Secret Key Cryptography, Video Edition

Video description

In Video Editions the narrator reads the book while the content, figures, code listings, diagrams, and text appear on the screen. Like an audiobook that you can also watch as a video.

Explore the fascinating and rich world of Secret Key cryptography! This book provides practical methods for encrypting messages, an interesting and entertaining historical perspective, and an incredible collection of ciphers and codes—including 30 unbreakable methods.

In Secret Key Cryptography: Ciphers, from simple to unbreakable you will:

  • Measure the strength of your ciphers and learn how to guarantee their security
  • Construct and incorporate data-compression codes
  • Generate true random numbers in bulk
  • Construct huge primes and safe primes
  • Add an undetectable backdoor to a cipher
  • Defeat hypothetical ultracomputers that could be developed decades from now
  • Construct 30 unbreakable ciphers

Secret Key Cryptography gives you a toolbox of cryptographic techniques and Secret Key methods. The book’s simple, non-technical language is easy to understand and accessible for any reader, even without the advanced mathematics normally required for cryptography. You’ll learn how to create and solve ciphers, as well as how to measure their strength. As you go, you’ll explore both historic ciphers and groundbreaking new approaches—including a never-before-seen way to implement the uncrackable One-Time Pad algorithm.

Whoever you are, this book is for you! History buffs will love seeing the evolution of sophisticated cryptographic methods, hobbyists will get a gentle introduction to cryptography, and engineers and computer scientists will learn the principles of constructing secure ciphers. Even professional cryptographers will find a range of new methods and concepts never published before.

About the Technology
From the Roman empire’s Caesar cipher to the WWII Enigma machine, secret messages have influenced the course of history. Today, Secret Key cryptography is the backbone of all modern computing infrastructure. Properly designed, these algorithms are efficient and practical. Some are actually unbreakable, even using supercomputers or quantum technology!

About the Book
Secret Key Cryptography teaches you how to create Secret Key ciphers, ranging from simple pen-and-paper methods to advanced techniques used in modern computer-based cryptography. It reveals both historic examples and current innovations. You’ll learn how to efficiently encrypt large files with fast stream ciphers, discover alternatives to AES encryption, and avoid strong-looking but weak ciphers. Simple language and fun-to-solve mini-ciphers make learning serious concepts easy and engaging.

What's Inside
  • Construct 30 unbreakable ciphers
  • Measure the strength of your ciphers and guarantee their security
  • Add an undetectable backdoor to a cipher
  • Defeat hypothetical ultracomputers of the future


About the Reader
For professional engineers, computer scientists, and cryptography hobbyists. No advanced math knowledge is required.

About the Author
Frank Rubin has been doing cryptography for over 50 years. He holds an MS in Mathematics, and a PhD in Computer Science.

Quotes
With the depth and breadth of knowledge in these pages, no one is more capable of enlightening a reader in classical cryptology than Dr. Frank Rubin.
- From the Foreword by Randall K. Nichols, former president of the American Cryptogram Association

Unleash your inner secret agent as you understand, design, and create world-class ciphers. This book is all you need.
- Roy Prins, Salesforce

It’s no secret! This book is the key to unlocking the world of cryptography.
- Chris Kardell, FIS

Fantastic! Covers the history and the techniques of cryptography in a way I never thought I needed—until I read this book!
- Matthew Harvell, AbacusNext

Table of contents

  1. Chapter 1. Introduction
  2. Chapter 2. What is cryptography?
  3. Chapter 2. Types of cryptography
  4. Chapter 2. Mechanical vs. digital
  5. Chapter 2. Why choose Secret Key?
  6. Chapter 3. Preliminary concepts
  7. Chapter 3. Number bases
  8. Chapter 3. Prime numbers
  9. Chapter 4. Cryptographer’s toolbox
  10. Chapter 4. Transposition
  11. Chapter 4. Chained digit generator
  12. Chapter 5. Substitution ciphers
  13. Chapter 5. Simple substitution
  14. Chapter 5. Mixing the alphabet
  15. Chapter 5. Nomenclators
  16. Chapter 5. The Kasiski method
  17. Chapter 5. Index of Coincidence
  18. Chapter 5. Solving a polyalphabetic cipher
  19. Chapter 5. Solving a general polyalphabetic cipher
  20. Chapter 5. Running key
  21. Chapter 5. Simulated rotor machines
  22. Chapter 5. Three-rotor machine
  23. Chapter 6. Countermeasures
  24. Chapter 6. Interrupted key
  25. Chapter 6. Bigram and trigram substitution
  26. Chapter 6. Adding null bits
  27. Chapter 7. Transposition
  28. Chapter 7. Columnar transposition
  29. Chapter 7. Double columnar transposition
  30. Chapter 7. Key transposition Part 1
  31. Chapter 7. Key transposition Part 2
  32. Chapter 8. Jefferson Wheel Cypher
  33. Chapter 8. Ciphertext-only solution
  34. Chapter 9. Fractionation
  35. Chapter 9. Solving a Playfair cipher
  36. Chapter 9. Three Square
  37. Chapter 9. Bifid
  38. Chapter 9. Diagonal bifid
  39. Chapter 9. Rectangular grids
  40. Chapter 9. Cyclic 8×N
  41. Chapter 10. Variable-length fractionation
  42. Chapter 10. Periodic lengths
  43. Chapter 10. Post tag systems
  44. Chapter 10. Different-length tags
  45. Chapter 10. Text compression
  46. Chapter 10. Arithmetic coding
  47. Chapter 10. Adaptive arithmetic coding
  48. Chapter 11. Block ciphers
  49. Chapter 11. Double DES
  50. Chapter 11. Matrix multiplication
  51. Chapter 11. Fixed vs. keyed substitution
  52. Chapter 11. Involutory block cipher
  53. Chapter 11. Ripple ciphers
  54. Chapter 11. Block chaining
  55. Chapter 11. Chaining mode summary
  56. Chapter 12. Principles for secure encryption
  57. Chapter 12. Confusion
  58. Chapter 12. Correlation coefficient
  59. Chapter 12. Base-26 linearity
  60. Chapter 12. Base-256 linearity
  61. Chapter 12. Adding a backdoor
  62. Chapter 12. Condensed linearity
  63. Chapter 12. Constructing an S-box
  64. Chapter 12. Diffusion
  65. Chapter 12. Saturation Part 1
  66. Chapter 12. Saturation Part 2
  67. Chapter 13. Stream ciphers
  68. Chapter 13. Multiplicative congruential generator Part 1
  69. Chapter 13. Multiplicative congruential generator Part 2
  70. Chapter 13. Linear congruential generator
  71. Chapter 13. Chained addition generator
  72. Chapter 13. Mersenne Twister
  73. Chapter 13. Estimating the period
  74. Chapter 13. Combining generators Part 1
  75. Chapter 13. Combining generators Part 2
  76. Chapter 13. True random numbers
  77. Chapter 13. Refreshing the random bytes
  78. Chapter 13. Hash functions
  79. Chapter 14. One-time pad
  80. Chapter 14. Key supply
  81. Chapter 14. Diffie-Hellman key exchange
  82. Chapter 14. Constructing large primes, new Part 1
  83. Chapter 14. Constructing large primes, new Part 2
  84. Chapter 15. Matrix methods
  85. Chapter 15. Transposition matrix
  86. Chapter 15. Hill cipher, computer versions
  87. Chapter 15. Large integer multiplication
  88. Chapter 15. Solving a linear congruence
  89. Chapter 15. Laddering
  90. Chapter 15. Large integer ciphers
  91. Chapter 15. Multiplication modulo P
  92. Chapter 15. Rings
  93. Chapter 15. Matrices over a ring
  94. Chapter 15. Finding an invertible matrix
  95. Chapter 16. Three pass protocol
  96. Chapter 16. Discrete logarithm
  97. Chapter 16. Factoring
  98. Chapter 16. Matrix three pass protocol
  99. Chapter 16. Maximum order
  100. Chapter 16. Solving bilinear equations
  101. Chapter 16. Two-sided three pass protocol
  102. Chapter 17. Codes
  103. Chapter 18. Quantum computers
  104. Chapter 18. Error correction
  105. Chapter 18. Equations
  106. Chapter 18. Minimization
  107. Chapter 18. Ultracomputers
  108. Chapter 18. Ultrasubstitution cipher US-A
  109. Epilogue

Product information

  • Title: Secret Key Cryptography, Video Edition
  • Author(s): Frank Rubin
  • Release date: August 2022
  • Publisher(s): Manning Publications
  • ISBN: None