A Brief History of Cryptology and Cryptographic Algorithms (Record no. 96556)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 03192nam a22004815i 4500 |
001 - CONTROL NUMBER | |
control field | 978-3-319-01628-3 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | DE-He213 |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20140220082840.0 |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION | |
fixed length control field | cr nn 008mamaa |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 130924s2013 gw | s |||| 0|eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9783319016283 |
-- | 978-3-319-01628-3 |
024 7# - OTHER STANDARD IDENTIFIER | |
Standard number or code | 10.1007/978-3-319-01628-3 |
Source of number or code | doi |
050 #4 - LIBRARY OF CONGRESS CALL NUMBER | |
Classification number | QA76.17 |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | U |
Source | bicssc |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | TBX |
Source | bicssc |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | COM080000 |
Source | bisacsh |
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 004.09 |
Edition number | 23 |
100 1# - MAIN ENTRY--PERSONAL NAME | |
Personal name | Dooley, John F. |
Relator term | author. |
245 12 - TITLE STATEMENT | |
Title | A Brief History of Cryptology and Cryptographic Algorithms |
Medium | [electronic resource] / |
Statement of responsibility, etc | by John F. Dooley. |
264 #1 - | |
-- | Cham : |
-- | Springer International Publishing : |
-- | Imprint: Springer, |
-- | 2013. |
300 ## - PHYSICAL DESCRIPTION | |
Extent | XII, 99 p. 33 illus. |
Other physical details | online resource. |
336 ## - | |
-- | text |
-- | txt |
-- | rdacontent |
337 ## - | |
-- | computer |
-- | c |
-- | rdamedia |
338 ## - | |
-- | online resource |
-- | cr |
-- | rdacarrier |
347 ## - | |
-- | text file |
-- | |
-- | rda |
490 1# - SERIES STATEMENT | |
Series statement | SpringerBriefs in Computer Science, |
International Standard Serial Number | 2191-5768 |
505 0# - FORMATTED CONTENTS NOTE | |
Formatted contents note | Introduction: A Revolutionary Cipher -- Cryptology Before 1500: A Bit of Magic -- The Black Chambers: 1500 – 1776 -- Crypto goes to War: 1861 – 1865 -- Crypto and the War to End All Wars: 1914 – 1917 -- The Interwar Period: 1919 – 1939 -- The Coming of the Machines: 1918 – 1945 -- The Machines Take Over: Computer Cryptography -- Alice and Bob and Whit and Martin: Public Key Crypto. |
520 ## - SUMMARY, ETC. | |
Summary, etc | The science of cryptology is made up of two halves. Cryptography is the study of how to create secure systems for communications. Cryptanalysis is the study of how to break those systems. The conflict between these two halves of cryptology is the story of secret writing. For over two thousand years governments, armies, and now individuals have wanted to protect their messages from the “enemy”. This desire to communicate securely and secretly has resulted in the creation of numerous and increasingly complicated systems to protect one's messages. On the other hand, for every new system to protect messages there is a cryptanalyst creating a new technique to break that system. With the advent of computers the cryptographer seems to finally have the upper hand. New mathematically based cryptographic algorithms that use computers for encryption and decryption are so secure that brute-force techniques seem to be the only way to break them – so far. This work traces the history of the conflict between cryptographer and cryptanalyst, explores in some depth the algorithms created to protect messages, and suggests where the field is going in the future. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Computer science. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Science |
General subdivision | History. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Data structures (Computer science). |
650 14 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Computer Science. |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | History of Computing. |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Data Structures, Cryptology and Information Theory. |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | History of Science. |
710 2# - ADDED ENTRY--CORPORATE NAME | |
Corporate name or jurisdiction name as entry element | SpringerLink (Online service) |
773 0# - HOST ITEM ENTRY | |
Title | Springer eBooks |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY | |
Display text | Printed edition: |
International Standard Book Number | 9783319016276 |
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE | |
Uniform title | SpringerBriefs in Computer Science, |
-- | 2191-5768 |
856 40 - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | http://dx.doi.org/10.1007/978-3-319-01628-3 |
912 ## - | |
-- | ZDB-2-SCS |
No items available.