1. Trang chủ
  2. » Công Nghệ Thông Tin

decrypted secrets - methods & maxims of cryptology, 4th, revised & extended ed.

555 271 0

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Định dạng
Số trang 555
Dung lượng 17,19 MB

Nội dung

[...]... 501 525 List of Color Plates4 Plate A The disk of Phaistos Plate B Brass cipher disks Plate C The ‘Cryptograph’ of Wheatstone Plate D The US Army cylinder device M-94 Plate E The US strip device M-138-T4 Plate F The cipher machine of Kryha Plate G The Hagelin ‘Cryptographer’ C-36 Plate H The US Army M-209, Hagelin licensed Plate I The cipher machine ENIGMA with four rotors Plate K Rotors of the ENIGMA... compositions, either in the notes of a musical theme (a famous example2 is B A C H), or indirectly by means of a numerical alphabet: if the i-th note of the scale occurs k times, then the k-th letter of the alphabet is to be entered in the i-th position Johann Sebastian Bach was fond of this cipher; in the theme of the organ chorale ‘Vor deinen Thron’, written in 1750 in the key of G major, g occurs twice... Prussia, was le loup-cervier , while une peau de petit-gris meant 3000 mercenaries in the pay of the British It is to be hoped that the chevalier was more subtle in the use of his allegorical code than the German spies, in the guise of Dutch merchants, who—as told by 1.4 Cues 17 Fig 11 The first entries of Trithemius’ Ave Maria cipher Major-General Kirke—ordered cigars in batches of thousands from Plymouth... not kill directly—but it may cover up crimes The responsibility of the government and the scientists in view of the nimbleness of cryptological activities is reflected in the Computer Security Act of the US Congress of 1987 (Public Law 10 0-2 35) It established a Computer System Security and Privacy Advisory Board (CSSPAB), composed of members of the federal government and the computer industry While a latent... 272 Zig-Zag Exhaustion of Probable Word Position 280 The Method of Isomorphs 281 A clever brute force method: EINSing .287 Covert Plaintext-Cryptotext Compromise 288 Anatomy of Language: Frequencies 290 Exclusion of Encryption Methods ... occult, visiting Martians, and terrorism, cryptology shows a rich tapestry, interwoven with tales from one of the oldest of all branches of cryptology, the exchange of messages between lovers The letter-writer’s guides that appeared around 1750 soon offered cryptographic help, like De geheime brieven-schryver, angetoond met verscheydene voorbeelden by a certain G v K , Amsterdam, 1780, and Dem Magiske... message “panel at east end of chapel slides”—and found his way out of captivity (Fig 13) There is a story of a soldier in the US Army who arranged with his parents that he would tell them the name of the place he had been posted to by means of the initial letter of the first word (after the greeting) in consecutive letters home—from a cryptographic and steganographic point of view not such a bad idea... probably the most versatile French cryptologist of modern times, author of the book Les chiffres secrets d´voil´s (1901) e e Sir Charles Wheatstone (1802–1875), English physicist, professor at King’s College, London, best known for Wheatstone’s bridge (not invented by him) Charles Babbage (1791–1871), Lucasian Professor of Mathematics at the University of Cambridge, best known for his Difference Engine... Synopsis Among the modern methods it is worth mentioning high-speed telegraphy, the spurt transmission of stored Morse code sequences at 20 characters per second, and frequency subband permutation (‘scrambling’) in the case of telephony, today widely used commercially In the Second World War, the Forschungsstelle (research post) of the Deutsche Reichspost (headed by Postrat Dipl.-Ing Kurt E Vetterlein)... microdots in the gutters of bound copies of magazines The microdots used by the Germans in the Second World War were of just the right size to be used as a full stop (period) in a typewritten document 1.2 Semagrams Linguistic steganography recognizes two methods: a secret message is either made to appear innocent in an open code, or it is expressed in the form of visible (though often minute) graphical

Ngày đăng: 25/03/2014, 11:13

TỪ KHÓA LIÊN QUAN