Codes : The Guide to Secrecy From Ancient to Modern Times book cover
1st Edition

The Guide to Secrecy From Ancient to Modern Times

ISBN 9781584884705
Published May 24, 2005 by Chapman and Hall/CRC
700 Pages

SAVE ~ $40.00
was $200.00
USD $160.00

Prices & shipping based on shipping country


Book Description

From the Rosetta Stone to public-key cryptography, the art and science of cryptology has been used to unlock the vivid history of ancient cultures, to turn the tide of warfare, and to thwart potential hackers from attacking computer systems. Codes: The Guide to Secrecy from Ancient to Modern Times explores the depth and breadth of the field, remaining accessible to the uninitiated while retaining enough rigor for the seasoned cryptologist.

The book begins by tracing the development of cryptology from that of an arcane practice used, for example, to conceal alchemic recipes, to the modern scientific method that is studied and employed today. The remainder of the book explores the modern aspects and applications of cryptography, covering symmetric- and public-key cryptography, cryptographic protocols, key management, message authentication, e-mail and Internet security, and advanced applications such as wireless security, smart cards, biometrics, and quantum cryptography. The author also includes non-cryptographic security issues and a chapter devoted to information theory and coding. Nearly 200 diagrams, examples, figures, and tables along with abundant references and exercises complement the discussion.

Written by leading authority and best-selling author on the subject Richard A. Mollin, Codes: The Guide to Secrecy from Ancient to Modern Times is the essential reference for anyone interested in this exciting and fascinating field, from novice to veteran practitioner.

Table of Contents

From the Riddles of Ancient Egypt to Cryptography in the Renaissance-3,500 Years in the Making. From Sixteenth-Century Cryptography to the New Millennium-The Last 500 Years. Symmetric-Key Cryptography. Public-Key Cryptography. Cryptographic Protocols. Key Management. Message Authentication. Electronic Mail and Internet Security. Applications and the Future. Non-Cryptographic Security Issues. Information Theory and Coding. Appendix A: Mathematical Facts. Appendix B: Pseudo-Random Number Generation. Appendix C: Factoring Large Integers. Appendix D: Technical and Advanced Details. Appendix E: Probability Theory. Appendix F: Recognizing Primes. Appendix G: Exercises. Bibliography. List of Symbols. Index.

View More



Mollin, Richard A.