- 相关
- 目录
- 笔记
- 书签
更多相关文档
- Dedication
- Preface
- Acknowledgements
- Contents
- Chapter 1: Introduction – A Revolutionary Cipher
- Chapter 2: Cryptology Before 1500 – A Bit of Magic
- Chapter 3: The Black Chambers: 1500–1776
- Chapter 4: Crypto Goes to War: The American Revolution
- Chapter 5: Crypto Goes to War: The American Civil War 1861–1865
- 5.1 Technology Goes to War
- 5.2 The Union Tries a Route
- 5.3 Crypto for the Confederates
- 5.4 Solving a Vigenère Cipher – Babbage & Kasiski
- 5.5 Solving a Vigenère – Friedman’s Index of Coincidence
- 5.6 Solving a Vigenère – Finding the Key Length
- 5.7 Solving a Vigenère – Barr and Simoson
- 5.8 Conclusion
- References
- Chapter 6: Crypto and the War to End All Wars: 1914–1919
- 6.1 The Last Gasp of the Lone Codebreaker
- 6.2 The Last “Amateur” Cipher Bureau – Room 40
- 6.3 The Americans Start from Behind
- 6.4 America Catches Up: Herbert Yardley and MI-8
- 6.5 The A.E.F. in France
- 6.6 Trench Codes
- 6.7 Ciphers in the Great War – the Playfair
- 6.8 Ciphers in the Great War – The ADFGVX Cipher
- 6.9 The Home Front – Cracking the Waberski Cipher
- 6.10 A New Beginning
- References
- Chapter 7: The Interwar Period: 1919–1941
- Chapter 8: The Rise of the Machines: 1918–1941
- Chapter 9: Battle Against the Machines: World War II 1939–1945
- Chapter 10: The Machines Take Over: Computer Cryptography
- Chapter 11: Alice and Bob and Whit and Martin: Public-Key Cryptography
- 11.1 The Problem with Symmetric Ciphers
- 11.2 Enter Whit and Martin
- 11.3 The Key Exchange Problem
- 11.4 Public-Key Cryptography Appears (and GCHQ Too)
- 11.5 Authentication Is a Problem Too
- 11.6 Implementing Public-Key Cryptography – The RSA Algorithm
- 11.7 Analysis of RSA
- 11.8 Applications of Public-Key Cryptography
- 11.9 Elliptic Curve Cryptography
- References
- Chapter 12: Web and Mobile Device Cryptology
- Chapter 13: Cyber Weapons and Cyber Warfare
- Chapter 14: Cryptology and the Internet of Things
- Chapter 15: What Is Next in Cryptology?
- Chapter 16: Cipher Mysteries
- Photo and Illustration Credits
- Index
暂无笔记
选择文本,点击鼠标右键菜单,添加笔记
暂无书签
在左侧文档中,点击鼠标右键,添加书签
History of Cryptography and Cryptanalysis Codes, Ciphers, and Their Algorithms
格式:PDF
页数:307
上传日期:2019-10-16 07:50:21
浏览次数:23
下载积分:2000
加入阅读清单
0%