Springer.Decrypted.Secrets.4th.Edition.Nov.2006.pdf
(
17597 KB
)
Pobierz
16064717 UNPDF
Decrypted Secrets
Friedrich L. Bauer
Decrypted Secrets
Methods and Maxims
of Cryptology
Fourth, Revised and Extended Edition
With 191 Figures, 29 Tables,
and 16 Color Plates
123
Dr. rer. nat. Dr. ès sc. h.c. Dr. rer. nat. h.c. mult. Friedrich L. Bauer
Professor Emeritus of Mathematics and Computer Science
Munich Institute of Technology
Department of Computer Science
Boltzmannstr. 3
85748 Garching, Germany
ACM Computing Classification (1998): E.3, D.4.6, K.6.5, E.4
Mathematics Subject Classification (1991): 94A60, 68P25
Library of Congress Control Number: 2006933429
ISBN-10 3-540-24502-2 Springer Berlin Heidelberg New York
ISBN-13 978-3-540-24502-5 Springer Berlin Heidelberg New York
ISBN 3-540-42674-4 3rd ed. Springer Berlin Heidelberg New York
This work is subject to copyright. All rights are reserved, whether the whole or part of the material
is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broad-
casting, reproduction on microfilm or in any other way, and storage in data banks. Duplication of
this publication or parts thereof is permitted only under the provisions of the German Copyright Law
of September 9, 1965, in its current version, and permission for use must always be obtained from
Springer. Violations are liable for prosecution under the German Copyright Law.
Springer is a part of Springer Science+Business Media
springer.com
© Springer-Verlag Berlin Heidelberg 1997, 2000, 2002, 2007
The use of general descriptive names, registered names, trademarks, etc. in this publication does not
imply, even in the absence of a specific statement, that such names are exempt from the relevant
protective laws and regulations and therefore free for general use.
Cover Design: Design & Concept E. Smejkal, Heidelberg
Color Photos: Reinhard Krause, Deutsches MuseumMünchen
Typesetting: By the author in T
E
X
Production: LE-T
E
X, Jelonek, Schmidt & Vöckler GbR, Leipzig
Printed on acid-free paper 33/3100 YL 5 4 3210
Preface
Towards the end of the 1960s, under the influence of the rapid development
of microelectronics, electromechanical cryptological machines began to be
replaced by electronic data encryption devices using large-scale integrated
circuits. This promised more secure encryption at lower prices. Then, in
1976, Di
e and Hellman opened up the new cryptological field of public-key
systems. Cryptography, hitherto cloaked in obscurity, was emerging into the
public domain. Additionally, ENIGMA revelations awoke the public interest.
Computer science was a flourishing new field, too, and computer scientists
became interested in several aspects of cryptology. But many of them were
not well enough informed about the centuries-long history of cryptology and
the high level it had attained. I saw some people starting to reinvent the
wheel, and others who had an incredibly naive belief in safe encryption,
and I became worried about the commercial and scientific development of
professional cryptology among computer scientists and about the unstable
situation with respect to o
cial security services.
This prompted me to offer lectures on this subject at the Munich Institute of
Technology. The first series of lectures in the winter term 1977/78, backed
by the comprehensive and reliable book
The Codebreakers
(1967) by David
Kahn, was held under the code name ‘Special Problems of Information
Theory’ and therefore attracted neither too many students nor too many
suspicious people from outside the university.
Next time, in the summer term of 1981, my lectures on the subject were
announced under the open title ‘Cryptology’. This was seemingly the first
publicly announced lecture series under this title at a German, if not indeed
a Continental European, university.
The series of lectures was repeated a few times, and in 1986/87 lecture notes
were printed which finally developed into Part I of this book. Active interest
on the side of the students led to a seminar on cryptanalytic methods in the
summer term of 1988, from which Part II of the present book originated.
The 1993 first edition (in German) of my book
Kryptologie
, although written
mainly for computer science students, found lively interest also outside the
field. It was reviewed favorably by some leading science journalists, and
the publisher followed the study book edition with a 1995 hardcover edition
under the title
Entzifferte Geheimnisse
[Decrypted Secrets], which gave me
the opportunity to round out some subjects. Reviews in American journals
recommended also an English version, which led in 1997 to the present book.
It has become customary among cryptologists to explain how they became
acquainted with the field. In my case, this was independent of the Second
World War. In fact, I was never a member of any o
cial service—and I
Plik z chomika:
KASJAR
Inne pliki z tego folderu:
Polyglot naval technical dictionary (1863); English- French- Russian.pdf
(72334 KB)
Timesaver - Newspaper Articles to get Teenagers Talking(1).pdf
(3479 KB)
Penguin Readers - Crime Story - Level 4.pdf
(5544 KB)
Penguin Readers Answer Key.pdf
(58 KB)
Penguin Readers Factsheets.pdf
(73 KB)
Inne foldery tego chomika:
AUDIOBOOKS
FITNESS
ITALIAN
KONCERTY
Moja półka
Zgłoś jeśli
naruszono regulamin