EUR 79,43
  • Tous les prix incluent la TVA.
Il ne reste plus que 3 exemplaire(s) en stock (d'autres exemplaires sont en cours d'acheminement).
Expédié et vendu par Amazon. Emballage cadeau disponible.
Secret History: The Story... a été ajouté à votre Panier
Vous l'avez déjà ?
Repliez vers l'arrière Repliez vers l'avant
Ecoutez Lecture en cours... Interrompu   Vous écoutez un extrait de l'édition audio Audible
En savoir plus
Voir les 3 images

Secret History: The Story of Cryptology (Anglais) Relié – 20 mars 2013


Voir les formats et éditions Masquer les autres formats et éditions
Prix Amazon
Neuf à partir de Occasion à partir de
Format Kindle
"Veuillez réessayer"
Relié
"Veuillez réessayer"
EUR 79,43
EUR 56,60 EUR 62,25
Note: Cet article est éligible à la livraison en points de collecte. Détails
Récupérer votre colis où vous voulez quand vous voulez.
  • Choisissez parmi 17 000 points de collecte en France
  • Les membres du programme Amazon Premium bénéficient de livraison gratuites illimitées
Comment commander vers un point de collecte ?
  1. Trouvez votre point de collecte et ajoutez-le à votre carnet d’adresses
  2. Sélectionnez cette adresse lors de votre commande
Plus d’informations
click to open popover

Offres spéciales et liens associés

  • Outlet Anciennes collections, fin de séries, articles commandés en trop grande quantité, … découvrez notre sélection de produits à petits prix Profitez-en !

  • Rentrée scolaire : trouvez tous vos livres, cartables, cahiers, chaussures, et bien plus encore... dans notre boutique dédiée


Descriptions du produit

Présentation de l'éditeur

Winner of an Outstanding Academic Title Award from CHOICE Magazine

Most available cryptology books primarily focus on either mathematics or history. Breaking this mold, Secret History: The Story of Cryptology gives a thorough yet accessible treatment of both the mathematics and history of cryptology. Requiring minimal mathematical prerequisites, the book presents the mathematics in sufficient detail and weaves the history throughout the chapters. In addition to the fascinating historical and political sides of cryptology, the author—a former Scholar-in-Residence at the U.S. National Security Agency (NSA) Center for Cryptologic History—includes interesting instances of codes and ciphers in crime, literature, music, and art.

Following a mainly chronological development of concepts, the book focuses on classical cryptology in the first part. It covers Greek and Viking cryptography, the Vigenère cipher, the one-time pad, transposition ciphers, Jefferson’s cipher wheel, the Playfair cipher, ADFGX, matrix encryption, World War II cipher systems (including a detailed examination of Enigma), and many other classical methods introduced before World War II.

The second part of the book examines modern cryptology. The author looks at the work of Claude Shannon and the origin and current status of the NSA, including some of its Suite B algorithms such as elliptic curve cryptography and the Advanced Encryption Standard. He also details the controversy that surrounded the Data Encryption Standard and the early years of public key cryptography. The book not only provides the how-to of the Diffie-Hellman key exchange and RSA algorithm, but also covers many attacks on the latter. Additionally, it discusses Elgamal, digital signatures, PGP, and stream ciphers and explores future directions such as quantum cryptography and DNA computing.

With numerous real-world examples and extensive references, this book skillfully balances the historical aspects of cryptology with its mathematical details. It provides readers with a sound foundation in this dynamic field.

Biographie de l'auteur

Craig P. Bauer is an associate professor of mathematics at York College of Pennsylvania and the editor-in-chief of Cryptologia. He was the 2011-2012 Scholar-in-Residence at the National Security Agency (NSA) Center for Cryptologic History, where he wrote several papers for NSA journals, gave a large number of lectures, and made substantial progress on a second book focused on unsolved codes and ciphers. He earned a Ph.D. in mathematics from North Carolina State University.

Aucun appareil Kindle n'est requis. Téléchargez l'une des applis Kindle gratuites et commencez à lire les livres Kindle sur votre smartphone, tablette ou ordinateur.

  • Apple
  • Android
  • Windows Phone
  • Android

Pour obtenir l'appli gratuite, saisissez votre numéro de téléphone mobile.



Détails sur le produit

Commentaires en ligne

Il n'y a pas encore de commentaires clients sur Amazon.fr
5 étoiles
4 étoiles
3 étoiles
2 étoiles
1 étoile

Commentaires client les plus utiles sur Amazon.com (beta)

Amazon.com: 4.0 étoiles sur 5 8 commentaires
12 internautes sur 14 ont trouvé ce commentaire utile 
5.0 étoiles sur 5 Excellent comprehensive and decipherable text on the history of cryptography 16 octobre 2013
Par Ben Rothke - Publié sur Amazon.com
Format: Relié
Narrating a compelling and interesting story about cryptography is not an easy endeavor. Many authors have tried and failed miserably; attempting to create better anecdotes about the adventures of Alice and Bob. David Kahn did the best job of it when wrote The Codebreakers: The story of secret writing in 1967 and set the gold standard on the information security narrative. Kahn's book was so provocative and groundbreaking that the US Government originally censored many parts of it.

A lot has changes since 1967, and while Secret History: The Story of Cryptology is not as groundbreaking, it also has no government censorship. With that, the book is fascinating read that provides a combination of cryptographic history and the underlying mathematics behind it.

As a preface; the book has cryptology in its title, which is for the most part synonymous with cryptography. Since cryptography is more commonly used, I'll use it in this review.

Kahn himself wrote that he felt this book is by far the clearest and most comprehensive of the books dealing with the modern era of cryptography including classic ciphers and some of the important historical ones such as Enigma and Purple; but also newer systems such as AES and public-key cryptography.

The book claims that the mathematics detailed in it are accessible requiring minimal mathematical prerequisites. But the reality is that is does require at least a college level understanding, including algebra, calculus and more.

As an aside, nearly every book on encryption and cryptography that claims no advanced mathematical knowledge is needed doesn't meet that claim. With that, Bauer does a good job of separating the two narratives in the book (cryptography and history), so one who is not comfortable with the high-level math can easily parse through those sections.

Bauer brings an extensive pedigree to the book, as he is a former scholar-in-residence at the NSA Center for Cryptologic History. While Bauer has a Ph.D. in mathematics, that does not take away from his ability as an excellent story teller. And let's face it; telling the story of cryptography in a compelling and readable manner is not an easy task.

The 20 chapters in the book follow a chronological development of encryption and cryptography; from Roman times to current times. Each chapter has a set of exercises. Besides being extremely well-researched, each chapter has numerous items for further reading and research.

Chapters 1-9 are focused on classical cryptology, with topics ranging from the Caesar cipher, Biblical cryptology, to a history of the Vigenère cipher, the ciphers of WW1 and WW2 and more.

In chapter 8 World War II: The Enigma of Germany, Bauer does a great job of detailing how the Enigma machine worked, including details regarding the cryptanalysis of the device, both in its rotor wirings and how recovering its daily keys ultimately lead to is being broken. The chapter also asked the question: what if Enigma had never been broken, and provides a provocative answer to that.

Chapter 8 opens with the famous quote from Ben Franklin that "three may keep a secret if two of them are dead". He notes that the best counterexample to that is of the 10,000 people that were involved in the project to break the Enigma. They all were able to maintain their silence about the project for decades; which clearly shows that large groups can indeed keep a secret. Bauer notes that it is often a reaction to conspiracy theories that large groups of people could never keep a secret for so long.

Chapter 9 provides a fascinating account of the Navajo code talkers. These were a group of Navajo Indians who were specially recruited during World War II by the Marines to serve in their communications units. Since the Navajo language was unknown to the Axis powers; it ensured that all communications were kept completely secret.

While part 1 is quite interesting; part 2, chapters 10-20 focuses on modern cryptology and is even more fascinating. Bauer does a fantastic job of encapsulating the last 60 years of cryptography, and covers everything from the origins of the NSA, the development of DES and AES, public key cryptography and much more.

The book was printed in March 2013 just before the NSA PRISM surveillance program became public knowledge. If there is any significant mistake in the book, it is in chapter 11 where Bauer writes that "everything I've seen and heard at the NSA has convinced me that the respect for the Constitution is a key component of the culture there".

Aside from the incorrect observation about how the NSA treats the Constitution, the book does an excellent job of integrating both the history of cryptography and the mathematical element. For those that aren't interested in to the mathematics, there is plenty of narrative in the book to keep them reading.

This book is the latest in a long line of cryptography narrative, such as The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography by Simon Singh and The Codebreakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet by David Kahn, and of course the classic cryptography text Applied Cryptography by Bruce Schneier, and Bauer shows himself to be a master author and story teller.

For those looking for a comprehensive and decipherable text on the history of cryptography, this is one of the best on the topic in many years.

Kahn's book laid the groundwork that made a book like this possible and Secret History: The Story of Cryptology is a worthy follow-up to that legendary text.
1 internautes sur 1 ont trouvé ce commentaire utile 
5.0 étoiles sur 5 A very comprehensive book on a very interesting subject 10 septembre 2014
Par Donald M. Shepherd - Publié sur Amazon.com
Format: Relié
I bought this book based upon the recommendation from a friend, and I have to say it is a very comprehensive volume. Suffice it to say that if you are interested in secret codes and cryptography, from ancient times to the present, buy this book, you will not be disappointed. Just look at the table of contents; everything related to codes is there.

One reviewer complained about the quality of the paper in the book. My copy is fine, it is a well-bound book of the highest quality.

In the "Note to the reader," the author gives his email address, so you can contact him with comments or questions. I wish all authors would do that.

This book is not inexpensive, but if you are a serious student of cryptography, it is well worth the money.
5.0 étoiles sur 5 I think he did an excellent job of achieving his goal 12 novembre 2015
Par Marty Busse - Publié sur Amazon.com
Format: Relié
In "Secret History: the story of Cryptology," Craig Bauer aims to create a book that melds two approaches to the topic: the historical approach (best exemplified by David Kahn's "The Codebreakers) and the mathematical/computer science approach (exemplified by Bruce Schneier's "Applied Cryptography" and Christopher Swenson's "Modern Cryptanalysis")...without scaring off people whose math background is limited. 

I think he did an excellent job of achieving his goal.  In particular, when he goes over mathematical concepts, his explanations are lucid and clear: I wish the explanation of matrices I got in school had been as good as the description he gives. 

I predict that this will end up on the bookshelf of anyone with an amateur or professional interest in the subject, joining the three works I mentioned earlier and Helen Fouch Gaines' "Cryptanalysis"......or superseding them. 
1 internautes sur 2 ont trouvé ce commentaire utile 
5.0 étoiles sur 5 30k view, true, but most of the people reading this book are not NSA operatives or Math majors. 7 décembre 2013
Par Jackie Gleason - Publié sur Amazon.com
Format: Relié
Although I would have to agree, if you got your PHD in Cryptography/Cryptology/Math this is probably a little basic. But for just starting out this is a great read! Fairly easy reading (although the Safari version is not good for doing examples.) and the author tries to maintain a linear line of thinking.

I am a programmer with little calculus/geometry experience (I was good in my day though). I had little to no "historical" context to cryptology but this book was a rabbit hole for me.

Good work!
5.0 étoiles sur 5 Five Stars 3 novembre 2014
Par Richard Reeder - Publié sur Amazon.com
Format: Relié Achat vérifié
This is about as good as David Kahn's The Codebreakers.
Ces commentaires ont-ils été utiles ? Dites-le-nous


Commentaires

Souhaitez-vous compléter ou améliorer les informations sur ce produit ? Ou faire modifier les images?