- Broschiertes Buch
A practical guide by two world experts to codebreaking and solving cryptograms. There are tens of thousands of such cryptograms, both modern and historical, many of which remain unsolved. The guide is complemented by both success stories and details of unsolved encryption mysteries.
Andere Kunden interessierten sich auch für
- Frank RubinSecret Key Cryptography53,99 €
- Daniel ReillyMath for Security46,99 €
- Jean-Philippe AumassonSerious Cryptography31,99 €
- Andreas AntonopoulosMastering Ethereum45,99 €
- Courtney BowmanThe Architecture of Privacy: On Engineering Technologies That Can Deliver Trustworthy Safeguards32,99 €
- Yves Deswarte / Frederic Cuppens / Sushil Jajodia / Lingyu Wang (Hgg.)Security and Protection in Information Processing Systems98,99 €
- Sinclair McKay50 Codes that Changed the World16,99 €
-
-
-
A practical guide by two world experts to codebreaking and solving cryptograms. There are tens of thousands of such cryptograms, both modern and historical, many of which remain unsolved. The guide is complemented by both success stories and details of unsolved encryption mysteries.
Produktdetails
- Produktdetails
- Verlag: Little, Brown Book Group
- Seitenzahl: 528
- Erscheinungstermin: 10. Dezember 2020
- Englisch
- Abmessung: 233mm x 154mm x 43mm
- Gewicht: 634g
- ISBN-13: 9781472144218
- ISBN-10: 147214421X
- Artikelnr.: 59369544
- Verlag: Little, Brown Book Group
- Seitenzahl: 528
- Erscheinungstermin: 10. Dezember 2020
- Englisch
- Abmessung: 233mm x 154mm x 43mm
- Gewicht: 634g
- ISBN-13: 9781472144218
- ISBN-10: 147214421X
- Artikelnr.: 59369544
Elonka Dunin (Author) ELONKA DUNIN is an American video-game developer and cryptologist. Bestselling author Dan Brown named Nola Kaye, a character in his novel, The Lost Symbol, after her. Elonka has published a book of exercises on classical cryptography and maintains cryptography-related websites about topics such as the world's most famous unsolved codes and Kryptos, a sculpture at the Central Intelligence Agency containing an encrypted message. She is considered the leading Kryptos expert in the world. Elonka is a member of the United States National Cryptologic Museum Foundation's Board and frequently gives lectures on the subject of cryptography. Klaus Schmeh (Author) KLAUS SCHMEH is one of the world's leading experts on the history of encryption. He has published thirteen books about encryption technology (mostly written in German), as well as over 200 articles, twenty-five scientific publications and 1,200 blog posts, which makes him the most published cryptology author in the world. He is a member of the editorial board of the scientific magazine, Cryptologia, and a frequent speaker at encryption conferences in Europe and the USA. He has given presentations at the NSA Cryptologic History Symposium, the Charlotte International Cryptologic Symposium, the RSA Conference in San Francisco and many more. He is known for his entertaining presentation style involving self-drawn cartoons and Lego models.
Preface
Chapter 1: How can I break an encrypted message? And other introductory
questions
Chapter 2: The Caesar cipher
Chapter 3: Simple substitution ciphers
Chapter 4: Simple substitution ciphers without spaces between words:
Patristocrats
Chapter 5: Simple substitution ciphers in non-English languages
Chapter 6: Homophonic ciphers
Chapter 7: Codes and nomenclators
Chapter 8: Polyalphabetic ciphers
Chapter 9: Complete columnar transposition ciphers
Chapter 10: Incomplete columnar transposition ciphers
Chapter 11: Turning grille transposition ciphers
Chapter 12: Digraph substitution
Chapter 13: Abbreviation ciphers
Chapter 14: Dictionary codes and book ciphers
Chapter 15: Additional encryption methods
Chapter 16: Solving ciphers with hill climbing
Chapter 17: What next?
Appendix A: Kryptos
Appendix B: Useful language statistics
Appendix C: Glossary
Appendix D: Figure sources
References
Chapter 1: How can I break an encrypted message? And other introductory
questions
Chapter 2: The Caesar cipher
Chapter 3: Simple substitution ciphers
Chapter 4: Simple substitution ciphers without spaces between words:
Patristocrats
Chapter 5: Simple substitution ciphers in non-English languages
Chapter 6: Homophonic ciphers
Chapter 7: Codes and nomenclators
Chapter 8: Polyalphabetic ciphers
Chapter 9: Complete columnar transposition ciphers
Chapter 10: Incomplete columnar transposition ciphers
Chapter 11: Turning grille transposition ciphers
Chapter 12: Digraph substitution
Chapter 13: Abbreviation ciphers
Chapter 14: Dictionary codes and book ciphers
Chapter 15: Additional encryption methods
Chapter 16: Solving ciphers with hill climbing
Chapter 17: What next?
Appendix A: Kryptos
Appendix B: Useful language statistics
Appendix C: Glossary
Appendix D: Figure sources
References
Preface
Chapter 1: How can I break an encrypted message? And other introductory
questions
Chapter 2: The Caesar cipher
Chapter 3: Simple substitution ciphers
Chapter 4: Simple substitution ciphers without spaces between words:
Patristocrats
Chapter 5: Simple substitution ciphers in non-English languages
Chapter 6: Homophonic ciphers
Chapter 7: Codes and nomenclators
Chapter 8: Polyalphabetic ciphers
Chapter 9: Complete columnar transposition ciphers
Chapter 10: Incomplete columnar transposition ciphers
Chapter 11: Turning grille transposition ciphers
Chapter 12: Digraph substitution
Chapter 13: Abbreviation ciphers
Chapter 14: Dictionary codes and book ciphers
Chapter 15: Additional encryption methods
Chapter 16: Solving ciphers with hill climbing
Chapter 17: What next?
Appendix A: Kryptos
Appendix B: Useful language statistics
Appendix C: Glossary
Appendix D: Figure sources
References
Chapter 1: How can I break an encrypted message? And other introductory
questions
Chapter 2: The Caesar cipher
Chapter 3: Simple substitution ciphers
Chapter 4: Simple substitution ciphers without spaces between words:
Patristocrats
Chapter 5: Simple substitution ciphers in non-English languages
Chapter 6: Homophonic ciphers
Chapter 7: Codes and nomenclators
Chapter 8: Polyalphabetic ciphers
Chapter 9: Complete columnar transposition ciphers
Chapter 10: Incomplete columnar transposition ciphers
Chapter 11: Turning grille transposition ciphers
Chapter 12: Digraph substitution
Chapter 13: Abbreviation ciphers
Chapter 14: Dictionary codes and book ciphers
Chapter 15: Additional encryption methods
Chapter 16: Solving ciphers with hill climbing
Chapter 17: What next?
Appendix A: Kryptos
Appendix B: Useful language statistics
Appendix C: Glossary
Appendix D: Figure sources
References