Mathematics of secrets: cryptography from Caesar ciphers to digital encryption (Record no. 45771)
[ view plain ]
| 000 -LEADER | |
|---|---|
| fixed length control field | 02245 a2200193 4500 |
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
| fixed length control field | 170512b 2017 xxu||||| |||| 00| 0 eng d |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
| International Standard Book Number | 9780691141756 |
| 082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER | |
| Classification number | 005.82 |
| Item number | HOL |
| 100 ## - MAIN ENTRY--PERSONAL NAME | |
| Personal name | Holden, Joshua |
| 245 ## - TITLE STATEMENT | |
| Title | Mathematics of secrets: cryptography from Caesar ciphers to digital encryption |
| 260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) | |
| Name of publisher, distributor, etc | Princeton University Press, |
| Date of publication, distribution, etc | 2017. |
| Place of publication, distribution, etc | New Jersey: |
| 300 ## - PHYSICAL DESCRIPTION | |
| Extent | 372 p.; |
| Other physical details | ill.; |
| Dimensions | 24 cm.; |
| 365 ## - TRADE PRICE | |
| Price type code | INR |
| Price amount | 1943.76 |
| 520 ## - SUMMARY, ETC. | |
| Summary, etc | The Mathematics of Secrets takes readers on a fascinating tour of the mathematics behind cryptography--the science of sending secret messages. Most books about cryptography are organized historically, or around how codes and ciphers have been used, such as in government and military intelligence or bank transactions. Joshua Holden instead shows how mathematical principles underpin the ways that different codes and ciphers operate. Holden focuses on both code making and code breaking and he discusses the majority of ancient and modern ciphers currently known. Holden begins by looking at substitution ciphers, built by substituting one letter or block of letters for another. Explaining one of the simplest and historically well-known ciphers, the Caesar cipher, Holden establishes the key mathematical idea behind the cipher and discusses how to introduce flexibility and additional notation. Holden goes on to explore polyalphabetic substitution ciphers, transposition ciphers, including one developed by the Spartans, connections between ciphers and computer encryption, stream ciphers, and ciphers involving exponentiation. He also examines public-key ciphers, where the methods used to encrypt messages are public knowledge, and yet, intended recipients are still the only ones who are able to read the message. He concludes with a look at the future of ciphers and where cryptography might be headed. Only basic mathematics up to high school algebra is needed to understand and enjoy the book. With a plethora of historical anecdotes and real-world examples, The Mathematics of Secrets reveals the mathematics working stealthily in the science of coded messages. |
| 650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name as entry element | Ciphers |
| 650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name as entry element | Computer security |
| 650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name as entry element | Cryptography--Mathematics |
| 942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
| Source of classification or shelving scheme | Dewey Decimal Classification |
| Item type | Books |
| Withdrawn status | Lost status | Source of classification or shelving scheme | Damaged status | Not for loan | Home library | Current library | Date acquired | Source of acquisition | Total Checkouts | Full call number | Barcode | Date last seen | Date last borrowed | Koha item type |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Dewey Decimal Classification | IIT Gandhinagar | IIT Gandhinagar | 11/05/2017 | Books India | 8 | 005.82 HOL | 024740 | 20/09/2025 | 05/09/2025 | Books |