000 05102nam a22004813i 4500
001 EBC3330402
003 MiAaPQ
005 20240729125050.0
006 m o d |
007 cr cnu||||||||
008 240724s2009 xx o ||||0 eng d
020 _a9780883859377
_q(electronic bk.)
020 _z9780883856475
035 _a(MiAaPQ)EBC3330402
035 _a(Au-PeEL)EBL3330402
035 _a(CaPaEBR)ebr10729373
035 _a(OCoLC)929120246
040 _aMiAaPQ
_beng
_erda
_epn
_cMiAaPQ
_dMiAaPQ
050 4 _aQA76.9.A25 -- S56 2009eb
082 0 _a652.80151
100 1 _aSinkov, Abraham.
245 1 0 _aElementary Cryptanalysis.
250 _a2nd ed.
264 1 _aWashington :
_bAmerican Mathematical Society,
_c2009.
264 4 _c©2009.
300 _a1 online resource (227 pages)
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
490 1 _aAnneli Lax New Mathematical Library ;
_vv.22
505 0 _acover -- copyright page -- title page -- Contents -- Preface to the First Edition -- Preface to the Second Edition -- 1 Monoalphabetic Ciphers Using Additive Alphabets -- 1.1 The Caesar Cipher -- Exercises -- 1.2 Modular arithmetic -- Exercises -- 1.3 Additive alphabets -- Exercises -- 1.4 Solution of additive alphabets by completing the plain component -- Exercises -- 1.5 Solving additive alphabets by frequency considerations -- Exercises -- 1.6 Alphabets based on multiplications of the normal sequence -- Exercises -- 1.7 Solution of multiplicative alphabets -- Exercises -- 1.8 Affine ciphers -- Exercises -- 2 General Monoalphabetic Substitution -- 2.1 Mixed alphabets -- Exercises -- 2.2 Solution of mixed alphabet ciphers -- Exercises -- 2.3 Solution of monoalphabets in five letter groupings -- Exercises -- 2.4 Monoalphabets with symbols as cipher equivalents -- Exercises -- 3 Polyalphabetic Substitution -- 3.1 Polyalphabetic ciphers -- Exercises -- 3.2 Recognition of polyalphabetic ciphers -- Exercises -- 3.3 Determination of number of alphabets -- Exercises -- 3.4 Solution of individual alphabets, if additive -- Exercises -- 3.5 Polyalphabetic ciphers with a mixed plain sequence -- 3.6 Matching alphabets -- Exercises -- 3.7 Reduction of a polyalphabetic cipher to a monoalphabet -- 3.8 Polyalphabetic ciphers with mixed cipher sequences -- 3.9 General comments about polyalphabetic ciphers -- Exercises -- 4 Polygraphic Systems -- 4.1 Digraphic ciphers based on linear transformations-matrices -- Exercises -- 4.2 Multiplication of matrices-inverses -- Exercises -- 4.3 Involutory transformations -- Exercises -- 4.4 Recognition of digraphic ciphers -- 4.5 Solution of a linear transformation -- Exercises -- 4.6 How to make the Hill System more secure -- 5 Transposition -- 5.1 Columnar transposition -- Exercises.
505 8 _a5.2 Solution of transpositions with completely filled rectangles -- Exercises -- 5.3 Incompletely filled rectangles -- Exercises -- 5.4 Solution of incompletely filled rectangles-probable word method -- Exercises -- 5.5 Incompletely filled rectangles-general case -- Exercises -- 5.6 Repetitions between messages -- identical length messages -- Exercises -- 6 RSA Encryption -- 6.1 Public-key encryption -- 6.2 The RSA method -- 6.3 Creating the RSA keys -- Exercises -- 6.4 Why RSA works-Fermat's Little Theorem -- Exercises -- 6.5 Computational considerations -- Exercises -- 6.6 Maple and Mathematica for RSA -- Exercises -- 6.7 Breaking RSA and signatures -- Exercises -- 7 Perfect Security-One-time Pads -- 7.1 One-time pads -- Exercises -- 7.2 Pseudo-random number generators -- Exercises -- Appendix A: Tables -- Table of digraphic frequencies -- Log Weights -- Frequencies of the letters of the alphabet in a sample of 1000 letters, arranged alphabetically and by frequency. -- Frequencies of letters as initial letters of 16,410 words of newspaper text, arranged alphabetically and by frequency. -- Frequencies of letters as final letters of 16,410 words of newspaper text, arranged alphabetically and by frequency. -- Appendix B: ASCII Codes -- Appendix C: Binary Numbers -- Exercises -- Solutions to Exercises -- Chapter 1 -- Chapter 2 -- Chapter 3 -- Chapter 4 -- Chapter 5 -- Chapter 6 -- Chapter 7 -- Appendix C -- Further Readings -- Index -- About the Authors.
588 _aDescription based on publisher supplied metadata and other sources.
590 _aElectronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2024. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
650 0 _aCryptography -- Mathematics.
650 0 _aCiphers -- Mathematics.
655 4 _aElectronic books.
700 1 _aFeil, Todd.
776 0 8 _iPrint version:
_aSinkov, Abraham
_tElementary Cryptanalysis
_dWashington : American Mathematical Society,c2009
_z9780883856475
797 2 _aProQuest (Firm)
830 0 _aAnneli Lax New Mathematical Library
856 4 0 _uhttps://ebookcentral.proquest.com/lib/orpp/detail.action?docID=3330402
_zClick to View
999 _c79855
_d79855