdbCaac5NQyjdIK8YxrTMpjFJqk-z1M2zfuSrDiatyH9shbT-gL7GKO2QtdUXE1iJuk6fLi373unN7f3XTPbvtOCkZTToMcQDK8aHmBrmQOqXAhUMPnvvUoEGXSEy1SYGJBNgQtZReDkEqMTSUim1y3DR28RnfYhaKKtp5gYMQnqOt12SSUmNAcfU3uzxJzR417KwML68YK_uNeZxWpSvsxXm3Pg_lSv6DlDrR4tt_f0FiWeAo2MZYC6HB1OpBo45jFcqFNra-mnut4X2-NMpHs9dBkccsn47srMwnrvywvcfeef0cUPprpMOG9C66Ip_mdhKmYVS6WRYtgJISqPgEvjaWNA</recordid><startdate>2018</startdate><enddate>2018</enddate><creator>Holden, Joshua</creator><general>Princeton University Press</general><scope>I4C</scope><scope>E06</scope><scope>YSPEL</scope></search><sort><creationdate>2018</creationdate><title>The Mathematics of Secrets</title><author>Holden, Joshua</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-a44109-1eeb56a2d728e2347f0523aec5c2cf8e8ea94ef78f513951de744c4d5463d8003</frbrgroupid><rsrctype>books</rsrctype><prefilter>books</prefilter><language>eng</language><creationdate>2018</creationdate><topic>Ciphers</topic><topic>Computer programming, programs, data</topic><topic>Computer security</topic><topic>COMPUTERS</topic><topic>Cryptography</topic><topic>Cryptography -- Mathematics</topic><topic>Mathematics</topic><topic>Technology</topic><toplevel>online_resources</toplevel><creatorcontrib>Holden, Joshua</creatorcontrib><collection>Casalini Torrossa eBook Single Purchase</collection><collection>Princeton University Press eBooks</collection><collection>Perlego</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Holden, Joshua</au><format>book</format><genre>book</genre><ristype>BOOK</ristype><btitle>The Mathematics of Secrets: Cryptography from Caesar Ciphers to Digital Encryption</btitle><date>2018</date><risdate>2018</risdate><isbn>0691184550</isbn><isbn>9780691184555</isbn><isbn>9780691141756</isbn><isbn>1400885620</isbn><isbn>0691141754</isbn><isbn>9781400885626</isbn><isbn>0691183317</isbn><isbn>9780691183312</isbn><eisbn>0691184550</eisbn><eisbn>9780691184555</eisbn><eisbn>1400885620</eisbn><eisbn>9781400885626</eisbn><abstract>The Mathematics of Secrets takes readers on a fascinating tour of the mathematics behind cryptography--the science of sending secret messages. Most books about cryptography are organized historically, or around how codes and ciphers have been used, such as in government and military intelligence or bank transactions. Joshua Holden instead shows how mathematical principles underpin the ways that different codes and ciphers operate. Holden focuses on both code making and code breaking and he discusses the majority of ancient and modern ciphers currently known. Holden begins by looking at substitution ciphers, built by substituting one letter or block of letters for another. Explaining one of the simplest and historically well-known ciphers, the Caesar cipher, Holden establishes the key mathematical idea behind the cipher and discusses how to introduce flexibility and additional notation. Holden goes on to explore polyalphabetic substitution ciphers, transposition ciphers, including one developed by the Spartans, connections between ciphers and computer encryption, stream ciphers, and ciphers involving exponentiation. He also examines public-key ciphers, where the methods used to encrypt messages are public knowledge, and yet, intended recipients are still the only ones who are able to read the message. He concludes with a look at the future of ciphers and where cryptography might be headed. Only basic mathematics up to high school algebra is needed to understand and enjoy the book. With a plethora of historical anecdotes and real-world examples, The Mathematics of Secrets reveals the mathematics working stealthily in the science of coded messages.</abstract><cop>Princeton</cop><pub>Princeton University Press</pub><doi>10.1515/9780691184555</doi><oclcid>972289002</oclcid><oclcid>1050718744</oclcid><tpages>391</tpages><edition>NED - New edition</edition></addata></record>
fulltext fulltext
identifier ISBN: 0691184550
ispartof
issn
language eng
recordid cdi_askewsholts_vlebooks_9780691184555
source De Gruyter eBooks
subjects Ciphers
Computer programming, programs, data
Computer security
COMPUTERS
Cryptography
Cryptography -- Mathematics
Mathematics
Technology
title The Mathematics of Secrets: Cryptography from Caesar Ciphers to Digital Encryption
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-13T15%3A16%3A55IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-jstor_askew&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=book&rft.btitle=The%20Mathematics%20of%20Secrets:%20Cryptography%20from%20Caesar%20Ciphers%20to%20Digital%20Encryption&rft.au=Holden,%20Joshua&rft.date=2018&rft.isbn=0691184550&rft.isbn_list=9780691184555&rft.isbn_list=9780691141756&rft.isbn_list=1400885620&rft.isbn_list=0691141754&rft.isbn_list=9781400885626&rft_id=info:doi/10.1515/9780691184555&rft_dat=%3Cjstor_askew%3Ej.ctvc775xv%3C/jstor_askew%3E%3Curl%3E%3C/url%3E&rft.eisbn=0691184550&rft.eisbn_list=9780691184555&rft.eisbn_list=1400885620&rft.eisbn_list=9781400885626&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=EBC4797326&rft_id=info:pmid/&rft_jstor_id=j.ctvc775xv&rfr_iscdi=true