Craig P. Bauer, York College of Pennsylvania and National Security Agency, Center for Cryptologic History, 2011-2012 Scholar-in-Residence
xxv, 594 pages :
illustrations ;
24 cm
Discrete mathematics and its applications ;
76
Includes bibliographical references and index
Ancient roots -- Monalphabetic substitution ciphers, or MASCs: disguises for messages -- Simple progression to an unbreakable cipher -- Transposition ciphers -- Shakespeare, Jefferson, and JFK -- World War I and Herbert O. Yardley -- Matrix encryption -- World War II: the enigma of Germany -- Cryptologic war against Japan -- Claude Shannon -- National Security Agency -- Data Encryption Standard -- Birth of public key cryptography -- Attacking RSA -- Primality testing and complexity theory -- Authenticity -- Pretty good privacy -- Stream ciphers -- Suite B all-stars -- Possible futures
0
"Codes are a part of everyday life, from the ubiquitous Universal Price Code (UPC) to postal zip codes. They need not be intended for secrecy. They generally use groups of letters (sometimes pronounceable code words) or numbers to represent other words or phrases. There is typically no mathematical rule to pair an item with its representation in code. A few more examples will serve to illustrate the range of codes"--