000 01492nam a2200205 u 4500
001 10106881
003 upatras
005 20210117204323.0
008 030522s
020 _a3 540 42674 4
245 1 0 _aDecrypted Secrets
_bMethods and Maxims of Cryptology
_cFriedrich L. Bauer
250 _a3rd., Revised and Updated Ed.
260 _aBerlin
_bSpringer
_c2002
300 _axii, 473 p., fig., tab., col. Plat.
504 _aBibliography pp. 449-452, Index pp. 453-473
505 1 _acontents: PART I:Cryptography, 1.Introductory synopsis, 2.Aims and methods of cryptography, 3.Encryption steps:simple substitution, 4.Encryption steps:polygraphic substitution and coding, 5.Encryption steps:linear substitution, 6.Encryption steps:transposition, 7.Polyalphabetic encryption:families of alphabets, 8.Polyalphabetic encryption:keys, 9.Composition of classes of methods, 10.Open encryption key systems, 11.Encryption security, PART II:Cryptanalysis, 12.Exhausting combinatorial complexity, 13.Anatomy of language:patterns, 14.Polyalphabetic case:probable words, 15.Anatomy of language:frequencies, 16.Kappa and chi, 17.Periodicity examination, 18.Alignment of accompanying alphabets, 19.Compromises, 20.Linear basis analysis, 21.Anagramming, 22.Concluding remarks, Appendix:Axiomatic information theory, Bibliography, Index, Photo credits.
700 1 _aBauer, Friedrich Ludwiq
_d1924-
_4aut
_964708
942 _2ddc
999 _c92778
_d92778