Traite de Cryptographie
Author: André Lange
Publisher:
Published: 1981
Total Pages: 194
ISBN-13:
DOWNLOAD EBOOKRead and Download eBook Full
Author: André Lange
Publisher:
Published: 1981
Total Pages: 194
ISBN-13:
DOWNLOAD EBOOKAuthor: Martine Diepenbroek
Publisher: Bloomsbury Publishing
Published: 2023-11-16
Total Pages: 265
ISBN-13: 135028128X
DOWNLOAD EBOOKThis book offers a comprehensive review and reassessment of the classical sources describing the cryptographic Spartan device known as the scytale. Challenging the view promoted by modern historians of cryptography which look at the scytale as a simple and impractical 'stick', Diepenbroek argues for the scytale's deserved status as a vehicle for secret communication in the ancient world. By way of comparison, Diepenbroek demonstrates that the cryptographic principles employed in the Spartan scytale show an encryption and coding system that is no less complex than some 20th-century transposition ciphers. The result is that, contrary to the accepted point of view, scytale encryption is as complex and secure as other known ancient ciphers. Drawing on salient comparisons with a selection of modern transposition ciphers (and their historical predecessors), the reader is provided with a detailed overview and analysis of the surviving classical sources that similarly reveal the potential of the scytale as an actual cryptographic and steganographic tool in ancient Sparta in order to illustrate the relative sophistication of the Spartan scytale as a practical device for secret communication. This helps to establish the conceptual basis that the scytale would, in theory, have offered its ancient users a secure method for secret communication over long distances.
Author: Laurence Dwight Smith
Publisher: Courier Corporation
Published: 1955
Total Pages: 180
ISBN-13: 9780486202471
DOWNLOAD EBOOKExplains transposition, substitution, and Baconian bilateral ciphers and presents more than one hundred and fifty problems.
Author: Alexander D'Agapeyeff
Publisher: Read Books Ltd
Published: 2016-08-26
Total Pages: 153
ISBN-13: 1473350913
DOWNLOAD EBOOKThis vintage book contains Alexander D’Agapeyeff’s famous 1939 work, Codes and Ciphers - A History of Cryptography. Cryptography is the employment of codes and ciphers to protect secrets, and it has a long and interesting history. This fantastic volume offers a detailed history of cryptography from ancient times to modernity, written by the Russian-born English cryptographer, Alexander D'Agapeyeff. The contents include: - The beginnings of Cryptography - From the Middle Ages Onwards - Signals, Signs, and Secret Languages - Commercial Codes - Military Codes and Ciphers - Types of Codes and Ciphers - Methods of Deciphering Many antiquarian texts such as this, especially those dating back to the 1900s and before, are increasingly hard to come by and expensive, and it is with this in mind that we are republishing this book now in an affordable, modern, high quality edition. It comes complete with a specially commissioned new biography of the author.
Author: R.M. Sheldon
Publisher: McFarland
Published: 2015-09-03
Total Pages: 245
ISBN-13: 1476610991
DOWNLOAD EBOOKIntelligence activities have always been an integral part of statecraft. Ancient governments, like modern ones, realized that to keep their borders safe, control their populations, and keep abreast of political developments abroad, they needed a means to collect the intelligence which enabled them to make informed decisions. Today we are well aware of the damage spies can do. Here, for the first time, is a comprehensive guide to the literature of ancient intelligence. The entries present books and periodical articles in English, French, German, Italian, Spanish, Polish, and Dutch--with annotations in English. These works address such subjects as intelligence collection and analysis (political and military), counterintelligence, espionage, cryptology (Greek and Latin), tradecraft, covert action, and similar topics (it does not include general battle studies and general discussions of foreign policy). Sections are devoted to general espionage, intelligence related to road building, communication, and tradecraft, intelligence in Greece, during the reign of Alexander the Great and in the Hellenistic Age, in the Roman republic, the Roman empire, the Byzantine empire, the Muslim world, and in Russia, China, India, and Africa. The books can be located in libraries in the United States; in cases where volumes are in one library only, the author indicates where they may be found.
Author: Walter William Rouse Ball
Publisher: Courier Corporation
Published: 1987-01-01
Total Pages: 468
ISBN-13: 0486253570
DOWNLOAD EBOOKThis classic work offers scores of stimulating, mind-expanding games and puzzles: arithmetical and geometrical problems, chessboard recreations, magic squares, map-coloring problems, cryptography and cryptanalysis, much more. "A must to add to your mathematics library" ? The Mathematics Teacher. Index. References for Further Study. Includes 150 black-and-white line illustrations.
Author:
Publisher: American Philosophical Society
Published:
Total Pages: 984
ISBN-13: 9781422372241
DOWNLOAD EBOOKAuthor: Ludovic Portes
Publisher:
Published: 1886
Total Pages: 728
ISBN-13:
DOWNLOAD EBOOKAuthor: Katherine Ellison
Publisher: Routledge
Published: 2017-09-14
Total Pages: 286
ISBN-13: 1351973088
DOWNLOAD EBOOKThe first cultural history of early modern cryptography, this collection brings together scholars in history, literature, music, the arts, mathematics, and computer science who study ciphering and deciphering from new materialist, media studies, cognitive studies, disability studies, and other theoretical perspectives. Essays analyze the material forms of ciphering as windows into the cultures of orality, manuscript, print, and publishing, revealing that early modern ciphering, and the complex history that preceded it in the medieval period, not only influenced political and military history but also played a central role in the emergence of the capitalist media state in the West, in religious reformation, and in the scientific revolution. Ciphered communication, whether in etched stone and bone, in musical notae, runic symbols, polyalphabetic substitution, algebraic equations, graphic typographies, or literary metaphors, took place in contested social spaces and offered a means of expression during times of political, economic, and personal upheaval. Ciphering shaped the early history of linguistics as a discipline, and it bridged theological and scientific rhetoric before and during the Reformation. Ciphering was an occult art, a mathematic language, and an aesthetic that influenced music, sculpture, painting, drama, poetry, and the early novel. This collection addresses gaps in cryptographic history, but more significantly, through cultural analyses of the rhetorical situations of ciphering and actual solved and unsolved medieval and early modern ciphers, it traces the influences of cryptographic writing and reading on literacy broadly defined as well as the cultures that generate, resist, and require that literacy. This volume offers a significant contribution to the history of the book, highlighting the broader cultural significance of textual materialities.
Author: Frank Rubin
Publisher: Simon and Schuster
Published: 2022-08-30
Total Pages: 342
ISBN-13: 1633439798
DOWNLOAD EBOOKExplore the fascinating and rich world of Secret Key cryptography! This book provides practical methods for encrypting messages, an interesting and entertaining historical perspective, and an incredible collection of ciphers and codes—including 30 unbreakable methods. In Secret Key Cryptography: Ciphers, from simple to unbreakable you will: Measure the strength of your ciphers and learn how to guarantee their security Construct and incorporate data-compression codes Generate true random numbers in bulk Construct huge primes and safe primes Add an undetectable backdoor to a cipher Defeat hypothetical ultracomputers that could be developed decades from now Construct 30 unbreakable ciphers Secret Key Cryptography gives you a toolbox of cryptographic techniques and Secret Key methods. The book’s simple, non-technical language is easy to understand and accessible for any reader, even without the advanced mathematics normally required for cryptography. You’ll learn how to create and solve ciphers, as well as how to measure their strength. As you go, you’ll explore both historic ciphers and groundbreaking new approaches—including a never-before-seen way to implement the uncrackable One-Time Pad algorithm. Whoever you are, this book is for you! History buffs will love seeing the evolution of sophisticated cryptographic methods, hobbyists will get a gentle introduction to cryptography, and engineers and computer scientists will learn the principles of constructing secure ciphers. Even professional cryptographers will find a range of new methods and concepts never published before. Purchase of the print book includes a free eBook in PDF, Kindle, and ePub formats from Manning Publications. About the technology From the Roman empire’s Caesar cipher to the WWII Enigma machine, secret messages have influenced the course of history. Today, Secret Key cryptography is the backbone of all modern computing infrastructure. Properly designed, these algorithms are efficient and practical. Some are actually unbreakable, even using supercomputers or quantum technology! About the book Secret Key Cryptography teaches you how to create Secret Key ciphers, ranging from simple pen-and-paper methods to advanced techniques used in modern computer-based cryptography. It reveals both historic examples and current innovations. You’ll learn how to efficiently encrypt large files with fast stream ciphers, discover alternatives to AES encryption, and avoid strong-looking but weak ciphers. Simple language and fun-to-solve mini-ciphers make learning serious concepts easy and engaging. What's inside Construct 30 unbreakable ciphers Measure the strength of your ciphers and guarantee their security Add an undetectable backdoor to a cipher Defeat hypothetical ultracomputers of the future About the reader For professional engineers, computer scientists, and cryptography hobbyists. No advanced math knowledge is required. About the author Frank Rubin has been doing cryptography for over 50 years. He holds an MS in Mathematics, and a PhD in Computer Science. Table of Contents 1 Introduction 2 What is cryptography? 3 Preliminary concepts 4 Cryptographer’s toolbox 5 Substitution ciphers 6 Countermeasures 7 Transposition 8 Jefferson Wheel Cypher 9 Fractionation 10 Variable-length fractionation 11 Block ciphers 12 Principles for secure encryption 13 Stream ciphers 14 One-time pad 15 Matrix methods 16 Three pass protocol 17 Codes 18 Quantum computers