Decrypted secrets: methods and maxims of cryptology ; with 26 tables
Gespeichert in:
Vorheriger Titel: | Bauer, Friedrich L. Entzifferte Geheimnisse |
---|---|
Beteilige Person: | |
Format: | Buch |
Sprache: | Deutsch |
Veröffentlicht: |
Berlin ; Heidelberg ; New York ; Barcelona ; Hongkong ; London ;
Springer
2000
|
Ausgabe: | 2., rev. and extended ed. |
Schlagwörter: | |
Links: | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=008805606&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
Beschreibung: | Literaturverz. S. 428 - 430 |
Umfang: | XII, 470 S. Ill., graph. Darst. |
ISBN: | 3540668713 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV012932026 | ||
003 | DE-604 | ||
005 | 20130326 | ||
007 | t| | ||
008 | 000111s2000 gw ad|| |||| 00||| ger d | ||
016 | 7 | |a 958012512 |2 DE-101 | |
020 | |a 3540668713 |c Gb. : ca. DM 69.00 |9 3-540-66871-3 | ||
035 | |a (OCoLC)845371372 | ||
035 | |a (DE-599)BVBBV012932026 | ||
040 | |a DE-604 |b ger |e rakwb | ||
041 | 0 | |a ger | |
044 | |a gw |c DE | ||
049 | |a DE-739 |a DE-703 |a DE-20 |a DE-91G |a DE-521 |a DE-83 |a DE-11 |a DE-188 | ||
082 | 0 | |a 652.8 | |
084 | |a SK 170 |0 (DE-625)143221: |2 rvk | ||
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
084 | |a DAT 465f |2 stub | ||
084 | |a 28 |2 sdnb | ||
100 | 1 | |a Bauer, Friedrich L. |d 1924-2015 |e Verfasser |0 (DE-588)10427459X |4 aut | |
245 | 1 | 0 | |a Decrypted secrets |b methods and maxims of cryptology ; with 26 tables |c Friedrich L. Bauer |
250 | |a 2., rev. and extended ed. | ||
264 | 1 | |a Berlin ; Heidelberg ; New York ; Barcelona ; Hongkong ; London ; |b Springer |c 2000 | |
300 | |a XII, 470 S. |b Ill., graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
500 | |a Literaturverz. S. 428 - 430 | ||
650 | 0 | 7 | |a Kryptologie |0 (DE-588)4033329-2 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 0 | |5 DE-604 | |
780 | 0 | 0 | |i 1. Auflage |a Bauer, Friedrich L. |t Entzifferte Geheimnisse |
856 | 4 | 2 | |m SWB Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=008805606&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-008805606 |
Datensatz im Suchindex
DE-BY-TUM_call_number | 0102 DAT 465f 2001 A 6951 |
---|---|
DE-BY-TUM_katkey | 1144860 |
DE-BY-TUM_location | 01 |
DE-BY-TUM_media_number | 040010586608 |
_version_ | 1823083114215243776 |
adam_text |
CONTENTS PART I: CRYPTOGRAPHY
. 1 1 INTRODUCTORY SYNOPSIS
. 8 1.1 CRYPTOGRAPHY AND
STEGANOGRAPHY . 8 1.2 SEMAGRAMS
. 9 1.3 OPEN CODE:
MASKING . 12 1.4 CUES
. 16 1.5
OPEN CODE: VEILING BY NULLS . 18
1.6 OPEN CODE: VEILING BY GRILLES .
22 1.7 CLASSIFICATION OF CRYPTOGRAPHIC METHODS
. 24 2 AIMS AND METHODS OF CRYPTOGRAPHY
. 25 2.1 THE NATURE OF CRYPTOGRAPHY
. 25 2.2 ENCRYPTION
. 31 2.3
CRYPTOSYSTEMS . 33
2.4 POLYPHONY .
35 2.5 CHARACTER SETS
. 37 2.6 KEYS
. 40 3
ENCRYPTION STEPS: SIMPLE SUBSTITUTION . 42 3.1 CASE
V (1) **** W (UNIPARTITE SIMPLE SUBSTITUTIONS) . 42 3.2
SPECIALCASE V ****** V (PERMUTATIONS) . 44 3.3
CASE V (1) **** W M (MULTIPARTITE SIMPLE SUBSTITUTIONS) . 51
3.4 THE GENERALCASE V (1) **** W ( M ) , STRADDLING .
53 4 ENCRYPTION STEPS: POLYGRAPHIC SUBSTITUTION AND CODING . 56 4.1 CASE
V 2 **** W ( M ) (DIGRAPHIC SUBSTITUTIONS) . 56 4.2
SPECIAL CASES OF PLAYFAIR AND DELASTELLE: TOMOGRAPHIC METHODS . 62
4.3 CASE V 3 *** * W ( M ) (TRIGRAPHIC SUBSTITUTIONS) .
66 4.4 THE GENERALCASE V ( N ) **** W ( M ) : CODES
. 66 5ENCRYPTION STEPS: LINEAR SUBSTITUTION
. 78 5.1 SELF-RECIPROCAL LINEAR SUBSTITUTIONS
. 80 5.2 HOMOGENEOUS LINEAR SUBSTITUTIONS
. 80 5.3 BINARY LINEAR SUBSTITUTIONS
. 84 5.4 GENERALLINEAR
SUBSTITUTIONS . 84 5.5 DECOMPOSED
LINEAR SUBSTITUTIONS . 85 5.6 DECIMATED
ALPHABETS . 88 5.7 LINEAR
SUBSTITUTIONS WITH DECIMALAND BINARY NUMBERS . 89 6 ENCRYPTION
STEPS: TRANSPOSITION . 91 6.1 SIMPLEST
METHODS . 91 6.2 COLUMNAR
TRANSPOSITIONS . 95 6.3 ANAGRAMS
. 98 7
POLYALPHABETIC ENCRYPTION: FAMILIES OF ALPHABETS . 101 7.1
ITERATED SUBSTITUTIONS . 101
7.2 SHIFTED AND ROTATED ALPHABETS . 102
7.3 ROTOR CRYPTO MACHINES . 105
7.4 SHIFTED STANDARD ALPHABETS: VIGEN` ERE AND BEAUFORT .
114 7.5 UNRELATED ALPHABETS
. 118 8 POLYALPHABETIC
ENCRYPTION: KEYS . 126 8.1 EARLY METHODS WITH
PERIODIC KEYS . 126 8.2 *DOUBLE KEY*
. 128 8.3 VERNAM
ENCRYPTION . 129 8.4
QUASI-NONPERIODIC KEYS . 131
8.5 MACHINES THAT GENERATE THEIR OWN KEY SEQUENCES . 132
8.6 OFF-LINE FORMING OF KEY SEQUENCES . 143
8.7 NONPERIODIC KEYS .
144 8.8 INDIVIDUAL, ONE-TIME KEYS .
148 8.9 KEY NEGOTIATION AND KEY MANAGEMENT .
151 9 COMPOSITION OF CLASSES OF METHODS . 155 9.1
GROUP PROPERTY . 155 9.2
SUPERENCRYPTION . 157
9.3 SIMILARITY OF ENCRYPTION METHODS .
159 9.4 SHANNON*S *PASTRY DOUGH MIXING* .
160 9.5 CONFUSION AND DIFFUSION BY ARITHMETICALOPERATIONS .
166 9.6 DES AND IDEA .
170 10 OPEN ENCRYPTION KEY SYSTEMS . 179
10.1 SYMMETRIC AND ASYMMETRIC ENCRYPTION METHODS . 180
10.2 ONE-WAY FUNCTIONS .
182 10.3 RSA METHOD .
189 10.4 CRYPTANALYTIC ATTACK UPON RSA .
191 10.5 SECRECY VERSUS AUTHENTICATION
. 194 10.6 SECURITY OF PUBLIC KEY
SYSTEMS . 196 11 ENCRYPTION SECURITY
. 197 11.1 CRYPTOGRAPHIC FAULTS
. 197 11.2 MAXIMS OF
CRYPTOLOGY . 205 11.3
SHANNON*S YARDSTICKS . 210
11.4 CRYPTOLOGY AND HUMAN RIGHTS . 211
PART II: CRYPTANALYSIS . 217
12 EXHAUSTING COMBINATORIAL COMPLEXITY . 220 12.1
MONOALPHABETIC SIMPLE ENCRYPTIONS . 221 12.2
MONOALPHABETIC POLYGRAPHIC ENCRYPTIONS . 222 12.3
POLYALPHABETIC ENCRYPTIONS . 225
12.4 GENERALREMARKS ON COMBINATORIALCOMPLEXITY . 227
12.5 CRYPTANALYSIS BY EXHAUSTION .
227 12.6 UNICITY DISTANCE
. 229 12.7
PRACTICALEXECUTION OF EXHAUSTION . 231
12.8 MECHANIZING THE EXHAUSTION .
234 13 ANATOMY OF LANGUAGE: PATTERNS . 235
13.1 INVARIANCE OF REPETITION PATTERNS .
235 13.2 EXCLUSION OF ENCRYPTION METHODS
. 237 13.3 PATTERN FINDING
. 238 13.4 FINDING OF
POLYGRAPHIC PATTERNS . 242 13.5 THE
METHOD OF THE PROBABLE WORD . 242 13.6
AUTOMATIC EXHAUSTION OF THE INSTANTIATIONS OF A PATTERN . 247
13.7 PANGRAMS .
249 14 POLYALPHABETIC CASE: PROBABLE WORDS . 251
14.1 NON-COINCIDENCE EXHAUSTION OF PROBABLE WORD POSITION . 251
14.2 BINARY NON-COINCIDENCE EXHAUSTION OF PROBABLE WORD POSITION . 254
14.3 THE DE VIARIS ATTACK .
255 14.4 ZIG-ZAG EXHAUSTION OF PROBABLE WORD POSITION
. 263 14.5 THE METHOD OF ISOMORPHS
. 264 14.6 COVERT
PLAINTEXT-CRYPTOTEXT COMPROMISE . 270 15ANATOMY
OF LANGUAGE: FREQUENCIES . 271 15.1 EXCLUSION OF
ENCRYPTION METHODS . 271 15.2 INVARIANCE
OF PARTITIONS . 272 15.3
INTUITIVE METHOD: FREQUENCY PROFILE . 274
15.4 FREQUENCY ORDERING .
275 15.5 CLIQUES AND MATCHING OF PARTITIONS
. 278 15.6 OPTIMALMATCHING
. 284 15.7 FREQUENCY OF
MULTIGRAMS . 286 15.8 THE
COMBINED METHOD OF FREQUENCY MATCHING . 291 15.9
FREQUENCY MATCHING FOR POLYGRAPHIC SUBSTITUTIONS . 297
15.10 FREE-STYLE METHODS .
298 15.11 UNICITY DISTANCE REVISITED
. 299 16 KAPPA AND CHI
. 301 16.1 DEFINITION AND
INVARIANCE OF KAPPA . 301 16.2 DEFINITION
AND INVARIANCE OF CHI . 304 16.3 THE
KAPPA-CHI THEOREM . 306 16.4 THE
KAPPA-PHI THEOREM . 307 16.5
SYMMETRIC FUNCTIONS OF CHARACTER FREQUENCIES . 309 17
PERIODICITY EXAMINATION . 311 17.1
THE KAPPA TEST OF FRIEDMAN . 312 17.2
KAPPA TEST FOR MULTIGRAMS . 313 17.3
CRYPTANALYSIS BY MACHINES . 314
17.4 KASISKI EXAMINATION .
320 17.5 BUILDING A DEPTH AND PHI TEST OF KULLBACK
. 326 17.6 ESTIMATING THE PERIOD LENGTH
. 329 18 ALIGNMENT OF ACCOMPANYING
ALPHABETS . 331 18.1 MATCHING THE PROFILE
. 331 18.2 ALIGNING AGAINST
KNOWN ALPHABET . 335 18.3 CHI TEST: MUTUAL
ALIGNMENT OF ACCOMPANYING ALPHABETS . 339 18.4 RECONSTRUCTION OF
THE PRIMARY ALPHABET . 344 18.5 KERCKHOFFS*
SYMMETRY OF POSITION . 346 18.6 STRIPPING
OFF SUPERENCRYPTION: DIFFERENCE METHOD . 351 18.7
DECRYPTION OF CODE . 354
18.8 RECONSTRUCTION OF THE PASSWORD .
354 19 COMPROMISES . 356
19.1 KERCKHOFFS* SUPERIMPOSITION .
356 19.2 SUPERIMPOSITION FOR ENCRYPTIONS WITH A KEY GROUP .
358 19.3 IN-PHASE SUPERIMPOSITION OF SUPERENCRYPTED CODE .
373 19.4 CRYPTOTEXT-CRYPTOTEXT COMPROMISES .
376 19.5 A METHOD OF SINKOV
. 381 19.6
CRYPTOTEXT-CRYPTOTEXT COMPROMISE: DOUBLING . 388 19.7
PLAINTEXT-CRYPTOTEXT COMPROMISE: FEEDBACK CYCLE . 402 20
LINEAR BASIS ANALYSIS . 412 20.1
REDUCTION OF LINEAR POLYGRAPHIC SUBSTITUTIONS . 412
20.2 RECONSTRUCTION OF THE KEY .
413 20.3 RECONSTRUCTION OF A LINEAR SHIFT REGISTER
. 414 21 ANAGRAMMING
. 417 21.1 TRANSPOSITION
. 417 21.2 DOUBLE
COLUMNAR TRANSPOSITION . 420 21.3
MULTIPLE ANAGRAMMING . 420 22
CONCLUDING REMARKS . 423 22.1
SUCCESS IN BREAKING . 424
22.2 MODE OF OPERATION OF THE UNAUTHORIZED DECRYPTOR . 429
22.3 ILLUSORY SECURITY .
434 22.4 IMPORTANCE OF CRYPTOLOGY
. 435 APPENDIX: AXIOMATIC
INFORMATION THEORY . 438 BIBLIOGRAPHY
. 448 INDEX
. 451
PHOTO CREDITS . 471 |
any_adam_object | 1 |
author | Bauer, Friedrich L. 1924-2015 |
author_GND | (DE-588)10427459X |
author_facet | Bauer, Friedrich L. 1924-2015 |
author_role | aut |
author_sort | Bauer, Friedrich L. 1924-2015 |
author_variant | f l b fl flb |
building | Verbundindex |
bvnumber | BV012932026 |
classification_rvk | SK 170 ST 276 |
classification_tum | DAT 465f |
ctrlnum | (OCoLC)845371372 (DE-599)BVBBV012932026 |
dewey-full | 652.8 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 652 - Processes of written communication |
dewey-raw | 652.8 |
dewey-search | 652.8 |
dewey-sort | 3652.8 |
dewey-tens | 650 - Management and auxiliary services |
discipline | Informatik Mathematik Wirtschaftswissenschaften |
edition | 2., rev. and extended ed. |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 c 4500</leader><controlfield tag="001">BV012932026</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20130326</controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">000111s2000 gw ad|| |||| 00||| ger d</controlfield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">958012512</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">3540668713</subfield><subfield code="c">Gb. : ca. DM 69.00</subfield><subfield code="9">3-540-66871-3</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)845371372</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV012932026</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">ger</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">gw</subfield><subfield code="c">DE</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-739</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-91G</subfield><subfield code="a">DE-521</subfield><subfield code="a">DE-83</subfield><subfield code="a">DE-11</subfield><subfield code="a">DE-188</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">652.8</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">SK 170</subfield><subfield code="0">(DE-625)143221:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 465f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">28</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Bauer, Friedrich L.</subfield><subfield code="d">1924-2015</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)10427459X</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Decrypted secrets</subfield><subfield code="b">methods and maxims of cryptology ; with 26 tables</subfield><subfield code="c">Friedrich L. Bauer</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">2., rev. and extended ed.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin ; Heidelberg ; New York ; Barcelona ; Hongkong ; London ;</subfield><subfield code="b">Springer</subfield><subfield code="c">2000</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XII, 470 S.</subfield><subfield code="b">Ill., graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Literaturverz. S. 428 - 430</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="780" ind1="0" ind2="0"><subfield code="i">1. Auflage</subfield><subfield code="a">Bauer, Friedrich L.</subfield><subfield code="t">Entzifferte Geheimnisse</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">SWB Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=008805606&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-008805606</subfield></datafield></record></collection> |
id | DE-604.BV012932026 |
illustrated | Illustrated |
indexdate | 2025-02-03T09:01:02Z |
institution | BVB |
isbn | 3540668713 |
language | German |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-008805606 |
oclc_num | 845371372 |
open_access_boolean | |
owner | DE-739 DE-703 DE-20 DE-91G DE-BY-TUM DE-521 DE-83 DE-11 DE-188 |
owner_facet | DE-739 DE-703 DE-20 DE-91G DE-BY-TUM DE-521 DE-83 DE-11 DE-188 |
physical | XII, 470 S. Ill., graph. Darst. |
publishDate | 2000 |
publishDateSearch | 2000 |
publishDateSort | 2000 |
publisher | Springer |
record_format | marc |
spellingShingle | Bauer, Friedrich L. 1924-2015 Decrypted secrets methods and maxims of cryptology ; with 26 tables Kryptologie (DE-588)4033329-2 gnd |
subject_GND | (DE-588)4033329-2 |
title | Decrypted secrets methods and maxims of cryptology ; with 26 tables |
title_auth | Decrypted secrets methods and maxims of cryptology ; with 26 tables |
title_exact_search | Decrypted secrets methods and maxims of cryptology ; with 26 tables |
title_full | Decrypted secrets methods and maxims of cryptology ; with 26 tables Friedrich L. Bauer |
title_fullStr | Decrypted secrets methods and maxims of cryptology ; with 26 tables Friedrich L. Bauer |
title_full_unstemmed | Decrypted secrets methods and maxims of cryptology ; with 26 tables Friedrich L. Bauer |
title_old | Bauer, Friedrich L. Entzifferte Geheimnisse |
title_short | Decrypted secrets |
title_sort | decrypted secrets methods and maxims of cryptology with 26 tables |
title_sub | methods and maxims of cryptology ; with 26 tables |
topic | Kryptologie (DE-588)4033329-2 gnd |
topic_facet | Kryptologie |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=008805606&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT bauerfriedrichl decryptedsecretsmethodsandmaximsofcryptologywith26tables |
Inhaltsverzeichnis
Paper/Kapitel scannen lassen
Paper/Kapitel scannen lassen
Teilbibliothek Mathematik & Informatik
Signatur: |
0102 DAT 465f 2001 A 6951 Lageplan |
---|---|
Exemplar 1 | Ausleihbar Am Standort |