
Code Breaking A History and Explanation
by Kippenhahn, Rudolph; Osers, Ewald-
This Item Qualifies for Free Shipping!*
*Excludes marketplace orders.
Rent Book
New Book
We're Sorry
Sold Out
Used Book
We're Sorry
Sold Out
eBook
We're Sorry
Not Available
How Marketplace Works:
- This item is offered by an independent seller and not shipped from our warehouse
- Item details like edition and cover design may differ from our description; see seller's comments before ordering.
- Sellers much confirm and ship within two business days; otherwise, the order will be cancelled and refunded.
- Marketplace purchases cannot be returned to eCampus.com. Contact the seller directly for inquiries; if no response within two days, contact customer service.
- Additional shipping costs apply to Marketplace purchases. Review shipping costs at checkout.
Summary
Author Biography
Table of Contents
Preface | p. 11 |
Preface to the Revised Edition | p. 13 |
Secret Writing in War and Peace | p. 15 |
Radio operator Klausen transmits to Moscow | p. 16 |
The secret of the wax tablets | p. 21 |
The secret message to Count Sandorf | p. 22 |
How Mary, Queen of Scots, was betrayed | p. 24 |
The riddle of the Man in the Iron Mask | p. 26 |
Thomas Jefferson's wheel | p. 28 |
Signs on gravestones and walls | p. 29 |
The art of encoding | p. 31 |
Hidden Messages and Codebooks | p. 34 |
The explosive message in a harmless text | p. 34 |
Shakespeare as a matchmaker | p. 39 |
Playing dice in the air-raid shelter | p. 41 |
The hidden message in the account number | p. 43 |
Every book is unique | p. 45 |
From jargon to codebook | p. 46 |
The codebook of the Pope | p. 49 |
The living codebooks | p. 51 |
Codebooks in World War I | p. 58 |
The Magdeburg runs aground | p. 58 |
The signal book of the Magdeburg in Room 40 | p. 60 |
How was the United States to be kept out of the war? | p. 63 |
The Zimmermann telegram | p. 65 |
The telegram is decoded | p. 66 |
He Came, He Saw, He Encoded | p. 73 |
The secret writing of Julius Caesar | p. 73 |
A Caesar with a mnemonic | p. 78 |
The laws of shuffling | p. 80 |
Permutations | p. 81 |
The universal library | p. 85 |
A superfluous machine | p. 86 |
How a Monalphabetic Code is Cracked | p. 90 |
Edgar Allan Poe decodes to order | p. 90 |
Sherlock Holmes and the Dancing Men | p. 93 |
The frequent e and the infrequent q | p. 95 |
A secret text is decoded | p. 96 |
The foundings of Frankfurter Allgemeine Zeitung | p. 99 |
The deceitfulness of tapeworms | p. 101 |
Disguised frequencies | p. 105 |
Unfair play with Playfair | p. 107 |
Playfair in World War II | p. 110 |
Caesars in Rank and File | p. 114 |
The abbot who was not entirely trustworthy | p. 114 |
Blaise de Vigenère's tableau | p. 117 |
Blurred frequencies | p. 119 |
Decoding with a sledgehammer | p. 120 |
How a Vigenère cipher is cracked | p. 121 |
The rhythm of the keyword | p. 124 |
Keywords Without End | p. 129 |
Carl Sagan's Contact as a code worm | p. 129 |
It need not always be a Caesar | p. 131 |
Polybius's table | p. 133 |
Encoding with a number worm | p. 134 |
Chance has no memory | p. 136 |
Chance artificially produced | p. 139 |
Key worms in the telephone book | p. 143 |
Shuffled Texts | p. 145 |
Anagrams | p. 145 |
Shuffled text against shuffled alphabet | p. 146 |
The template of the Austrian colonel | p. 147 |
Transposition with keyword | p. 150 |
Polybius in World War I | p. 155 |
From Coding Disk to Enigma | p. 159 |
The invention of the wheel | p. 160 |
Three inventors-but only one became rich | p. 162 |
The curse of the reflecting cylinder | p. 169 |
The radio signal without L | p. 170 |
Hitler's Enigma | p. 172 |
Enigma's Secret is Unveiled | p. 178 |
Wanted: young mathematicians with an interest in cryptology | p. 179 |
The first six letters of the Enigma signals | p. 180 |
The German spy and the murdered chief of staff | p. 181 |
A bombe against Enigma | p. 182 |
Three mathematicians escape | p. 184 |
Rejewski's last decoding | p. 187 |
The Bletchley Park crowd | p. 188 |
The tragic story of Alan Turing | p. 192 |
The spy to whom Hitler disclosed his secrets | p. 194 |
Ultra's successful advance | p. 196 |
The Battle of the Atlantic | p. 198 |
Japanese radio signals from burning Berlin | p. 200 |
The Arrival of the Computer | p. 203 |
Other numerical systems | p. 204 |
Mathematics in a two-finger world | p. 206 |
Ciphers in the Telex system | p. 207 |
DES, the American standard system | p. 210 |
Encryption and authority | p. 211 |
Encryption Quite Publicly | p. 216 |
A short lesson on keys | p. 217 |
The recipe for asymmetrical encryption | p. 223 |
Mr. White encodes, Mrs. Black decodes | p. 225 |
Numbers that cannot be divided | p. 228 |
Sieved numbers | p. 230 |
What still awaits exploration | p. 233 |
Prime number encryption | p. 234 |
Asymmetrical but fast | p. 237 |
Smart Cards, One-Way Functions, and Mousetraps | p. 240 |
Who am I? | p. 241 |
The plastic card | p. 244 |
The secret number: a simple version | p. 245 |
Encoded PINs | p. 246 |
Mathematical mousetraps | p. 249 |
My bank account is protected by a one-way function | p. 250 |
The computer in the cash card | p. 251 |
The plastic card as wallet | p. 253 |
Electronic signatures | p. 261 |
Electronic IDs | p. 263 |
Connected to the Whole World | p. 267 |
How do I access the Internet? | p. 269 |
Online banking | p. 270 |
My brush with identity theft | p. 272 |
Using your mobile phone against internet pirates | p. 274 |
The homemade TAN | p. 274 |
On Dangerous Ground | p. 276 |
The one-way function | p. 276 |
The digital proposal | p. 277 |
How can I prove that I am me? | p. 279 |
How do I obtain a certificate and what do I do with it? | p. 279 |
A homemade encrypting machine | p. 283 |
Your computer as Enigma | p. 286 |
How the three magic key numbers are determined | p. 291 |
Further Reading | p. 295 |
Index | p. 297 |
Table of Contents provided by Ingram. All Rights Reserved. |
An electronic version of this book is available through VitalSource.
This book is viewable on PC, Mac, iPhone, iPad, iPod Touch, and most smartphones.
By purchasing, you will be able to view this book online, as well as download it, for the chosen number of days.
Digital License
You are licensing a digital product for a set duration. Durations are set forth in the product description, with "Lifetime" typically meaning five (5) years of online access and permanent download to a supported device. All licenses are non-transferable.
More details can be found here.
A downloadable version of this book is available through the eCampus Reader or compatible Adobe readers.
Applications are available on iOS, Android, PC, Mac, and Windows Mobile platforms.
Please view the compatibility matrix prior to purchase.