589290
9780960156467
Out of Stock
The item you're looking for is currently unavailable.
This is the second edition of a tutorial book on designing crypto systems to safeguard private information. Those who would function as cryptographers & use codes & ciphers to meet their information privacy needs will find this manual of practical usefulness. For example, a unique quinary cipher is described. For all practical purposes, this cipher is unbreakable by cryptoanalysis. With this cipher, correspondents compose their messages in natural context & format. This utilitarian cipher can be implemented as a paper-&-pencil system, or it can be automated. THE FIRST EDITION HAS BEEN REVISED & REFORMATTED. In particular, the classification of crypto squares used for polysubstitution ciphers has been refined to better distinguish between bigraphic & triadic type squares. All articles are lucidly written, abundantly illustrated, adequately referenced, thoroughly indexed, & logically grouped: CODES: Telecommunications, Error Control, Compression & Compaction, Numeration & Notation, Character Sets. SUBSTITUTION CIPHERS: Crypto Squares; Caesar Squares; Vigenere, Beaufort, Variant; Squares, Slides, Disks; Small's Disk; Double Substitution; Exclusive-OR & SIGTOT; Permutations & Cycles; Fractionated Morse; Polybius & Nihilist; Checkerway; Hocheck. TRANSPOSITION CIPHERS: DES Faux Pas, Linear Permutations, Skipping Tramp, Zipper, Railfence & Redefence, Columnar Double Transposition, Swagmen, Penney Tramp, Dissociative Transposition. Prepayment on all orders required. Bookstore discount of 40%.Pierce, Clayton C. is the author of 'Cryptoprivacy A Cryptographer's Manual' with ISBN 9780960156467 and ISBN 0960156461.
[read more]