MARC details
000 -LEADER |
fixed length control field |
02730cam a2200421Ii 4500 |
001 - CONTROL NUMBER |
control field |
860897407 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
OCoLC |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20190729105233.0 |
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS |
fixed length control field |
m o d |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION |
fixed length control field |
cr mn||||||||| |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
131017t20132013sz a b 001 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9783319016276 |
040 ## - CATALOGING SOURCE |
Original cataloging agency |
GW5XE |
Language of cataloging |
eng |
Description conventions |
rda |
-- |
pn |
Transcribing agency |
GW5XE |
Modifying agency |
ZMC |
-- |
OHS |
-- |
UtOrBLW |
-- |
MiTN |
049 ## - LOCAL HOLDINGS (OCLC) |
Holding library |
EY8Z |
050 #4 - LIBRARY OF CONGRESS CALL NUMBER |
Classification number |
QA76.9 .A25 |
Item number |
D66 2013 |
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
005.8/2 |
Edition number |
23 |
096 ## - LOCALLY ASSIGNED NLM-TYPE CALL NUMBER (OCLC) |
Classification number |
QA76.9.A25 |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
Dooley, John F., |
245 12 - TITLE STATEMENT |
Title |
A brief history of cryptology and cryptographic algorithms / |
Statement of responsibility, etc. |
John F. Dooley. |
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE |
Place of production, publication, distribution, manufacture |
Cham : |
Name of producer, publisher, distributor, manufacturer |
Springer, |
Date of production, publication, distribution, manufacture, or copyright notice |
[2013] |
264 #4 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE |
Date of production, publication, distribution, manufacture, or copyright notice |
©2013. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xii, 99 pages : |
Other physical details |
illustrations ; |
Dimensions |
24 cm |
336 ## - CONTENT TYPE |
Content type term |
text |
Content type code |
txt |
Source |
rdacontent. |
337 ## - MEDIA TYPE |
Media type term |
unmediated |
Source |
rdamedia. |
338 ## - CARRIER TYPE |
Carrier type term |
volume |
Source |
rdacarrier. |
490 1# - SERIES STATEMENT |
Series statement |
SpringerBriefs in computer science, |
International Standard Serial Number |
2191-5768. |
520 ## - SUMMARY, ETC. |
Summary, etc. |
The science of cryptology is made up of two halves. Cryptography is the study of how to create secure systems for communications. Cryptanalysis is the study of how to break those systems. The conflict between these two halves of cryptology is the story of secret writing. For over two thousand years governments, armies, and now individuals have wanted to protect their messages from the "enemy". This desire to communicate securely and secretly has resulted in the creation of numerous and increasingly complicated systems to protect one's messages. On the other hand, for every new system to protect messages there is a cryptanalyst creating a new technique to break that system. With the advent of computers the cryptographer seems to finally have the upper hand. New mathematically based cryptographic algorithms that use computers for encryption and decryption are so secure that brute-force techniques seem to be the only way to break them so far. This work traces the history of the conflict between cryptographer and cryptanalyst, explores in some depth the algorithms created to protect messages, and suggests where the field is going in the future. |
504 ## - BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc. note |
Includes bibliographical references and index. |
505 00 - FORMATTED CONTENTS NOTE |
Title |
Introduction: A Revolutionary Cipher -- |
-- |
Cryptology Before 1500: A Bit of Magic -- |
-- |
The Black Chambers: 1500-1776 -- |
-- |
Crypto Goes to War: 1861-1865 -- |
-- |
Crypto and the War to End All Wars: 1914-1918 -- |
-- |
The Interwar Period 1919-1939 -- |
-- |
The Coming of the Machines: |
596 ## - |
-- |
1 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Cryptography |
General subdivision |
History. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Data encryption (Computer science) |
General subdivision |
History. |
650 #2 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Information Systems |
General subdivision |
history. |
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE |
Uniform title |
SpringerBriefs in computer science. |
948 ## - LOCAL PROCESSING INFORMATION (OCLC); SERIES PART DESIGNATOR (RLIN) |
Series part designator, SPT (RLIN) |
u367320 |
949 ## - LOCAL PROCESSING INFORMATION (OCLC) |
a |
QA76.9 .A25 D66 2013 |
w |
LC |
c |
1 |
h |
EY8Z |
i |
33039001206431 |
903 ## - LOCAL DATA ELEMENT C, LDC (RLIN) |
a |
25842 |