文件名称:
Codes and Ciphers: Julius Caesar, the Enigma, and the Internet
开发工具:
文件大小: 1mb
下载次数: 0
上传时间: 2008-08-21
详细说明:
Codes and Ciphers: Julius Caesar, the Enigma, and the Internet
代码和加密
by R. F. Churchhouse
Publisher: Cambridge University Press (December 6, 2001)
内容介绍:
本书描述和分析了许多加密系统,从最早期到最现代的、复杂的系统以及互联网环境下的加密等等
The ability to convert data into a form that is readable only by a selected group has been a matter of utmost importance for thousands of years. The fate of entire nations has rested on the ability of a nation to keep their messages secure or accurately unravel the messages of opponents. The most celebrated cases involve instances of war, where the messages sent by the Germans and Japanese were intercepted and decrypted by the allies. While not decisive in the outcome of the war, the knowledge gained was of enormous value and did a great deal to assist in the victory. By far, the most well known case is that of the Enigma machine used by the Germans in world war two. The British were able to break the code and the knowledge they obtained made a significant difference in the early years of the war.
Encryption is now a foundation pillar of modern society. Trillions of dollars are now electronically exchanged over the course of a year, and the entire world economy is now dependent on the ability of computers to exchange data in a manner that is accurate and secure from fraud. While security over the Internet is the most widely cited example, most of the data is exchanged over private lines.
The first documented case of encryption being used in war is when Julius Caesar used a simple substitution cipher to send orders to his troops. That and all similar codes is where the book begins. After that, there is a very detailed examination of the Enigma and Hagelin machines, right down to how the wheels interact. This part of the book was by far the most interesting, as well as the descriptions of how it was possible for the allied cryptographers to break the Enigma code. It turns out that the breaking of the codes was not due to a flaw in the machine, but in the way it was used. The remaining part of the book is filled with a description of public key cryptography and the applications for the Internet.
The sections on the substitution ciphers and public key cryptography are good but fairly standard. Problems are given at the end of each chapter and solutions are in the back of the book. What makes this book unique is the mechanical descriptions of the Enigma and Hagelin cipher machines. If you are interested only in the mathematics of encryption, then you will most likely not find them interesting. However, if you are like me and are interested in the mechanical aspects of the machines, then you will like it.
http://www.amazon.com/exec/obidos/tg/detail/-/052181054X/qid=1124437337/sr=1-1/ref=sr_1_1/102-6019928-1193731?v=glance&s=books
...展开收缩
(系统自动生成,下载前可以参看下载内容)
下载文件列表
相关说明
- 本站资源为会员上传分享交流与学习,如有侵犯您的权益,请联系我们删除.
- 本站是交换下载平台,提供交流渠道,下载内容来自于网络,除下载问题外,其它问题请自行百度。
- 本站已设置防盗链,请勿用迅雷、QQ旋风等多线程下载软件下载资源,下载后用WinRAR最新版进行解压.
- 如果您发现内容无法下载,请稍后再次尝试;或者到消费记录里找到下载记录反馈给我们.
- 下载后发现下载的内容跟说明不相乎,请到消费记录里找到下载记录反馈给我们,经确认后退回积分.
- 如下载前有疑问,可以通过点击"提供者"的名字,查看对方的联系方式,联系对方咨询.