A Brief History of Cryptology and Cryptographic Algorithms by John F. Dooley

By John F. Dooley

The technological know-how of cryptology is made of halves. Cryptography is the examine of the way to create safe platforms for communications. Cryptanalysis is the examine of the way to damage these structures. The clash among those halves of cryptology is the tale of mystery writing. For over 2,000 years, the will to speak securely and secretly has ended in the construction of various and more and more complex platforms to guard one's messages. but for each process there's a cryptanalyst making a new strategy to holiday that method. With the arrival of pcs the cryptographer turns out to eventually have the higher hand. New mathematically established cryptographic algorithms that use desktops for encryption and decryption are so safe that brute-force innovations appear to be the single strategy to holiday them – thus far. This paintings lines the background of the clash among cryptographer and cryptanalyst, explores in a few intensity the algorithms created to guard messages, and indicates the place the sector goes within the future.

Show description

Read Online or Download A Brief History of Cryptology and Cryptographic Algorithms (SpringerBriefs in Computer Science) PDF

Best computer information theory books

Algebraic and Stochastic Coding Theory

Utilizing an easy but rigorous strategy, Algebraic and Stochastic Coding thought makes the topic of coding conception effortless to appreciate for readers with a radical wisdom of electronic mathematics, Boolean and sleek algebra, and chance idea. It explains the underlying ideas of coding concept and provides a transparent, certain description of every code.

The Wave Rider: A Chronicle of the Information Age

Ajit Balakrishnan is quietly experimenting with the hot and engaging applied sciences of the net in 1995 whilst the dot-com fever grips the realm. enterprise capitalists, funding bankers and legal professionals pound on the doorways of his tiny place of work in a low-rent quarter of Mumbai, urging him to take his corporation public on New York's NASDAQ inventory industry.

Advanced Error Control Techniques for Data Storage Systems

With the large quantity of information produced and saved every year, trustworthy garage and retrieval of data is extra an important than ever. powerful coding and interpreting ideas are severe for correcting error and keeping facts integrity. Comprising chapters thoughtfully chosen from the hugely renowned Coding and sign Processing for Magnetic Recording platforms, complicated errors keep an eye on suggestions for info garage platforms is a finely targeted connection with the cutting-edge mistakes keep watch over and modulation thoughts utilized in garage units.

Digital-Forensics and Watermarking: 14th International Workshop, IWDW 2015, Tokyo, Japan, October 7-10, 2015, Revised Selected Papers (Lecture Notes in Computer Science)

This ebook constitutes revised chosen papers from the14th overseas Workshop on Digital-Forensics and Watermarking, IWDW 2015,held in Tokyo, Japan, in October 2015. The 35 papers offered during this quantity have been carefullyreviewed and chosen from fifty four submissions. The contributions are geared up intopical sections named: electronic forensics; steganography and steganalysis;digital watermarking; reversible information hiding; and visible cryptography.

Extra resources for A Brief History of Cryptology and Cryptographic Algorithms (SpringerBriefs in Computer Science)

Example text

Download PDF sample

Rated 4.64 of 5 – based on 18 votes

Related posts