ORGANIZATION OF THE BOOK
There are three types of chapters in this book:
- Those that develop technical details;
- Those that describe a cryptosystem and possibly indicate method(s) of analysis; and
- Those that describe a cryptosystem, indicate method(s) of analysis, and provide problems to test the students understanding; these are signalled with .
Classical Cryptography
- 1. Aperitifs
- 2. Columnar Transposition
- 3. Monoalphabetic Substitution
(a) Cribbing and Scoring a Monoalphabetic Substitution
(b) Hill Substitution
(c) The Hidden Markov Model
- 4. Polyalphabetic Substitution
- 5. Statistical Tests
World War II Cryptography
- 6. Emergence of the Cipher Machine
(a) The German Enigma Machine
(b) The Lorenz Schlusselzusatz
- 7. The Japanese Cipher Machines
(a) The Japanese RED Machine
(b) The Japanese PURPLE Machine
Modern Cryptography
- 8. Stream Ciphers
- 9. The NIST Encryption Standards
(a)
Get Computer Security and Cryptography now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.