Secret History : The Story of Cryptology - Craig Bauer

Secret History

The Story of Cryptology

By: Craig Bauer

Paperback | 26 August 2024

At a Glance

Paperback


RRP $120.00

$90.50

25%OFF

or 4 interest-free payments of $22.63 with

 or 

Aims to ship in 7 to 10 business days

The first edition of this award-winning book attracted a wide audience. This second edition is both a joy to read and a useful classroom tool. Unlike traditional textbooks, it requires no mathematical prerequisites and can be read around the mathematics presented. If used as a textbook, the mathematics can be prioritized, with a book both students and instructors will enjoy reading.

Secret History: The Story of Cryptology, Second Edition incorporates new material concerning various eras in the long history of cryptology. Much has happened concerning the political aspects of cryptology since the first edition appeared. The still unfolding story is updated here.

The first edition of this book contained chapters devoted to the cracking of German and Japanese systems during World War II. Now the other side of this cipher war is also told, that is, how the United States was able to come up with systems that were never broken.

The text is in two parts. Part I presents classic cryptology from ancient times through World War II. Part II examines modern computer cryptology. With numerous real-world examples and extensive references, the author skillfully balances the history with mathematical details, providing readers with a sound foundation in this dynamic field.

FEATURES

  • Presents a chronological development of key concepts
  • Includes the Vigen?re cipher, the one-time pad, transposition ciphers, Jefferson's wheel cipher, Playfair cipher, ADFGX, matrix encryption, Enigma, Purple, and other classic methods
  • Looks at the work of Claude Shannon, the origin of the National Security Agency, elliptic curve cryptography, the Data Encryption Standard, the Advanced Encryption Standard, public-key cryptography, and many other topics
  • New chapters detail SIGABA and SIGSALY, successful systems used during World War II for text and speech, respectively
  • Includes quantum cryptography and the impact of quantum computers

More in Network Security

Cybercrime : An Encyclopedia of Digital Crime - Nancy E. Marion

RRP $59.99

$49.25

18%
OFF
Cybersecurity All-in-One For Dummies : For Dummies - Joseph Steinberg
Cybersecurity For Dummies : 2nd edition - Joseph Steinberg

RRP $52.95

$37.25

30%
OFF
Information Modeling and Relational Databases : 2nd Edition - Terry Halpin
Cyber Wars : Hacks that Shocked the Business World - Charles Arthur

BOXING DAY

Network Security Assessment : Know Your Network : 3rd Edition - Chris Mcnab
Threat Modeling : A Practical Guide for Development Teams - Izar Tarandach
The Language of Cyber Attacks : A Rhetoric of Deception - Aaron Mauro
Radius : O'Reilly Ser. - Jonathan Hassell

RRP $66.50

$31.75

52%
OFF
Smart Home Hacks : Hacks - Gordon Meyer

RRP $57.00

$28.25

50%
OFF
SSH, The Secure Shell : Definitive Guide Ser. - Daniel J Barrett

RRP $85.50

$39.75

54%
OFF