Items
Details
Table of Contents
Ancient roots
Monalphabetic substitution ciphers, or MASCs: disguises for messages
Simple progression to an unbreakable cipher
Transposition ciphers
Shakespeare, Jefferson, and JFK
World War I and Herbert O. Yardley
Matrix encryption
World War II: the enigma of Germany
Cryptologic war against Japan
Claude Shannon
National Security Agency
Data Encryption Standard
Birth of public key cryptography
Attacking RSA
Primality testing and complexity theory
Authenticity
Pretty good privacy
Stream ciphers
Suite B all-stars
Possible futures.
Monalphabetic substitution ciphers, or MASCs: disguises for messages
Simple progression to an unbreakable cipher
Transposition ciphers
Shakespeare, Jefferson, and JFK
World War I and Herbert O. Yardley
Matrix encryption
World War II: the enigma of Germany
Cryptologic war against Japan
Claude Shannon
National Security Agency
Data Encryption Standard
Birth of public key cryptography
Attacking RSA
Primality testing and complexity theory
Authenticity
Pretty good privacy
Stream ciphers
Suite B all-stars
Possible futures.