Cryptological Mathematics

Author: Robert Lewand

Publisher: MAA

ISBN: 9780883857199

Category: Mathematics

Page: 199

View: 8884

This is an introduction to the mathematics involved in the intriguing field of cryptology, the science of writing and reading secret messages which are designed to be read only by their intended recipients. It is written at an elementary level, suitable for beginning undergraduates, with careful explanations of all the concepts used. The basic branches of mathematics required, including number theory, abstract algebra and probability, are used to show how to encipher and decipher messages, and why this works, giving a practical as well as theoretical basis to the subject. Challenging computer programming exercises are also included. The book is written in an engaging style which will appeal to all, and also includes historical background on some of the founders of the subject. It will be of interest both to students wishing to learn cryptology per se, and also to those searching for practical applications of seemingly abstract mathematics.

Elementary Cryptanalysis

Author: Abraham Sinkov,Todd Feil

Publisher: MAA

ISBN: 9780883856475

Category: Computers

Page: 212

View: 7298

An introduction to the basic mathematical techniques involved in cryptanalysis.

Kryptografie verständlich

Ein Lehrbuch für Studierende und Anwender

Author: Christof Paar,Jan Pelzl

Publisher: Springer-Verlag

ISBN: 3662492970

Category: Computers

Page: 416

View: 2293

Das Buch gibt eine umfassende Einführung in moderne angewandte Kryptografie. Es behandelt nahezu alle kryptografischen Verfahren mit praktischer Relevanz. Es werden symmetrische Verfahren (DES, AES, PRESENT, Stromchiffren), asymmetrische Verfahren (RSA, Diffie-Hellmann, elliptische Kurven) sowie digitale Signaturen, Hash-Funktionen, Message Authentication Codes sowie Schlüsselaustauschprotokolle vorgestellt. Für alle Krypto-Verfahren werden aktuelle Sicherheitseinschätzungen und Implementierungseigenschaften beschrieben.

Eine mathematische Mystery-Tour durch unser Leben

Author: Marcus du Sautoy

Publisher: C.H.Beck

ISBN: 3406621937

Category: Mathematics

Page: 318

View: 4263

Lesen, lösen und Millionär (oder Mathe-Ass) werden: Das erste Mathe-Buch, das seinen Leser zum Millionär machen kann. Vorausgesetzt, er knackt eines der fünf großen Rätsel, die ihm auf der mathematischen Mystery-Tour dieses Buches begegnen. Für ihre Lösung hat das Clay Mathematics Institute in Cambridge, Massachusetts, jeweils ein Preisgeld in Höhe von 1 Million Dollar ausgesetzt. Spektakulär beginnt die mathematische Mystery Tour des Oxforder Mathe-Genies Marcus du Sautoy mit dem Rätsel der nie endenden Primzahlen. Warum wählte David Beckham das Trikot mit der Nummer 23? Und warum hat eine amerikanische Heuschreckenart eine Vorliebe für die Primzahl 17? Es folgen «das Geheimnis der Glückssträhne», «die Sache mit dem nicht zu entschlüsselnden Code» und zwei weitere mysteriöse Fälle der Mathematik. Der Leser erfährt, wie er bei Monopoly gewinnen kann und im Kasino seine Chancen verbessert. Doch damit nicht genug: Das Buch bietet auch Mathematik zum Anfassen und Selbermachen. Auf einer extra zu dem Buch entworfenen Website finden sich Bastelbogen, Spiele, Filme und Experimente. Über das Buch verstreute QR-Codes bieten Gelegenheiten für spontane Ausflüge ins World Wide Web zu den besten Mathe-Seiten. In allem, was wir tun, steckt Mathematik. Du Sautoy zeigt, warum und wie. Und macht seine Leser auf jeden Fall reicher, auch wenn sie das Geheimnis der nie endenden Primzahlen schlussendlich doch nicht lüften sollten.

Enigma

Roman

Author: Robert Harris

Publisher: Heyne Verlag

ISBN: 3641108306

Category: Fiction

Page: 384

View: 7330

England im März 1943. In Bletchley Park wird fieberhaft daran gearbeitet, die Wunder-Chiffrier-Maschine Enigma, die den Funkverkehr der deutschen U-Boote verschlüsselt, zu knacken. Eine nahezu unlösbare Aufgabe für den Secret Intelligence Service, der seine letzten Hoffnungen in den genialen Kryptoanalytiker Tom Jericho setzt. Es beginnt ein Wettlauf mit der Zeit, der plötzlich sogar in den eigenen Reihen sabotiert zu werden scheint.

Group Theory

Author: Helmut Wielandt

Publisher: Walter de Gruyter

ISBN: 3110863383

Category: Mathematics

Page: 821

View: 5193


Die Grenzen des Denkens

wie wir sie mit System erkennen und überwinden können

Author: Donella H. Meadows,Diana Wright

Publisher: N.A

ISBN: 9783865811998

Category:

Page: 238

View: 513

Anschauliche und leicht verständliche Einführung in das Gebiet komplexer Systeme, die es überall in Wirtschaft und Gesellschaft sowie in den Naturwissenschaften gibt.

GAMMA

Eulers Konstante, Primzahlstrände und die Riemannsche Vermutung

Author: Julian Havil

Publisher: Springer-Verlag

ISBN: 3540484965

Category: Mathematics

Page: 302

View: 7283

Jeder kennt p = 3,14159..., viele kennen e = 2,71828..., einige i. Und dann? Die "viertwichtigste" Konstante ist die Eulersche Zahl g = 0,5772156... - benannt nach dem genialen Leonhard Euler (1707-1783). Bis heute ist unbekannt, ob g eine rationale Zahl ist. Das Buch lotet die "obskure" Konstante aus. Die Reise beginnt mit Logarithmen und der harmonischen Reihe. Es folgen Zeta-Funktionen und Eulers wunderbare Identität, Bernoulli-Zahlen, Madelungsche Konstanten, Fettfinger in Wörterbüchern, elende mathematische Würmer und Jeeps in der Wüste. Besser kann man nicht über Mathematik schreiben. Was Julian Havil dazu zu sagen hat, ist spektakulär.

Mathematical Ciphers

From Caesar to RSA

Author: Anne L. Young

Publisher: American Mathematical Soc.

ISBN: 0821837303

Category: Mathematics

Page: 159

View: 4300

A cipher is a scheme for creating coded messages for the secure exchange of information. Throughout history, many different coding schemes have been devised. One of the oldest and simplest mathematical systems was used by Julius Caesar. This is where Mathematical Ciphers begins. Building on that simple system, Young moves on to more complicated schemes, ultimately ending with the RSA cipher, which is used to provide security for the Internet. This book is structured differently from most mathematics texts. It does not begin with a mathematical topic, but rather with a cipher. The mathematics is developed as it is needed; the applications motivate the mathematics. As is typical in mathematics textbooks, most chapters end with exercises. Many of these problems are similar to solved examples and are designed to assist the reader in mastering the basic material. A few of the exercises are one-of-a-kind, intended to challenge the interested reader. Implementing encryption schemes is considerably easier with the use of the computer. For all the ciphers introduced in this book, JavaScript programs are available from the Web. In addition to developing various encryption schemes, this book also introduces the reader to number theory. Here, the study of integers and their properties is placed in the exciting and modern context of cryptology. Mathematical Ciphers can be used as a textbook for an introductory course in mathematics for all majors. The only prerequisite is high school mathematics.

The Unreasonable Effectiveness of Number Theory

Author: Stefan Andrus Burr,American Mathematical Society. Short Course, (,George E. Andrews

Publisher: American Mathematical Soc.

ISBN: 9780821855010

Category: Mathematics

Page: 125

View: 8076

This book is based on the AMS Short Course, The Unreasonable Effectiveness of Number Theory, held in Orono, Maine, in August 1991. This Short Course provided some views into the great breadth of applications of number theory outside cryptology and highlighted the power and applicability of number-theoretic ideas. Because number theory is one of the most accessible areas of mathematics, this book will appeal to a general mathematical audience as well as to researchers in other areas of science and engineering who wish to learn how number theory is being applied outside of mathematics. All of the chapters are written by leading specialists in number theory and provides excellent introduction to various applications.

Cryptology and Computational Number Theory

Author: Carl Pomerance,Shafi Goldwasser

Publisher: American Mathematical Soc.

ISBN: 9780821801550

Category: Computers

Page: 171

View: 7966

In the past dozen or so years, cryptology and computational number theory have become increasingly intertwined. Because the primary cryptologic application of number theory is the apparent intractability of certain computations, these two fields could part in the future and again go their separate ways. But for now, their union is continuing to bring ferment and rapid change in both subjects. This book contains the proceedings of an AMS Short Course in Cryptology and Computational Number Theory, held in August 1989 during the Joint Mathematics Meetings in Boulder, Colorado. These eight papers by six of the top experts in the field will provide readers with a thorough introduction to some of the principal advances in cryptology and computational number theory over the past fifteen years. In addition to an extensive introductory article, the book contains articles on primality testing, discrete logarithms, integer factoring, knapsack cryptosystems, pseudorandom number generators, the theoretical underpinnings of cryptology, and other number theory-based cryptosystems. Requiring only background in elementary number theory, this book is aimed at nonexperts, including graduate students and advanced undergraduates in mathematics and computer science.

Cryptology

Author: Albrecht Beutelspacher

Publisher: MAA

ISBN: 9780883855041

Category: Business & Economics

Page: 156

View: 3501

The art & science of secret writing. Provides ideal methods to solve the problems of transmitting information secretly & securely.

Secret History

The Story of Cryptology

Author: Craig P. Bauer

Publisher: CRC Press

ISBN: 1466561874

Category: Computers

Page: 620

View: 997

Winner of an Outstanding Academic Title Award from CHOICE Magazine Most available cryptology books primarily focus on either mathematics or history. Breaking this mold, Secret History: The Story of Cryptology gives a thorough yet accessible treatment of both the mathematics and history of cryptology. Requiring minimal mathematical prerequisites, the book presents the mathematics in sufficient detail and weaves the history throughout the chapters. In addition to the fascinating historical and political sides of cryptology, the author—a former Scholar-in-Residence at the U.S. National Security Agency (NSA) Center for Cryptologic History—includes interesting instances of codes and ciphers in crime, literature, music, and art. Following a mainly chronological development of concepts, the book focuses on classical cryptology in the first part. It covers Greek and Viking cryptography, the Vigenère cipher, the one-time pad, transposition ciphers, Jefferson’s cipher wheel, the Playfair cipher, ADFGX, matrix encryption, World War II cipher systems (including a detailed examination of Enigma), and many other classical methods introduced before World War II. The second part of the book examines modern cryptology. The author looks at the work of Claude Shannon and the origin and current status of the NSA, including some of its Suite B algorithms such as elliptic curve cryptography and the Advanced Encryption Standard. He also details the controversy that surrounded the Data Encryption Standard and the early years of public key cryptography. The book not only provides the how-to of the Diffie-Hellman key exchange and RSA algorithm, but also covers many attacks on the latter. Additionally, it discusses Elgamal, digital signatures, PGP, and stream ciphers and explores future directions such as quantum cryptography and DNA computing. With numerous real-world examples and extensive references, this book skillfully balances the historical aspects of cryptology with its mathematical details. It provides readers with a sound foundation in this dynamic field.

Cryptonomicon

Roman

Author: Neal Stephenson

Publisher: Manhattan

ISBN: 3894806915

Category: Fiction

Page: 1184

View: 1069

Während des Zweiten Weltkriegs legt Japan mit Unterstützung von Nazi-Deutschland eine gigantische Goldreserve an. Die Alliierten werden zwar auf verschlüsselte Mitteilungen aufmerksam, aber selbst ihren besten Kryptographen gelingt es nicht, den Code zu knacken. Mehr als ein halbes Jahrhundert später stößt eine Gruppe junger amerikanischer Unternehmer im Wrack eines U-Boots auf die Anzeichen einer riesigen Verschwörung und auf das Rätsel um einen verborgenen Schatz.