Codes

Codes : The Guide to Secrecy From Ancient to Modern Times

3.2 (5 ratings by Goodreads)
By (author) 

Free delivery worldwide

Available. Dispatched from the UK in 10 business days
When will my order arrive?

Description

From the Rosetta Stone to public-key cryptography, the art and science of cryptology has been used to unlock the vivid history of ancient cultures, to turn the tide of warfare, and to thwart potential hackers from attacking computer systems. Codes: The Guide to Secrecy from Ancient to Modern Times explores the depth and breadth of the field, remaining accessible to the uninitiated while retaining enough rigor for the seasoned cryptologist.The book begins by tracing the development of cryptology from that of an arcane practice used, for example, to conceal alchemic recipes, to the modern scientific method that is studied and employed today. The remainder of the book explores the modern aspects and applications of cryptography, covering symmetric- and public-key cryptography, cryptographic protocols, key management, message authentication, e-mail and Internet security, and advanced applications such as wireless security, smart cards, biometrics, and quantum cryptography. The author also includes non-cryptographic security issues and a chapter devoted to information theory and coding. Nearly 200 diagrams, examples, figures, and tables along with abundant references and exercises complement the discussion.Written by leading authority and best-selling author on the subject Richard A. Mollin, Codes: The Guide to Secrecy from Ancient to Modern Times is the essential reference for anyone interested in this exciting and fascinating field, from novice to veteran practitioner.
show more

Product details

  • Hardback | 704 pages
  • 165.1 x 248.9 x 43.2mm | 1,111.31g
  • Taylor & Francis Inc
  • Chapman & Hall/CRC
  • Boca Raton, FL, United States
  • English
  • 1000 equations; 139 Halftones, black and white; 14 Tables, black and white; 139 Illustrations, black and white
  • 1584884703
  • 9781584884705

Review quote

...an encyclopedic work of a very high standard. ... More than merely a book that describes cryptographic codes, scattered throughout this book are pictures and biographies of key personnel responsible for progressing the world's knowledge and use of codes, as well as exercises and problems ... This is, without question, an excellent book. ... the depth of the knowledge, the provided mathematical background, and simply the correctness and consistency of symbols throughout, all give indications of the quality and amount of work that has gone into this book. ... the book is probably the best book currently for the range of users.-IACR book reviews, May 2010
It is an excellent book with unique features including more than 370 exercises...-The Cryptogram, Vol. LXXI, No. 5, September-October 2005This is an interesting, entertaining and well-composed book. ... It was a good idea to collect all exercises in the Appendix G as it makes reading easier for a general reader, while enabling university and college faculty to use the book in teaching courses in cryptography and cryptoanalysis. To conclude it is worth mentioning that all sections of the book are decorated with beautiful quotations.-Mathematical ReviewsIt is full of engaging detail on the many personalities that have been drawn to this branch of applied mathematics. ... a self-contained guide to the subject covering material from basic arithmetic to the foundations of group theory and probability. ... Among books at the level, this one stands out for some of its vivid examples. Particularly enlightening is the discussion of quantum computing: rather than merely touching on the subject, Mollin provides a particularly illustrative and detailed example.-MAA Reviews, Dec. 2005Richard Mollin has written many books ... on cryptography for readers at many levels. I found this to be his most approachable work, and perhaps one of his most educational.-SIGACT News
show more

Table of contents

PrefaceFROM THE RIDDLES OF ANCIENT EGYPT TO CRYPTOGRAPHY IN THE RENAISSANCE-3,500 YEARS IN THE MAKINGAntiquity-From PhaistosCryptography in Classical LiteratureThe Middle AgesCryptology and the ArabsRise of the WestFROM SIXTEENTH-CENTURY CRYPTOGRAPHY TO THE NEW MILLENNIUM-THE LAST 500 YEARSThree Post-Renaissance CenturiesThe American ColoniesNineteenth-Century CryptographyTwo World WarsThe Post War Era and the FutureSYMMETRIC-KEY CRYPTOGRAPHYBlock Ciphers and DESS-DES and DESModes of OperationBlowfishThe Advanced Encryption StandardStream CiphersRC4PUBLIC-KEY CRYPTOGRAPHYThe Ideas Behind PKCRSADigital SignaturesElGamalCRYPTOGRAPHIC PROTOCOLSIntroductionKeysIdentificationCommitmentSecret SharingElectronic VotingProtocol Layers and SSLDigital Cash SchemesKEY MANAGEMENTAuthentication, Exchange, and DistributionPublic-Key Infrastructure (PKI)Secure Electronic Transaction (SET)MESSAGE AUTHENTICATIONAuthentication FunctionsMessage Authentication CodesEncryption FunctionsAuthentication ApplicationsELECTRONIC MAIL AND INTERNET SECURITYPretty Good Privacy (PGP)S/MIME and PGPIPSecInternetworking and Security-FirewallsClient-Server Model and CookiesHistory of the Internet and the WWWAPPLICATIONS AND THE FUTURELogin and Network SecurityWireless SecuritySmart CardsBiometricsQuantum CryptographyNuclear Test Ban Treaty ComplianceNON-CRYPTOGRAPHIC SECURITY ISSUESCybercrimeHackersViruses and Other InfectionsLegal Matters and ControversyINFORMATION THEORY AND CODINGShannonEntropyHuffman CodesInformation Theory of CryptosystemsError-Correcting CodesAPPENDIX A: MATHEMATICAL FACTSSets, Relations, and FunctionsBasic ArithmeticModular ArithmeticGroups, Fields, Modules, and RingsVector SpacesBasic Matrix TheoryContinued FractionsElliptic CurvesComplexityAPPENDIX B: PSEUDO-RANDOM NUMBER GENERATIONANSI X9.17The Blum-Blum-Shub-(BBS) PRNGAPPENDIX C: FACTORING LARGE INTEGERSClassical Factorization MethodsThe Continued Fraction AlgorithmPollard's p-1 AlgorithmPollard's Rho-MethodThe Quadratic Sieve (QS)Multipolynomial Quadratic Sieve (MPQS)The Elliptic Curve Method (ECM)The General Number Field SieveAPPENDIX D: TECHNICAL AND ADVANCED DETAILSAESSilver-Pohlig-HellmanBaby-Step Giant-Step AlgorithmIndex-Calculus AlgorithmBrands' Digital Cash SchemeRadix-64 EncodingAPPENDIX E: PROBABILITY THEORYBasic ProbabilityRandomness, Expectation, and VarianceBinomial DistributionThe Law of Large NumbersProbability and Error DetectionAPPENDIX F: RECOGNIZING PRIMESPrimality and Compositeness TestsMiller-Selfridge-RabinPrimes is in PGeneration of Random PrimesDecision Problem or Primality Test?APPENDIX G: EXERCISESBIBLIOGRAPHYLIST OF SYMBOLSINDEX
show more

Rating details

5 ratings
3.2 out of 5 stars
5 0% (0)
4 20% (1)
3 80% (4)
2 0% (0)
1 0% (0)
Book ratings by Goodreads
Goodreads is the world's largest site for readers with over 50 million reviews. We're featuring millions of their reader ratings on our book pages to help you find your new favourite book. Close X