Codes and Ciphers
The design of code and cipher systems has undergone major changes in modern times. Powerful personal computers have resulted in an explosion of e-banking, e-commerce and e-mail, and as a consequence the encryption of communications to ensure security has become a matter of public interest and importance. This book describes and analyses many cipher systems ranging from the earliest and elementary to the more recent and sophisticated, such as RSA and DES, as well as wartime machines such as the ENIGMA and Hagelin, and ciphers used by spies. Security issues and possible methods of attack are discussed and illustrated by examples. The design of many systems involves advanced mathematical concepts and this is explained in detail in a major appendix. This book will appeal to anyone interested in codes and ciphers as used by private individuals, spies, governments and industry throughout history.
- Well illustrated and includes interesting and entertaining historical digressions
- Author has given many popular lectures on this material
- Contains information on wartime cryptography that was classified up until a few years ago
Reviews & endorsements
'… written in a lively and amusing style but not at the expense of mathematical rigour.' European Mathematical Society
'A fascinating account, which should appeal to a wide readership.' Mathematika
'… written in a lively and amusing style …' EMS Newsletter
'The mathematics is well within the grasp of a cultured A level mathematician and for those to whom the book is addressed, it can be recommended.' The Mathematical Gazette
Product details
December 2001Hardback
9780521810548
252 pages
237 × 158 × 18 mm
0.552kg
Available
Table of Contents
- Preface
- 1. Introduction
- 2. From Julius Caesar to simple substitution
- 3. Polyalphabetic systems
- 4. Jigsaw ciphers
- 5. Two-letter ciphers
- 6. Codes
- 7. Ciphers for spies
- 8. Producing random numbers and letters
- 9. The Enigma cipher machine
- 10. The Hagelin cipher machine
- 11. Beyond the Enigma
- 12. Public key cryptography
- 13. Encipherment and the internet
- Appendix
- Solutions to problems
- References
- Name index
- Subject index.