Kids Library Home

Welcome to the Kids' Library!

Search for books, movies, music, magazines, and more.

Available items only
Print Material
Author Dooley, John, 1952- author.

Title History of cryptography and cryptanalysis : codes, ciphers, and their algorithms / John F. Dooley.

Publication Info. Cham, Switzerland : Springer, [2018]


Location Call No. OPAC Message Status
 Axe 2nd Floor Stacks  652.8 D72h 2018    ---  Available
1 copy being processed for Axe Acquisitions Order.
Description xiv, 303 pages : illustrations (some colour) ; 25 cm.
text txt rdacontent
unmediated n rdamedia
volume nc rdacarrier
Series History of computing
History of computing (London, England)
Bibliography Includes bibliographical references and index.
Contents Introduction: A revolutionary cipher -- Cryptology before 1500: a bit of magic -- The black chambers: 1500-1776 -- Crypto goes to war: the American Revolution -- Crypto goes to war: the American Civil War 1861-1865 -- Crypto and the war to end all wars: 1914-1919 -- The interwar period: 1919-1941 -- The rise of the machines: 1918-1941 -- Battle against the machines: World War II 1939 -1945 -- The machines take over: computer cryptography -- Alice and Bob and Whit and Martin: public-key cryptography -- Web and mobile device cryptology -- Cyber weapons and cyber warfare -- Cryptology and the internet of things -- What is next in cryptology? -- Cipher mysteries.
Summary "This accessible textbook presents a fascinating review of cryptography and cryptanalysis across history. The text relates the earliest use of the monoalphabetic cipher in the ancient world, the development of the "unbreakable" Vigenère cipher, and an account of how cryptology entered the arsenal of military intelligence during the American Revolutionary War. Moving on to the American Civil War, the book explains how the Union solved the Vigenère ciphers used by the Confederates, before investigating the development of cipher machines throughout World War I and II. This is then followed by an exploration of cryptology in the computer age, from public-key cryptography and web security, to criminal cyber-attacks and cyber-warfare. Looking to the future, the role of cryptography in the Internet of Things is also discussed, along with the potential impact of quantum computing"--Back cover.
Subject Cryptography -- History.
Data encryption (Computer science) -- History.
Cryptography. (OCoLC)fst00884552
Data encryption (Computer science) (OCoLC)fst00887935
Genre/Form History. (OCoLC)fst01411628
Added Title Codes, ciphers, and their algorithms
ISBN 9783319904429 hardcover
3319904426 hardcover

Available items only