Search results: Found 13

Listing 1 - 10 of 13 << page
of 2
>>
Sort by
Breaking Japanese Diplomatic Codes: David Sissons and D Special Section during the Second World War

Authors: ---
ISBN: 9781925021073 Year: DOI: 10.26530/OAPEN_459995 Language: English
Publisher: ANU Press
Subject: History --- Science (General)
Added to DOAB on : 2014-01-13 12:33:57
License: ANU Press

Loading...
Export citation

Choose an application

Abstract

During the Second World War, Australia maintained a super-secret organisation, the Diplomatic (or `D’) Special Section, dedicated to breaking Japanese diplomatic codes. The Section has remained officially secret as successive Australian Governments have consistently refused to admit that Australia ever intercepted diplomatic communications, even in war-time. This book recounts the history of the Special Section and describes its code-breaking activities. It was a small but very select organisation, whose `technical’

Keywords

world war 2 --- cryptography

Real Life Cryptology

Author:
ISBN: 9789462985544 Year: DOI: 10.5117/9789462985544 Language: Undetermined
Publisher: Amsterdam University Press
Subject: Science (General)
Added to DOAB on : 2019-01-15 13:34:17
License:

Loading...
Export citation

Choose an application

Abstract

A large number of enciphered documents survived from early modern Hungary. This area was a particularly fertile territory where cryptographic methods proliferated, because a large portion of the population was living in the frontier zone, and participated (or was forced to participate) in the network of the information flow. A quantitative analysis of sixteenth-century to seventeenth-century Hungarian ciphers (300 cipher keys and 1,600 partly or entirely enciphered letters) reveals that besides the dominance of diplomatic use of cryptography, there were many examples of “private” applications too. This book reconstructs the main reasons and goals why historical actors chose to use ciphers in a diplomatic letter, a military order, a diary or a private letter, what they decided to encrypt, and how they perceived the dangers threatening their messages.

Partition-Based Trapdoor Ciphers

Authors: ---
ISBN: 9789535133865 9789535133858 Year: Pages: 92 DOI: 10.5772/intechopen.69485 Language: English
Publisher: IntechOpen
Subject: Media and communication
Added to DOAB on : 2019-10-03 07:51:50

Loading...
Export citation

Choose an application

Abstract

Block encryption algorithms are now the most widely used cipher systems in the world to protect our communications and our data. Despite the fact that their design is open and public, there is absolutely no guarantee that there do not exist hidden features, at the mathematical design level, that could enable an attacker to break those systems in an operational way. Such features are called backdoors or trapdoors. The present book intends to address the feasibility of a particular class of such backdoors based on partitionning the plaintext and ciphertext message spaces. Going from the theory to the practical aspects, it is shown that mathematical backdoors in encryption systems are possible. This book, thus, intends to initiate a new field of research.

Advanced Technologies of Quantum Key Distribution

Author:
ISBN: 9781789231960 9781789231977 Year: Pages: 212 DOI: 10.5772/65232 Language: English
Publisher: IntechOpen
Subject: Media and communication
Added to DOAB on : 2019-10-03 07:51:51

Loading...
Export citation

Choose an application

Abstract

This book explores both the state of the art and the latest developments in QKD. It describes the fundamental concepts and practical aspects of QKD from a viewpoint of information security and quantum channel efficiency improvement. The purpose of this book is to extend and update the knowledge of the readers in the dynamically changing field of QKD. The authors attempt to present in detail their results of scientific research, which is divided into two sections - Modern QKD Technologies and Quantum Channel Construction. It will be useful for researchers, engineers, graduates, and doctoral students working in quantum cryptography and information security-related areas.

Blockchain and Cryptocurrencies

Authors: ---
ISBN: 9781789239133 9781838812089 9781789239140 Year: Pages: 124 DOI: 10.5772/intechopen.74182 Language: English
Publisher: IntechOpen
Subject: Media and communication
Added to DOAB on : 2019-10-03 07:51:53

Loading...
Export citation

Choose an application

Abstract

Finance is the language of business and as technological disruption accelerates, a fundamental change is under way. This presents both opportunities and challenges for current-day organizations and finance professionals alike. Money makes the world go around, they say; but digital money not only makes the world go around, it does it in a decentralized fashion. Because the currencies are decentralized, with the right mix of technology the opportunities that emerge are noteworthy and emerge as a game changer for financial institutions. This book shows many different aspects, examples, and regulations of cryptocurrencies through its underpinning technology of blockchain in the present-day digital era. The diversity of the authors who sum up this book signify the importance of implementation in the digitized economy. It is divided into four main sections, with topics on Bitcoin, blockchain and digital returns, impact of cryptocurrencies in gaming, and cryptocurrency exchanges.

Interactions between Group Theory, Symmetry and Cryptology

Author:
ISBN: 9783039288021 / 9783039288038 Year: Pages: 164 DOI: 10.3390/books978-3-03928-803-8 Language: eng
Publisher: MDPI - Multidisciplinary Digital Publishing Institute
Subject: Science (General) --- Mathematics
Added to DOAB on : 2020-06-09 16:38:57
License:

Loading...
Export citation

Choose an application

Abstract

Cryptography lies at the heart of most technologies deployed today for secure communications. At the same time, mathematics lies at the heart of cryptography, as cryptographic constructions are based on algebraic scenarios ruled by group or number theoretical laws. Understanding the involved algebraic structures is, thus, essential to design robust cryptographic schemes. This Special Issue is concerned with the interplay between group theory, symmetry and cryptography. The book highlights four exciting areas of research in which these fields intertwine: post-quantum cryptography, coding theory, computational group theory and symmetric cryptography. The articles presented demonstrate the relevance of rigorously analyzing the computational hardness of the mathematical problems used as a base for cryptographic constructions. For instance, decoding problems related to algebraic codes and rewriting problems in non-abelian groups are explored with cryptographic applications in mind. New results on the algebraic properties or symmetric cryptographic tools are also presented, moving ahead in the understanding of their security properties. In addition, post-quantum constructions for digital signatures and key exchange are explored in this Special Issue, exemplifying how (and how not) group theory may be used for developing robust cryptographic tools to withstand quantum attacks.

B C, Before Computers: On Information Technology from Writing to the Age of Digital Data

Author:
ISBN: 9781800640290 / 9781800640313 Year: DOI: 10.11647/OBP.0225 Language: English
Publisher: Open Book Publishers
Subject: Computer Science
Added to DOAB on : 2020-10-27 17:13:41
License: CC-BY-4.0

Loading...
Export citation

Choose an application

Abstract

The idea that the digital age has revolutionized our day-to-day experience of the world is nothing new, and has been amply recognized by cultural historians. In contrast, Stephen Robertson’s BC: Before Computers is a work which questions the idea that the mid-twentieth century saw a single moment of rupture. It is about all the things that we had to learn, invent, and understand – all the ways we had to evolve our thinking – before we could enter the information technology revolution of the second half of the twentieth century. Its focus ranges from the beginnings of data processing, right back to such originary forms of human technology as the development of writing systems, gathering a whole history of revolutionary moments in the development of information technologies into a single, although not linear narrative.Treading the line between philosophy and technical history, Robertson draws on his extensive technical knowledge to produce a text which is both thought-provoking and accessible to a wide range of readers. The book is wide in scope, exploring the development of technologies in such diverse areas as cryptography, visual art and music, and the postal system. Through all this, it does not simply aim to tell the story of computer developments but to show that those developments rely on a long history of humans creating technologies for increasingly sophisticated methods of manipulating information.Through a clear structure and engaging style, it brings together a wealth of informative and conceptual explorations into the history of human technologies, and avoids assumptions about any prior knowledge on the part of the reader. As such, it has the potential to be of interest to the expert and the general reader alike.

International Symposium on Mathematics, Quantum Theory, and Cryptography

Authors: --- --- --- --- et al.
Book Series: Mathematics for Industry ISBN: 9789811551918 Year: Pages: 274 DOI: 10.1007/978-981-15-5191-8 Language: English
Publisher: Springer Nature
Subject: Agriculture (General) --- Computer Science
Added to DOAB on : 2020-11-19 00:18:33
License:

Loading...
Export citation

Choose an application

Abstract

This open access book presents selected papers from International Symposium on Mathematics, Quantum Theory, and Cryptography (MQC), which was held on September 25-27, 2019 in Fukuoka, Japan. The international symposium MQC addresses the mathematics and quantum theory underlying secure modeling of the post quantum cryptography including e.g. mathematical study of the light-matter interaction models as well as quantum computing. The security of the most widely used RSA cryptosystem is based on the difficulty of factoring large integers. However, in 1994 Shor proposed a quantum polynomial time algorithm for factoring integers, and the RSA cryptosystem is no longer secure in the quantum computing model. This vulnerability has prompted research into post-quantum cryptography using alternative mathematical problems that are secure in the era of quantum computers. In this regard, the National Institute of Standards and Technology (NIST) began to standardize post-quantum cryptography in 2016. This book is suitable for postgraduate students in mathematics and computer science, as well as for experts in industry working on post-quantum cryptography.

Principles of Security and Trust: 7th International Conference, POST 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Thessaloniki, Greece, April 14-20, 2018, Proceedings

Authors: ---
Book Series: Security and Cryptology ISBN: 9783319897219 9783319897226 Year: Volume: 10804 Pages: 347 DOI: https://doi.org/10.1007/978-3-319-89722-6 Language: English
Publisher: Springer Nature Grant: ETAPS e.V.
Subject: Computer Science
Added to DOAB on : 2018-06-29 14:49:22
License:

Loading...
Export citation

Choose an application

Abstract

This book constitutes the proceedings of the 7th International Conference on Principles of Security and Trust, POST 2018, which took place in Thessaloniki, Greece, in April 2018, held as part of the European Joint Conference on Theory and Practice of Software, ETAPS 2018.The 13 papers presented in this volume were carefully reviewed and selected from 45 submissions. The papers are organized in topical sections named: information flow and non-intereference; leakage, information flow, and protocols; smart contracts and privacy; firewalls and attack-defense trees.

Tools and Algorithms for the Construction and Analysis of Systems: 24th International Conference, TACAS 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Thessaloniki, Greece, April 14-20, 2018, Proceedings, Part I

Authors: ---
Book Series: Theoretical Computer Science and General Issues ISBN: 9783319899596 9783319899602 Year: Volume: 10805 Pages: 429 DOI: https://doi.org/10.1007/978-3-319-89960-2 Language: English
Publisher: Springer Nature Grant: ETAPS e.V.
Subject: Computer Science
Added to DOAB on : 2018-07-19 14:22:46
License:

Loading...
Export citation

Choose an application

Abstract

The LNCS 10805 and 10806 proceedings set constitutes the proceedings of the 24th International Conference on Tools and Algorithms for the Construction and Analysis of Systems, TACAS 2018, which took place in Thessaloniki, Greece, in April 2018, held as part of the European Joint Conference on Theory and Practice of Software, ETAPS 2018.The total of 43 full and 11 short papers presented in these volumes was carefully reviewed and selected from 154submissions. The papers are organized in topical sections as follows:Part I: theorem proving; SAT and SMT I; deductive verification; software verification and optimization; model checking; and machine learning.Part II: concurrent and distributed systems; SAT and SMT II; security and reactive systems; static and dynamic program analysis; hybrid and stochastic systems; temporal logic and mu-calculus; 7th Competition on Software Verification – SV-COMP.

Listing 1 - 10 of 13 << page
of 2
>>
Sort by