Cryptanalysis

( 1 )

Overview

Thorough, systematic introduction to serious cryptography, especially strong in modern forms of cipher solution used by experts. Nihilist, grille, U. S. Army, key-phrase, multiple-alphabet, Gronsfeld, Porta, Beaufort, periodic ciphers, and more. Simple and advanced methods. 166 specimens to solve — with solutions.

Read More Show Less
... See more details below
Paperback
$10.05
BN.com price
(Save 8%)$10.95 List Price

Pick Up In Store

Reserve and pick up in 60 minutes at your local store

Other sellers (Paperback)
  • All (15) from $4.71   
  • New (7) from $5.67   
  • Used (8) from $4.71   
Cryptanalysis: A Study of Ciphers and Their Solution

Available on NOOK devices and apps  
  • NOOK Devices
  • Samsung Galaxy Tab 4 NOOK 7.0
  • Samsung Galaxy Tab 4 NOOK 10.1
  • NOOK HD Tablet
  • NOOK HD+ Tablet
  • NOOK eReaders
  • NOOK Color
  • NOOK Tablet
  • Tablet/Phone
  • NOOK for Windows 8 Tablet
  • NOOK for iOS
  • NOOK for Android
  • NOOK Kids for iPad
  • PC/Mac
  • NOOK for Windows 8
  • NOOK for PC
  • NOOK for Mac
  • NOOK for Web

Want a NOOK? Explore Now

NOOK Book (eBook)
$9.49
BN.com price
(Save 13%)$10.95 List Price

Overview

Thorough, systematic introduction to serious cryptography, especially strong in modern forms of cipher solution used by experts. Nihilist, grille, U. S. Army, key-phrase, multiple-alphabet, Gronsfeld, Porta, Beaufort, periodic ciphers, and more. Simple and advanced methods. 166 specimens to solve — with solutions.

Read More Show Less

Product Details

  • ISBN-13: 9780486200972
  • Publisher: Dover Publications
  • Publication date: 4/1/1989
  • Pages: 256
  • Sales rank: 457,071
  • Product dimensions: 5.63 (w) x 8.21 (h) x 0.55 (d)

Table of Contents

Preface
General Information
Concealment Devices
Transposition Types
Geometrical Types--The Nihilist Transposition
Geometrical Types--The Turning Grille
Irregular Types--Columnar Transposition
"General Methods--Multiple Anagramming, Etc."
Substitution Types
Simple Substitution--Fundamentals
The Consonant-Line Short Cut
  A Method for Attacking Difficult Cases (by George C. Lamb)
Simple Substitution with Complexities
Multiple-Alphabet Ciphers--The Vigenere
"The Gronsfeld, Porta, and Beaufort Ciphers"
The Kasiski Method for Periodic Ciphers
Miscellaneous Phases of Vigenere Decryptment
Auto-Encipherment
Some Periodic Number-Ciphers
Periodic Ciphers with Mixed Alphabets
Polyalphabetical Encipherment Applied by Groups
Vigenere with Key-Progression
Polygram Substitution--The Playfair Cipher
Highlights of Fractional Substitution
Investigating the Unknown Cipher
Appendix
  English Frequency and Sequence Data
  Comparative Table of Single-Letter Frequencies
  Chart Showing Normal Contact Percentages (by F.R. Carter)
  Chart Showing Frequencies of English Digrams (by O. Phelps Meaker)
  Some Foreign Language Data
  Bibliography (by W.D. Witt)
  The Commonest English Words (by Frank R. Fraprie)
  English Trigrams (by Frank R. Fraprie)
  English Digrams (by Frank R. Fraprie)
Solutions
Index
Read More Show Less

Customer Reviews

Average Rating 4
( 1 )
Rating Distribution

5 Star

(0)

4 Star

(1)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously
Sort by: Showing 1 Customer Reviews
  • Anonymous

    Posted November 19, 2000

    Classic Technical Cryptology Book

    The most technical introductory cryptanalysis book. Classical (symmetric) cypher-breaking methods for English, and frequency tables for other languages. . . four out of five stars because it's outdated, no asymmetric RSA or the easier to use PGP, also outdated for quantum computer theory. Still, will stimulate people. Amazing how good it is considering originally written in 1956.

    Was this review helpful? Yes  No   Report this review
Sort by: Showing 1 Customer Reviews

If you find inappropriate content, please report it to Barnes & Noble
Why is this product inappropriate?
Comments (optional)