ORGANIZATION OF THE BOOK

There are three types of chapters in this book:

  1. Those that develop technical details;
  2. Those that describe a cryptosystem and possibly indicate method(s) of analysis; and
  3. Those that describe a cryptosystem, indicate method(s) of analysis, and provide problems to test the students understanding; these are signalled with image.

Classical Cryptography

  • 1. Aperitifs
  • 2. Columnar Transposition image
  • 3. Monoalphabetic Substitution

    (a) Cribbing and Scoring a Monoalphabetic Substitution image

    (b) Hill Substitution image

    (c) The Hidden Markov Model

  • 4. Polyalphabetic Substitution image
  • 5. Statistical Tests image

World War II Cryptography

  • 6. Emergence of the Cipher Machine

    (a) The German Enigma Machine

    (b) The Lorenz Schlusselzusatz

  • 7. The Japanese Cipher Machines

    (a) The Japanese RED Machine

    (b) The Japanese PURPLE Machine

Modern Cryptography

  • 8. Stream Ciphers
  • 9. The NIST Encryption Standards

    (a)

Get Computer Security and Cryptography now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.