Codes: The Guide to Secrecy From Ancient to Modern Times (Discrete Mathematics and Its Applications)
Richard A. Mollin
Format: PDF / Kindle (mobi) / ePub
From the Rosetta Stone to public-key cryptography, the art and science of cryptology has been used to unlock the vivid history of ancient cultures, to turn the tide of warfare, and to thwart potential hackers from attacking computer systems. Codes: The Guide to Secrecy from Ancient to Modern Times explores the depth and breadth of the field, remaining accessible to the uninitiated while retaining enough rigor for the seasoned cryptologist.
The book begins by tracing the development of cryptology from that of an arcane practice used, for example, to conceal alchemic recipes, to the modern scientific method that is studied and employed today. The remainder of the book explores the modern aspects and applications of cryptography, covering symmetric- and public-key cryptography, cryptographic protocols, key management, message authentication, e-mail and Internet security, and advanced applications such as wireless security, smart cards, biometrics, and quantum cryptography. The author also includes non-cryptographic security issues and a chapter devoted to information theory and coding. Nearly 200 diagrams, examples, figures, and tables along with abundant references and exercises complement the discussion.
Written by leading authority and best-selling author on the subject Richard A. Mollin, Codes: The Guide to Secrecy from Ancient to Modern Times is the essential reference for anyone interested in this exciting and fascinating field, from novice to veteran practitioner.
second millennium BC in Syria and Mesopotamia) roughly around the late eleventh century BC. The setting is the great banquet given by Belshazzar, the Chaldean king, for a thousand of his lords. As it says in Daniel 5:5–5:6, “Suddenly, opposite the lampstand, the ﬁngers of a human hand appeared, writing on the plaster of the wall in the king’s palace. When the king saw the wrist and hand that wrote, his face blanched; his thoughts terriﬁed him, his hip joints shook, and his knees knocked.” The
that the word “rossignol” has entered the vocabulary of French slang to mean “a tool that picks locks”. Rossignol also was a prime mover in the establishment of the Cabinet Noir, or Black Chamber — a headquarters for cryptanalysis and intelligence gathering — which began France’s ﬁrm grip on cryptography, reading cryptograms of foreign countries throughout the seventeenth century. 2.1. Three Post-Renaissance Centuries 63 John Wallis and the Black Chambers The origins of the black chambers in
Courtesy of the National Cryptologic Museum of the National Security Agency. See http://www.nsa.gov/gallery/photo/photo00041.jpg. 74 2.3 2. From Sixteenth-Century Cryptography Nineteenth-Century Cryptography Thought can with diﬃculty visit the intricate and winding chambers which it inhabits. Percy Bysshe Shelly (1792–1822) English poet, husband of Mary Shelly — from Speculations on Metaphysics (1815) In the nineteenth century, one man may be said to have been the visionary pioneer when it
the fray, they too adopted trench codes. Moreover, they had a brilliant cryptologist at their disposal, named Parker Hitt, who had worked as a Signal Corps instructor. In 1915, Hitt published an inﬂuential booklet on cryptology called Manual for the Solution of Military Ciphers. This was a practical manifestation of how cryptology should be used in the ﬁeld. Also, in 1913, Hitt rediscovered the wheel cipher in strip form, and this led to the Navy strip cipher M-138-A (see page 66 for comparison
Z/nZ, and we assume that gcd(m, n) = 1. 1. Alice obtains Bob’s public key (n, e) from the database. 2. She enciphers m by computing c ≡ me (mod n) using the repeated squaring method given on page 171, and sends c ∈ C to Bob. deciphering stage: Once Bob receives c, he uses d to compute m ≡ cd (mod n). Example 4.5 Suppose that Bob chooses (p, q) = (9221, 7489). Then n = 69056069 and φ(n) = 69039360. If Bob selects e = 7, then solving 1 = 7d+φ(n)x (for x = −4), he gets d = 39451063, his private key.