Mathematics of secrets: cryptography from Caesar ciphers to digital encryption (Record no. 45771)

MARC details
000 -LEADER
fixed length control field 02245 a2200193 4500
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 170512b 2017 xxu||||| |||| 00| 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780691141756
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.82
Item number HOL
100 ## - MAIN ENTRY--PERSONAL NAME
Personal name Holden, Joshua
245 ## - TITLE STATEMENT
Title Mathematics of secrets: cryptography from Caesar ciphers to digital encryption
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Name of publisher, distributor, etc Princeton University Press,
Date of publication, distribution, etc 2017.
Place of publication, distribution, etc New Jersey:
300 ## - PHYSICAL DESCRIPTION
Extent 372 p.;
Other physical details ill.;
Dimensions 24 cm.;
365 ## - TRADE PRICE
Price type code INR
Price amount 1943.76
520 ## - SUMMARY, ETC.
Summary, etc The Mathematics of Secrets takes readers on a fascinating tour of the mathematics behind cryptography--the science of sending secret messages. Most books about cryptography are organized historically, or around how codes and ciphers have been used, such as in government and military intelligence or bank transactions. Joshua Holden instead shows how mathematical principles underpin the ways that different codes and ciphers operate. Holden focuses on both code making and code breaking and he discusses the majority of ancient and modern ciphers currently known. Holden begins by looking at substitution ciphers, built by substituting one letter or block of letters for another. Explaining one of the simplest and historically well-known ciphers, the Caesar cipher, Holden establishes the key mathematical idea behind the cipher and discusses how to introduce flexibility and additional notation. Holden goes on to explore polyalphabetic substitution ciphers, transposition ciphers, including one developed by the Spartans, connections between ciphers and computer encryption, stream ciphers, and ciphers involving exponentiation. He also examines public-key ciphers, where the methods used to encrypt messages are public knowledge, and yet, intended recipients are still the only ones who are able to read the message. He concludes with a look at the future of ciphers and where cryptography might be headed. Only basic mathematics up to high school algebra is needed to understand and enjoy the book. With a plethora of historical anecdotes and real-world examples, The Mathematics of Secrets reveals the mathematics working stealthily in the science of coded messages.
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Ciphers
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer security
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Cryptography--Mathematics
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Item type Books
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Home library Current library Date acquired Source of acquisition Total Checkouts Full call number Barcode Date last seen Date last borrowed Koha item type
    Dewey Decimal Classification     IIT Gandhinagar IIT Gandhinagar 11/05/2017 Books India 8 005.82 HOL 024740 20/09/2025 05/09/2025 Books


Copyright ©  2022 IIT Gandhinagar Library. All Rights Reserved.