CONTENTS

FOREWORD

PREFACE

ABOUT THE AUTHOR

CHAPTER 1 APERITIFS

1.1 The Lexicon of Cryptography

1.2 Cryptographic Systems

1.3 Cryptanalysis

1.4 Side Information

1.5 Thomas Jefferson and the M-94

1.6 Cryptography and History

1.7 Cryptography and Computers

1.8 The National Security Agency

1.9 The Giants

1.10 No Sex, Money, Crime or … Love

1.11 An Example of the Inference Process in Cryptanalysis

1.12 Warning!

CHAPTER 2 COLUMNAR TRANSPOSITION

2.1 Shannon's Classification of Secrecy Transformations

2.2 The Rules of Columnar Transposition Encipherment

2.3 Cribbing

2.4 Examples of Cribbing

2.5 Plaintext Language Models

2.6 Counting k-Grams

2.7 Deriving the Parameters of a Markov Model from Sliding Window Counts

2.8 Markov Scoring

2.9 The ADFGVX Transposition System

2.10 CODA

2.11 Columnar Transposition Problems

CHAPTER 3 MONOALPHABETIC SUBSTITUTION

3.1 Monoalphabetic Substitution

3.2 Caesar's Cipher

3.3 Cribbing Using Isomorphs

3.4 The χ2-Test of a Hypothesis

3.5 Pruning from the Table of Isomorphs

3.6 Partial Maximum Likelihood Estimation of a Monoalphabetic Substitution

3.7 The Hidden Markov Model (HMM)

3.8 Hill Encipherment of ASCII N-Grams

3.9 Gaussian Elimination

3.10 Monoalphabetic Substitution Problems

CHAPTER 4 POLYALPHABETIC SUBSTITUTION

4.1 Running Keys

4.2 Blaise de Vigenère

4.3 Gilbert S. Vernam

4.4 The One-Time Pad

4.5 Finding the Key of Vernam–Vigenère Ciphertext with Known Period by Correlation

4.6 Coincidence

4.7 Venona

4.8 Polyalphabetic Substitution Problems

CHAPTER ...

Get Computer Security and Cryptography now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.