Preface | p. 11 |
Preface to the Revised Edition | p. 13 |
Secret Writing in War and Peace | p. 15 |
Radio operator Klausen transmits to Moscow | p. 16 |
The secret of the wax tablets | p. 21 |
The secret message to Count Sandorf | p. 22 |
How Mary, Queen of Scots, was betrayed | p. 24 |
The riddle of the Man in the Iron Mask | p. 26 |
Thomas Jefferson's wheel | p. 28 |
Signs on gravestones and walls | p. 29 |
The art of encoding | p. 31 |
Hidden Messages and Codebooks | p. 34 |
The explosive message in a harmless text | p. 34 |
Shakespeare as a matchmaker | p. 39 |
Playing dice in the air-raid shelter | p. 41 |
The hidden message in the account number | p. 43 |
Every book is unique | p. 45 |
From jargon to codebook | p. 46 |
The codebook of the Pope | p. 49 |
The living codebooks | p. 51 |
Codebooks in World War I | p. 58 |
The Magdeburg runs aground | p. 58 |
The signal book of the Magdeburg in Room 40 | p. 60 |
How was the United States to be kept out of the war? | p. 63 |
The Zimmermann telegram | p. 65 |
The telegram is decoded | p. 66 |
He Came, He Saw, He Encoded | p. 73 |
The secret writing of Julius Caesar | p. 73 |
A Caesar with a mnemonic | p. 78 |
The laws of shuffling | p. 80 |
Permutations | p. 81 |
The universal library | p. 85 |
A superfluous machine | p. 86 |
How a Monalphabetic Code is Cracked | p. 90 |
Edgar Allan Poe decodes to order | p. 90 |
Sherlock Holmes and the Dancing Men | p. 93 |
The frequent e and the infrequent q | p. 95 |
A secret text is decoded | p. 96 |
The foundings of Frankfurter Allgemeine Zeitung | p. 99 |
The deceitfulness of tapeworms | p. 101 |
Disguised frequencies | p. 105 |
Unfair play with Playfair | p. 107 |
Playfair in World War II | p. 110 |
Caesars in Rank and File | p. 114 |
The abbot who was not entirely trustworthy | p. 114 |
Blaise de Vigenère's tableau | p. 117 |
Blurred frequencies | p. 119 |
Decoding with a sledgehammer | p. 120 |
How a Vigenère cipher is cracked | p. 121 |
The rhythm of the keyword | p. 124 |
Keywords Without End | p. 129 |
Carl Sagan's Contact as a code worm | p. 129 |
It need not always be a Caesar | p. 131 |
Polybius's table | p. 133 |
Encoding with a number worm | p. 134 |
Chance has no memory | p. 136 |
Chance artificially produced | p. 139 |
Key worms in the telephone book | p. 143 |
Shuffled Texts | p. 145 |
Anagrams | p. 145 |
Shuffled text against shuffled alphabet | p. 146 |
The template of the Austrian colonel | p. 147 |
Transposition with keyword | p. 150 |
Polybius in World War I | p. 155 |
From Coding Disk to Enigma | p. 159 |
The invention of the wheel | p. 160 |
Three inventors-but only one became rich | p. 162 |
The curse of the reflecting cylinder | p. 169 |
The radio signal without L | p. 170 |
Hitler's Enigma | p. 172 |
Enigma's Secret is Unveiled | p. 178 |
Wanted: young mathematicians with an interest in cryptology | p. 179 |
The first six letters of the Enigma signals | p. 180 |
The German spy and the murdered chief of staff | p. 181 |
A bombe against Enigma | p. 182 |
Three mathematicians escape | p. 184 |
Rejewski's last decoding | p. 187 |
The Bletchley Park crowd | p. 188 |
The tragic story of Alan Turing | p. 192 |
The spy to whom Hitler disclosed his secrets | p. 194 |
Ultra's successful advance | p. 196 |
The Battle of the Atlantic | p. 198 |
Japanese radio signals from burning Berlin | p. 200 |
The Arrival of the Computer | p. 203 |
Other numerical systems | p. 204 |
Mathematics in a two-finger world | p. 206 |
Ciphers in the Telex system | p. 207 |
DES, the American standard system | p. 210 |
Encryption and authority | p. 211 |
Encryption Quite Publicly | p. 216 |
A short lesson on keys | p. 217 |
The recipe for asymmetrical encryption | p. 223 |
Mr. White encodes, Mrs. Black decodes | p. 225 |
Numbers that cannot be divided | p. 228 |
Sieved numbers | p. 230 |
What still awaits exploration | p. 233 |
Prime number encryption | p. 234 |
Asymmetrical but fast | p. 237 |
Smart Cards, One-Way Functions, and Mousetraps | p. 240 |
Who am I? | p. 241 |
The plastic card | p. 244 |
The secret number: a simple version | p. 245 |
Encoded PINs | p. 246 |
Mathematical mousetraps | p. 249 |
My bank account is protected by a one-way function | p. 250 |
The computer in the cash card | p. 251 |
The plastic card as wallet | p. 253 |
Electronic signatures | p. 261 |
Electronic IDs | p. 263 |
Connected to the Whole World | p. 267 |
How do I access the Internet? | p. 269 |
Online banking | p. 270 |
My brush with identity theft | p. 272 |
Using your mobile phone against internet pirates | p. 274 |
The homemade TAN | p. 274 |
On Dangerous Ground | p. 276 |
The one-way function | p. 276 |
The digital proposal | p. 277 |
How can I prove that I am me? | p. 279 |
How do I obtain a certificate and what do I do with it? | p. 279 |
A homemade encrypting machine | p. 283 |
Your computer as Enigma | p. 286 |
How the three magic key numbers are determined | p. 291 |
Further Reading | p. 295 |
Index | p. 297 |
Table of Contents provided by Ingram. All Rights Reserved. |
The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.