LEADER 03245nam 22006612 450 001 9910450288903321 005 20151005020622.0 010 $a1-107-12517-0 010 $a1-283-33148-9 010 $a9786613331489 010 $a1-139-13407-8 010 $a1-139-13037-4 010 $a0-511-04218-3 010 $a0-511-15561-1 010 $a0-511-54297-6 010 $a0-511-04504-2 035 $a(CKB)1000000000001500 035 $a(EBL)202096 035 $a(OCoLC)437063379 035 $a(SSID)ssj0000124210 035 $a(PQKBManifestationID)11135914 035 $a(PQKBTitleCode)TC0000124210 035 $a(PQKBWorkID)10015360 035 $a(PQKB)10490637 035 $a(UkCbUP)CR9780511542978 035 $a(MiAaPQ)EBC202096 035 $a(Au-PeEL)EBL202096 035 $a(CaPaEBR)ebr10001842 035 $a(CaONFJC)MIL333148 035 $a(EXLCZ)991000000000001500 100 $a20090505d2002|||| uy| 0 101 0 $aeng 135 $aur||||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aCodes and ciphers $eJulius Caesar, the Enigma, and the internet /$fR.F. Churchhouse$b[electronic resource] 210 1$aCambridge :$cCambridge University Press,$d2002. 215 $a1 online resource (x, 240 pages) $cdigital, PDF file(s) 300 $aTitle from publisher's bibliographic system (viewed on 05 Oct 2015). 311 $a0-521-00890-5 311 $a0-521-81054-X 320 $aIncludes bibliographical references and indexes. 327 $g1.$tIntroduction --$g2.$tFrom Julius Caesar to simple substitution --$g3.$tPolyalphabetic systems --$g4.$tJigsaw ciphers --$g5.$tTwo-letter ciphers --$g6.$tCodes --$g7.$tCiphers for spies --$g8.$tProducing random numbers and letters --$g9.$tThe Enigma cipher machine --$g10.$tThe Hagelin cipher machine --$g11.$tBeyond the Enigma --$g12.$tPublic key cryptography --$g13.$tEncipherment and the internet. 330 $aThe design of code and cipher systems has undergone major changes in modern times. Powerful personal computers have resulted in an explosion of e-banking, e-commerce and e-mail, and as a consequence the encryption of communications to ensure security has become a matter of public interest and importance. This book describes and analyses many cipher systems ranging from the earliest and elementary to the more recent and sophisticated, such as RSA and DES, as well as wartime machines such as the ENIGMA and Hagelin, and ciphers used by spies. Security issues and possible methods of attack are discussed and illustrated by examples. The design of many systems involves advanced mathematical concepts and this is explained in detail in a major appendix. This book will appeal to anyone interested in codes and ciphers as used by private individuals, spies, governments and industry throughout history. 517 3 $aCodes & Ciphers 606 $aCryptography 606 $aCiphers 615 0$aCryptography. 615 0$aCiphers. 676 $a652/.8 700 $aChurchhouse$b R. F.$0850924 801 0$bUkCbUP 801 1$bUkCbUP 906 $aBOOK 912 $a9910450288903321 996 $aCodes and ciphers$91899915 997 $aUNINA