Book contents
- Frontmatter
- Contents
- Preface to the First Edition
- Preface to the Second Edition
- 1 Monoalphabetic Ciphers Using Additive Alphabets
- 2 General Monoalphabetic Substitution
- 3 Polyalphabetic Substitution
- 4 Polygraphic Systems
- 5 Transposition
- 6 RSA Encryption
- 7 Perfect Security—One-time Pads
- Appendix A Tables
- Appendix B ASCII Codes
- Appendix C Binary Numbers
- Solutions to Exercises
- Further Readings
- Index
- About the Authors
Preface to the First Edition
- Frontmatter
- Contents
- Preface to the First Edition
- Preface to the Second Edition
- 1 Monoalphabetic Ciphers Using Additive Alphabets
- 2 General Monoalphabetic Substitution
- 3 Polyalphabetic Substitution
- 4 Polygraphic Systems
- 5 Transposition
- 6 RSA Encryption
- 7 Perfect Security—One-time Pads
- Appendix A Tables
- Appendix B ASCII Codes
- Appendix C Binary Numbers
- Solutions to Exercises
- Further Readings
- Index
- About the Authors
Summary
To a very great extent, mankind owes its progress to the ability to communicate, and a key aspect in this ability is the capability of communicating in writing. From the earliest days of writing, there have been occasions when individuals have desired to limit their information to a restricted group of people. They had secrets they wanted to keep. To this end, such individuals developed ideas by means of which their communications could be made unintelligible to those who had not been provided with the special information needed for decipherment. The general techniques used to accomplish such a purpose, i.e. the hiding of the meaning of messages, constitute the study known as cryptography.
Before the development of postal systems and electrical transmission of information, the usual manner of sending a communication was by private messenger. Even under these circumstances the use of the concealment tactics of cryptography was often advisable because of the possibility that the messenger might be apprehended or prove disloyal. In recent times a message transmitted by radio could be copied by anyone having appropriate equipment and listening to the right frequency at the right time. In such a case, a sender desiring privacy of communication would be required to employ some method of cryptographic concealment.
Now, just as the sender of the message attempted to conceal information from any but the desired recipient, there would be individuals very much interested in determining what the message said—most probably the very individuals from whom the sender was trying to keep the information.
- Type
- Chapter
- Information
- Elementary CryptanalysisA Mathematical Approach, pp. ix - xiiPublisher: Mathematical Association of AmericaPrint publication year: 2009