000762596 000__ 03665cam\a2200481Ii\4500 000762596 001__ 762596 000762596 005__ 20230306142230.0 000762596 006__ m\\\\\o\\d\\\\\\\\ 000762596 007__ cr\cn\nnnunnun 000762596 008__ 140819t20142014sz\\\\\\ob\\\\001\0\eng\d 000762596 019__ $$a894170303 000762596 020__ $$a9783319082783$$q(electronic book) 000762596 020__ $$a3319082787$$q(electronic book) 000762596 020__ $$z9783319082776 000762596 0247_ $$a10.1007/978-3-319-08278-3$$2doi 000762596 035__ $$aSP(OCoLC)ocn887817555 000762596 035__ $$aSP(OCoLC)887817555$$z(OCoLC)894170303 000762596 040__ $$aN$T$$beng$$erda$$epn$$cN$T$$dGW5XE$$dYDXCP$$dCOO$$dUPM$$dE7B$$dOCLCF$$dEBLCP$$dDEBSZ$$dOCLCQ$$dOCL 000762596 043__ $$ap------$$an-us--- 000762596 049__ $$aISEA 000762596 050_4 $$aD810.C88 000762596 08204 $$a940.548641$$223 000762596 1001_ $$aDonovan, Peter,$$eauthor. 000762596 24510 $$aCode breaking in the Pacific /$$cPeter Donovan, John Mack. 000762596 264_1 $$aCham :$$bSpringer,$$c[2014] 000762596 264_4 $$c©2014 000762596 300__ $$a1 online resource. 000762596 336__ $$atext$$btxt$$2rdacontent 000762596 337__ $$acomputer$$bc$$2rdamedia 000762596 338__ $$aonline resource$$bcr$$2rdacarrier 000762596 504__ $$aIncludes bibliographical references and index. 000762596 5050_ $$aCommunications and Sigint -- Japanese Expansion 1895-1941 -- The GCCS 1919-1941 -- William Friedman and the US Army -- Early American Naval Sigint -- Developments in Australia -- Preparedness for Attack?- Major Technical Encryption Systems -- JN-25 and its Cryptanalysis -- Using Common Book Groups -- Recovery of a Code Book -- Breaking Additive Systems -- Making Additive Systems Secure -- Redundant Encryption -- The Scanning Distribution -- Ciphers and the Submarines -- Central Bureau 1942-1945 -- Organisation and Reorganisation -- Security, Censorship and Leaks -- Conclusion -- From Pearl Harbor to Midway -- Guadalcanal and Papua -- Rabaul and the Philippines. 000762596 506__ $$aAccess limited to authorized users. 000762596 520__ $$aThis book reveals the historical context and the evolution of the technically complex Allied Signals Intelligence (Sigint) activity against Japan from 1920 to 1945. It traces the all-important genesis and development of the cryptanalytic techniques used to break the main Japanese Navy code (JN-25) and the Japanese Army's Water Transport Code during WWII. This is the first book to describe, explain and analyze the code breaking techniques developed and used to provide this intelligence, thus closing the sole remaining gap in the published accounts of the Pacific War. The authors also explore the organization of cryptographic teams and issues of security, censorship, and leaks. Correcting gaps in previous research, this book illustrates how Sigint remained crucial to Allied planning throughout the war. It helped direct the advance to the Philippines from New Guinea, the sea battles and the submarine onslaught on merchant shipping. Written by well-known authorities on the history of cryptography and mathematics, Code Breaking in the Pacific is designed for cryptologists, mathematicians and researchers working in communications security. Advanced-level students interested in cryptology, the history of the Pacific War, mathematics or the history of computing will also find this book a valuable resource. 000762596 588__ $$aOnline resource; title from PDF title page (viewed Aug. 19, 2014). 000762596 650_0 $$aWorld War, 1939-1945$$zPacific Ocean$$xCryptography. 000762596 650_0 $$aCryptography$$zUnited States$$xHistory$$y20th century. 000762596 7001_ $$aMack, John,$$eauthor. 000762596 77608 $$iPrint version:$$z9783319082776 000762596 85280 $$bebk$$hSpringerLink 000762596 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-3-319-08278-3$$zOnline Access$$91397441.1 000762596 909CO $$ooai:library.usi.edu:762596$$pGLOBAL_SET 000762596 980__ $$aEBOOK 000762596 980__ $$aBIB 000762596 982__ $$aEbook 000762596 983__ $$aOnline 000762596 994__ $$a92$$bISE