The Code Book: The Secrets Behind Codebreaking"As gripping as a good thriller." --The Washington Post Unpack the science of secrecy and discover the methods behind cryptography--the encoding and decoding of information--in this clear and easy-to-understand young adult adaptation of the national bestseller that's perfect for this age of WikiLeaks, the Sony hack, and other events that reveal the extent to which our technology is never quite as secure as we want to believe. Coders and codebreakers alike will be fascinated by history's most mesmerizing stories of intrigue and cunning--from Julius Caesar and his Caeser cipher to the Allies' use of the Enigma machine to decode German messages during World War II. Accessible, compelling, and timely, The Code Book is sure to make readers see the past--and the future--in a whole new way. "Singh's power of explaining complex ideas is as dazzling as ever." --The Guardian |
Comentarios de usuarios - Escribir una reseña
No hemos encontrado ninguna reseña en los sitios habituales.
Índice
THE ANONYMOUS CODEBREAKER | |
THE MECHANIZATION OF SECRECY | |
THE LANGUAGE BARRIER | |
ALICE AND BOB GO PUBLIC | |
Términos y frases comunes
according Adleman Alice’s American asymmetric cipher Babbage Babington Beale ciphers billion billion billion Bletchley Park bombes breakthrough British Caesar shift cartouche chains Champollion cipher alphabet cipher disc ciphertext ciphertext letter Cocks code talkers codebook codebreakers codemakers crack cryptanalysts day key decipher decipherment decrypt the message Diffie Egyptian Elizabeth Ellis enciphered encrypted message encryption encryption key enemy English Enigma cipher Enigma machine Enigma operators escrow example Figure frequency analysis GCHQ German Greek Hellman hieroglyphs idea intercepted Internet invention key distribution keyword Mary’s mathematical message key military modular arithmetic monoalphabetic substitution cipher Morriss Navajo code number of possible one-way function padlock phonetic plain alphabet plaintext plaintext letter possible keys private key public-key cryptography quantum cryptography radio receiver Rejewski represents Rivest Scherbius scrambler scrambler arrangement scrambler settings second scrambler sender Shamir swapped Table Vigenère cipher Vigenère square Walsingham words Zimmermann telegram