Princeton University Press
The Mathematics of Secrets
-
and
About this book
Explaining the mathematics of cryptography
The Mathematics of Secrets takes readers on a fascinating tour of the mathematics behind cryptography—the science of sending secret messages. Using a wide range of historical anecdotes and real-world examples, Joshua Holden shows how mathematical principles underpin the ways that different codes and ciphers work. He focuses on both code making and code breaking and discusses most of the ancient and modern ciphers that are currently known. He begins by looking at substitution ciphers, and then discusses how to introduce flexibility and additional notation. Holden goes on to explore polyalphabetic substitution ciphers, transposition ciphers, connections between ciphers and computer encryption, stream ciphers, public-key ciphers, and ciphers involving exponentiation. He concludes by looking at the future of ciphers and where cryptography might be headed. The Mathematics of Secrets reveals the mathematics working stealthily in the science of coded messages.
A blog describing new developments and historical discoveries in cryptography related to the material in this book is accessible at http://press.princeton.edu/titles/10826.html.
Author / Editor information
Reviews
"Complete in surveying cryptography. . . . This is a marvelous way of illustrating the use of simple mathematics in an important application that has triggered the wit of the designers and the ingenuity of the attackers since antiquity." —Adhemar Bultheel, European Mathematical Society
"The best book I have seen on this subject." —Phil Dyke, Leonardo Reviews
"This is a fascinating tour of the mathematics behind cryptography, showing how its principles underpin the ways that different codes and ciphers operate. . . . While it’s all about maths, the book is accessible—basic high school algebra is all that’s needed to understand and enjoy it." —Cosmos Magazine
Topics
-
Download PDFPublicly Available
Frontmatter
i -
Download PDFPublicly Available
CONTENTS
vii -
Download PDFPublicly Available
PREFACE
xi -
Download PDFPublicly Available
ACKNOWLEDGMENTS
xiii -
Download PDFRequires Authentication UnlicensedLicensed
1. Introduction to Ciphers and Substitution
1 -
Download PDFRequires Authentication UnlicensedLicensed
2. Polyalphabetic Substitution Ciphers
29 -
Download PDFRequires Authentication UnlicensedLicensed
3. Transposition Ciphers
75 -
Download PDFRequires Authentication UnlicensedLicensed
4. Ciphers and Computers
109 -
Download PDFRequires Authentication UnlicensedLicensed
5. Stream Ciphers
145 -
Download PDFRequires Authentication UnlicensedLicensed
6. Ciphers Involving Exponentiation
182 -
Download PDFRequires Authentication UnlicensedLicensed
7. Public-Key Ciphers
201 -
Download PDFRequires Authentication UnlicensedLicensed
8. Other Public-Key Systems
241 -
Download PDFRequires Authentication UnlicensedLicensed
9. The Future of Cryptography
276 -
Download PDFRequires Authentication UnlicensedLicensed
LIST OF SYMBOLS
303 -
Download PDFRequires Authentication UnlicensedLicensed
NOTES
305 -
Download PDFRequires Authentication UnlicensedLicensed
SUGGESTIONS FOR FURTHER READING
345 -
Download PDFRequires Authentication UnlicensedLicensed
BIBLIOGRAPHY
349 -
Download PDFRequires Authentication UnlicensedLicensed
INDEX
367