+612 9045 4394
 
CHECKOUT
Cryptology : Machines, History and Methods - B. Winkel

Cryptology

Machines, History and Methods

By: B. Winkel (Editor)

Hardcover

Published: 19th December 1990
Ships: 7 to 10 business days
7 to 10 business days
RRP $485.99
$336.25
31%
OFF
or 4 easy payments of $84.06 with Learn more

The essence of cryptology is the making and breaking of codes and ciphers. This is the second volume of articles (the first was titled Cryptologia yesterday, today and tomorrow ) culled from Cryptologia (Rose-Hulman Institute of Technology, Terre Haute, IN). The articles are divided into five sectio

Prefacep. ix
Cryptologic Personalities
Introductionp. 1
Conversation with Marian Rejewski, Cryptologia, Vol. 6, No. 1, pp. 50-60p. 4
In Memoriam: Marian Rejewski, Cryptologia, Vol. 6, No. 1, pp. 19-25p. 15
In Memoriam: Georges-Jean Painvain, Cryptologia, Vol. 6, No. 2, pp. 120-127p. 22
The Day the Friedmans Had a Typo in Their Photo, Cryptologia, Vol. 3, No. 4, pp. 236-241p. 30
Interviews with Cryptologists, Cryptologia, Vol. 4, No. 2, pp. 65-70p. 36
The Noblest Cryptologist--Duke August, Cryptologia, Vol. 7, No. 3, pp. 193-217p. 42
History
Introductionp. 67
The Significance of Codebreaking and Intelligence in Allied Strategy and Tactics, Cryptologia, Vol. 1, No. 3, pp. 209-222p. 68
Yardley's Seized Manuscript, Cryptologia, Vol. 6, No. 2, pp. 115-119p. 82
Abwehr Ciphers in Latin America, Cryptologia, Vol. 7, No. 2, pp. 132-144p. 87
GC and CS Mobilizes "Men of the Professor Type," Cryptologia, Vol. 10, No. 1, pp. 50-59p. 100
With the 849th SIS, 1942-45, Cryptologia, Vol. 11, No. 1, pp. 29-39p. 110
Some of My Wartime Experiences, Cryptologia, Vol. 11, No. 2, pp. 65-77p. 121
Who Was the Third Man at Pyry?, Cryptologia, Vol. 11, No. 2, pp. 78-80p. 134
Riverbank Publications on Cryptology, Cryptologia, Vol. 2, No. 4, pp. 324-330p. 137
Some Special War Work -- Part I, Cryptologia, Vol. 4, No. 4, pp. 193-203p. 144
Some Special War Work -- Part II, Cryptologia, Vol. 5, No. 1, pp. 33-39p. 155
The Shortsighted View of a Foresighted Admiral, Cryptologia, Vol. 11, No. 3, pp. 156-159p. 162
Stimson, The Black Chamber, and the "Gentlemen's Mail" Quote, Cryptologia, Vol. 12, No. 2, pp. 65-89p. 166
Analysis
Introductionp. 191
Survey of Data Insecurity Packages, Cryptologia, Vol. 11, No. 1, pp. 1-15p. 195
Analysis of the Encryption Algorithm Used in the Word Perfect Word Processing Program, Cryptologia, Vol. 11, No. 4, pp. 206-210p. 210
Finding Vowels in Simple-Substitution Ciphers by Computer, Cryptologia, Vol. 8, No. 4, pp. 348-358p. 215
Improving the Machine Recognition of Vowels, Cryptologia, Vol. 10, No. 1, pp. 10-22p. 226
An Empirical Method for Finding the Keylength of Periodic Ciphers, Cryptologia, Vol. 12, No. 4, pp. 220-224p. 239
Foiling the Known-Plaintext Attack, Cryptologia, Vol. 10, No. 4, pp. 217-222p. 244
Using Binary Derivatives to Test an Enhancement of DES, Cryptologia, Vol. 12, No. 4, pp. 193-208p. 250
Language Redundancy and the Unicity Point, Cryptologia, Vol. 7, No. 1, pp. 37-48p. 266
Automated Cryptanalysis of Polyalphabetic Ciphers, Cryptologia, Vol. 11, No. 4, pp. 193-206p. 278
Cryptographic Machines
Introductionp. 291
The Mystery of Colonel Decius Wadsworth's Cipher Device, Cryptologia, Vol. 6, No. 3, pp. 238-247p. 294
How to Use the German Enigma Cipher Machine, Cryptologia, Vol. 7, No. 4, pp. 291-296p. 304
Mathematical Solution of Enigma Cipher, Cryptologia, Vol. 6, No. 1, pp. 1-18p. 310
A Solution of the Hebern Machine, Cryptologia, Vol. 12, No. 3, pp. 144-158p. 328
Naval Enigma: M4 and Its Rotors, Cryptologia, Vol. 11, No. 4, pp. 235-244p. 343
Cipher Equipment, Cryptologia, Vol. 1, No. 2, pp. 143-149p. 353
A22 Cryptograph, Cryptologia, Vol. 5, No. 3, pp. 175-183p. 360
Sidney Hole's Cryptographic Machine, Cryptologia, Vol. 8, No. 2, pp. 115-125p. 369
The Mysterious Autocryptograph, Cryptologia, Vol. 8, No. 1, pp. 78-92p. 380
Ciphers -- Historical and Challenging
Introductionp. 395
Fraternal Cryptography: Cryptographic Practices of American Fraternal Organizations, Cryptologia, Vol. 7, No. 1, pp. 27-36p. 400
A Message in Cipher Written by General Cornwallis During the Revolutionary War, Cryptologia, Vol. 1, No. 4, pp. 392-395.p. 410
James Lovell and Secret Ciphers During the Revolutionary War, Cryptologia, Vol. 2, No. 1, pp. 75-88p. 414
German Spy Cryptograms, Cryptologia, Vol. 5, No. 2, pp. 65-66p. 428
The Earliest Use of Dot Cipher, Cryptologia, Vol. 1, No. 3, pp. 261-274p. 430
An Apology for Jacopo Silvestri, Cryptologia, Vol. 4, No. 2, pp. 96-103p. 444
The Churchyard Ciphers, Cryptologia, Vol. 1, No. 4, pp. 372-375p. 452
The Code-O-Graph Cipher Disks, Cryptologia, Vol. 5, No. 2, pp. 78-83.p. 456
A Child's Garden of Cryptography, Cryptologia, Vol. 6, No. 4, pp. 368-377p. 462
Poe Challenge Cipher Finally Broken, Cryptologia, Vol. 1, No. 1, pp. 93-96p. 472
The Unsolved d'Agapeyeff Cipher, Cryptologia, Vol. 2, No. 2, pp. 144-147p. 476
Opportunities for the Amateur Cryptanalyst Can Be Anywhere, Cryptologia, Vol. 4, No. 3, pp. 169-172p. 480
How Did TJB Encode B2?, Cryptologia, Vol. 3, No. 1, pp. 9-15p. 484
The Beale Cypher: A Dissenting Opinion, Cryptologia, Vol. 4, No. 2, pp. 116-119p. 491
A Basic Probe of the Beale Cipher as a Bamboozlement -- Part I, Cryptologia, Vol. 6, No. 4, pp. 378-382p. 495
A Basic Probe of the Beale Cipher as a Bamboozlement -- Part II, Cryptologia, Vol. 12, No. 4, pp. 241-246p. 500
The Editorsp. 507
Table of Contents provided by Syndetics. All Rights Reserved.

ISBN: 9780890063996
ISBN-10: 0890063990
Series: Artech House Cryptology Series
Audience: Professional
Format: Hardcover
Language: English
Number Of Pages: 520
Published: 19th December 1990
Publisher: Artech House Publishers
Country of Publication: US
Dimensions (cm): 22.9 x 15.2  x 3.3
Weight (kg): 0.93