Video description
In Video Editions the narrator reads the book while the content, figures, code listings, diagrams, and text appear on the screen. Like an audiobook that you can also watch as a video.
Explore the fascinating and rich world of Secret Key cryptography! This book provides practical methods for encrypting messages, an interesting and entertaining historical perspective, and an incredible collection of ciphers and codes—including 30 unbreakable methods.
In Secret Key Cryptography: Ciphers, from simple to unbreakable you will:
- Measure the strength of your ciphers and learn how to guarantee their security
- Construct and incorporate data-compression codes
- Generate true random numbers in bulk
- Construct huge primes and safe primes
- Add an undetectable backdoor to a cipher
- Defeat hypothetical ultracomputers that could be developed decades from now
- Construct 30 unbreakable ciphers
Secret Key Cryptography gives you a toolbox of cryptographic techniques and Secret Key methods. The book’s simple, non-technical language is easy to understand and accessible for any reader, even without the advanced mathematics normally required for cryptography. You’ll learn how to create and solve ciphers, as well as how to measure their strength. As you go, you’ll explore both historic ciphers and groundbreaking new approaches—including a never-before-seen way to implement the uncrackable One-Time Pad algorithm.
Whoever you are, this book is for you! History buffs will love seeing the evolution of sophisticated cryptographic methods, hobbyists will get a gentle introduction to cryptography, and engineers and computer scientists will learn the principles of constructing secure ciphers. Even professional cryptographers will find a range of new methods and concepts never published before.
About the Technology
From the Roman empire’s Caesar cipher to the WWII Enigma machine, secret messages have influenced the course of history. Today, Secret Key cryptography is the backbone of all modern computing infrastructure. Properly designed, these algorithms are efficient and practical. Some are actually unbreakable, even using supercomputers or quantum technology!
About the Book
Secret Key Cryptography teaches you how to create Secret Key ciphers, ranging from simple pen-and-paper methods to advanced techniques used in modern computer-based cryptography. It reveals both historic examples and current innovations. You’ll learn how to efficiently encrypt large files with fast stream ciphers, discover alternatives to AES encryption, and avoid strong-looking but weak ciphers. Simple language and fun-to-solve mini-ciphers make learning serious concepts easy and engaging.
What's Inside
- Construct 30 unbreakable ciphers
- Measure the strength of your ciphers and guarantee their security
- Add an undetectable backdoor to a cipher
- Defeat hypothetical ultracomputers of the future
About the Reader
For professional engineers, computer scientists, and cryptography hobbyists. No advanced math knowledge is required.
About the Author
Frank Rubin has been doing cryptography for over 50 years. He holds an MS in Mathematics, and a PhD in Computer Science.
Quotes
With the depth and breadth of knowledge in these pages, no one is more capable of enlightening a reader in classical cryptology than Dr. Frank Rubin.
- From the Foreword by Randall K. Nichols, former president of the American Cryptogram Association
Unleash your inner secret agent as you understand, design, and create world-class ciphers. This book is all you need.
- Roy Prins, Salesforce
It’s no secret! This book is the key to unlocking the world of cryptography.
- Chris Kardell, FIS
Fantastic! Covers the history and the techniques of cryptography in a way I never thought I needed—until I read this book!
- Matthew Harvell, AbacusNext
Table of contents
- Chapter 1. Introduction
- Chapter 2. What is cryptography?
- Chapter 2. Types of cryptography
- Chapter 2. Mechanical vs. digital
- Chapter 2. Why choose Secret Key?
- Chapter 3. Preliminary concepts
- Chapter 3. Number bases
- Chapter 3. Prime numbers
- Chapter 4. Cryptographer’s toolbox
- Chapter 4. Transposition
- Chapter 4. Chained digit generator
- Chapter 5. Substitution ciphers
- Chapter 5. Simple substitution
- Chapter 5. Mixing the alphabet
- Chapter 5. Nomenclators
- Chapter 5. The Kasiski method
- Chapter 5. Index of Coincidence
- Chapter 5. Solving a polyalphabetic cipher
- Chapter 5. Solving a general polyalphabetic cipher
- Chapter 5. Running key
- Chapter 5. Simulated rotor machines
- Chapter 5. Three-rotor machine
- Chapter 6. Countermeasures
- Chapter 6. Interrupted key
- Chapter 6. Bigram and trigram substitution
- Chapter 6. Adding null bits
- Chapter 7. Transposition
- Chapter 7. Columnar transposition
- Chapter 7. Double columnar transposition
- Chapter 7. Key transposition Part 1
- Chapter 7. Key transposition Part 2
- Chapter 8. Jefferson Wheel Cypher
- Chapter 8. Ciphertext-only solution
- Chapter 9. Fractionation
- Chapter 9. Solving a Playfair cipher
- Chapter 9. Three Square
- Chapter 9. Bifid
- Chapter 9. Diagonal bifid
- Chapter 9. Rectangular grids
- Chapter 9. Cyclic 8×N
- Chapter 10. Variable-length fractionation
- Chapter 10. Periodic lengths
- Chapter 10. Post tag systems
- Chapter 10. Different-length tags
- Chapter 10. Text compression
- Chapter 10. Arithmetic coding
- Chapter 10. Adaptive arithmetic coding
- Chapter 11. Block ciphers
- Chapter 11. Double DES
- Chapter 11. Matrix multiplication
- Chapter 11. Fixed vs. keyed substitution
- Chapter 11. Involutory block cipher
- Chapter 11. Ripple ciphers
- Chapter 11. Block chaining
- Chapter 11. Chaining mode summary
- Chapter 12. Principles for secure encryption
- Chapter 12. Confusion
- Chapter 12. Correlation coefficient
- Chapter 12. Base-26 linearity
- Chapter 12. Base-256 linearity
- Chapter 12. Adding a backdoor
- Chapter 12. Condensed linearity
- Chapter 12. Constructing an S-box
- Chapter 12. Diffusion
- Chapter 12. Saturation Part 1
- Chapter 12. Saturation Part 2
- Chapter 13. Stream ciphers
- Chapter 13. Multiplicative congruential generator Part 1
- Chapter 13. Multiplicative congruential generator Part 2
- Chapter 13. Linear congruential generator
- Chapter 13. Chained addition generator
- Chapter 13. Mersenne Twister
- Chapter 13. Estimating the period
- Chapter 13. Combining generators Part 1
- Chapter 13. Combining generators Part 2
- Chapter 13. True random numbers
- Chapter 13. Refreshing the random bytes
- Chapter 13. Hash functions
- Chapter 14. One-time pad
- Chapter 14. Key supply
- Chapter 14. Diffie-Hellman key exchange
- Chapter 14. Constructing large primes, new Part 1
- Chapter 14. Constructing large primes, new Part 2
- Chapter 15. Matrix methods
- Chapter 15. Transposition matrix
- Chapter 15. Hill cipher, computer versions
- Chapter 15. Large integer multiplication
- Chapter 15. Solving a linear congruence
- Chapter 15. Laddering
- Chapter 15. Large integer ciphers
- Chapter 15. Multiplication modulo P
- Chapter 15. Rings
- Chapter 15. Matrices over a ring
- Chapter 15. Finding an invertible matrix
- Chapter 16. Three pass protocol
- Chapter 16. Discrete logarithm
- Chapter 16. Factoring
- Chapter 16. Matrix three pass protocol
- Chapter 16. Maximum order
- Chapter 16. Solving bilinear equations
- Chapter 16. Two-sided three pass protocol
- Chapter 17. Codes
- Chapter 18. Quantum computers
- Chapter 18. Error correction
- Chapter 18. Equations
- Chapter 18. Minimization
- Chapter 18. Ultracomputers
- Chapter 18. Ultrasubstitution cipher US-A
- Epilogue
Product information
- Title: Secret Key Cryptography, Video Edition
- Author(s):
- Release date: August 2022
- Publisher(s): Manning Publications
- ISBN: None
You might also like
book
Secret Key Cryptography
Explore the fascinating and rich world of Secret Key cryptography! This book provides practical methods for …
video
Real-World Cryptography, video edition
In Video Editions the narrator reads the book while the content, figures, code listings, diagrams, and …
book
Modern Cryptography for Cybersecurity Professionals
As a cybersecurity professional, discover how to implement cryptographic techniques to help your organization mitigate the …
video
Encryption
Software developers world-wide place a great deal of trust in the encryption technologies used to protect …