- Page 2 and 3: This page intentionally left blank
- Page 6 and 7: published by the press syndicate of
- Page 8 and 9: vi contents 4 Jigsawciphers 40 Tran
- Page 10 and 11: viii contents Thekeydistributionpro
- Page 12 and 13: x preface It is the author’s beli
- Page 14 and 15: 2 chapter 1 buy or sell a large num
- Page 16 and 17: 4 chapter 1 Cryptography is the stu
- Page 18 and 19: 6 chapter 1 Historically, two basic
- Page 20 and 21: 8 chapter 1 messages will depend on
- Page 22 and 23: 10 chapter 1 designed systems of th
- Page 24 and 25: 12 chapter 1 not occasionally women
- Page 26 and 27: 14 chapter 2 Table 2.1 Shift Messag
- Page 28 and 29: 16 chapter 2 None of these look ver
- Page 30 and 31: 18 chapter 2 which is written in ma
- Page 32 and 33: 20 chapter 2 (2) Since Y, with 49 o
- Page 34 and 35: 22 chapter 2 15 16 17 18 19 20 21 2
- Page 36 and 37: 24 chapter 2 help or a hindrance to
- Page 38 and 39: 26 chapter 2 How many letters are n
- Page 40 and 41: 3 Polyalphabetic systems Strengthen
- Page 42 and 43: 30 chapter 3 A Vigenère cipher is
- Page 44 and 45: 32 chapter 3 Table 3.1 Letter ABCDE
- Page 46 and 47: 34 chapter 3 Thus in the example ab
- Page 48 and 49: 36 chapter 3 Message 1 and message
- Page 50 and 51: 38 chapter 3 would typically be bet
- Page 52 and 53: 4 Jigsaw ciphers In this chapter we
- Page 54 and 55:
42 chapter 4 Cryptanalytic attack S
- Page 56 and 57:
44 chapter 4 Likewise the second ci
- Page 58 and 59:
46 chapter 4 and 1 and 2 are 9 plac
- Page 60 and 61:
48 chapter 4 and the cipher text is
- Page 62 and 63:
50 chapter 4 (iii) Use a hexagon. I
- Page 64 and 65:
52 chapter 4 double transposition s
- Page 66 and 67:
5 Two-letter ciphers It may seem na
- Page 68 and 69:
56 chapter 5 headed ‘1’, which
- Page 70 and 71:
58 chapter 5 French cryptanalyst, G
- Page 72 and 73:
60 chapter 5 The Playfair square is
- Page 74 and 75:
62 chapter 5 Playfair system as the
- Page 76 and 77:
6 Codes Characteristics of codes As
- Page 78 and 79:
66 chapter 6 major factor in Americ
- Page 80 and 81:
68 chapter 6 before, to remind ours
- Page 82 and 83:
70 chapter 6 The sequence beginning
- Page 84 and 85:
7 Ciphers for spies A spy operating
- Page 86 and 87:
74 chapter 7 have been underlined i
- Page 88 and 89:
76 chapter 7 We first convert the t
- Page 90 and 91:
78 chapter 7 Table 7.3 Decipher tab
- Page 92 and 93:
80 chapter 7 Table 7.4 Letter frequ
- Page 94 and 95:
82 chapter 7 There are a few plausi
- Page 96 and 97:
84 chapter 7 We now turn our attent
- Page 98 and 99:
86 chapter 7 been enciphered using
- Page 100 and 101:
88 chapter 7 From CT2: (cipher�ke
- Page 102 and 103:
90 chapter 7 The message was again
- Page 104 and 105:
92 chapter 7 Table 7.7 6 1 10 4 8 1
- Page 106 and 107:
8 Producing random numbers and lett
- Page 108 and 109:
96 chapter 8 the spin, the sequence
- Page 110 and 111:
98 chapter 8 signal which is used t
- Page 112 and 113:
100 chapter 8 If we replace each te
- Page 114 and 115:
102 chapter 8 To take an easily ver
- Page 116 and 117:
104 chapter 8 Cryptanalysis of a li
- Page 118 and 119:
106 chapter 8 machines have been bu
- Page 120 and 121:
108 chapter 8 multiplier built into
- Page 122 and 123:
9 The Enigma cipher machine Histori
- Page 124 and 125:
112 chapter 9 The original Enigma T
- Page 126 and 127:
114 chapter 9 Plate 9.2 The other s
- Page 128 and 129:
116 chapter 9 Plate 9.4 The Enigma
- Page 130 and 131:
118 chapter 9 The ‘dots’ indica
- Page 132 and 133:
120 chapter 9 This plethora of subs
- Page 134 and 135:
122 chapter 9 acquired a military-v
- Page 136 and 137:
124 chapter 9 Figure 9. 3. B P K I
- Page 138 and 139:
126 chapter 9 H) and (C, Q) are suc
- Page 140 and 141:
128 chapter 9 Ironically, if the ci
- Page 142 and 143:
130 chapter 9 Table 9.3 Setting 1 S
- Page 144 and 145:
132 chapter 9 Doubly enciphered Eni
- Page 146 and 147:
134 chapter 10 so that there is rec
- Page 148 and 149:
136 chapter 10 Plate 10.1 A Hagelin
- Page 150 and 151:
138 chapter 10 Note that the 19- an
- Page 152 and 153:
140 chapter 10 Table 10.2 Encipher/
- Page 154 and 155:
142 chapter 10 (a) 0, 2, 3, 4, 8, 1
- Page 156 and 157:
144 chapter 10 7-Wheel 5 0 5 5 0 0
- Page 158 and 159:
146 chapter 10 combinations of the
- Page 160 and 161:
148 chapter 10 the numerical value
- Page 162 and 163:
150 chapter 10 comparing the two te
- Page 164 and 165:
152 chapter 10 corresponding to an
- Page 166 and 167:
154 chapter 11 Plate 11.1 An SZ42 c
- Page 168 and 169:
156 chapter 11 in many books such a
- Page 170 and 171:
158 chapter 11 Solution Plaintext l
- Page 172 and 173:
160 chapter 11 The third of these w
- Page 174 and 175:
162 chapter 12 as finding if the bi
- Page 176 and 177:
164 chapter 12 eight-bit) character
- Page 178 and 179:
166 chapter 12 one or more keys whi
- Page 180 and 181:
168 chapter 12 so 29 3 �29�15
- Page 182 and 183:
13 Encipherment and the internet Ge
- Page 184 and 185:
172 chapter 13 The opposite problem
- Page 186 and 187:
174 chapter 13 Fermat’s ‘Little
- Page 188 and 189:
176 chapter 13 should, in this case
- Page 190 and 191:
178 chapter 13 so 1�7�2�3 but
- Page 192 and 193:
180 chapter 13 Finally then (214) 1
- Page 194 and 195:
182 chapter 13 How does the key-own
- Page 196 and 197:
184 chapter 13 (6) Forty-eight bits
- Page 198 and 199:
186 chapter 13 Chaining Since the D
- Page 200 and 201:
188 chapter 13 (4) the session key
- Page 202 and 203:
Appendix Mathematical aspects Chapt
- Page 204 and 205:
192 appendix Suppose that we have a
- Page 206 and 207:
194 appendix Discussion of the Fibo
- Page 208 and 209:
196 appendix and, since all random
- Page 210 and 211:
198 appendix The ratio of consecuti
- Page 212 and 213:
200 appendix Solution A linear recu
- Page 214 and 215:
202 appendix Verification If such a
- Page 216 and 217:
204 appendix wires must give rise t
- Page 218 and 219:
206 appendix Putting N�26 we obta
- Page 220 and 221:
208 appendix The extreme values of
- Page 222 and 223:
210 appendix (2) In using modular a
- Page 224 and 225:
212 appendix For the RSA encipherme
- Page 226 and 227:
214 appendix so but so Hence 1�6
- Page 228 and 229:
216 appendix So, for example, the p
- Page 230 and 231:
Solutions to problems Chapter 2 2.1
- Page 232 and 233:
220 solutions to problems Chapter 4
- Page 234 and 235:
222 solutions to problems Table S.3
- Page 236 and 237:
224 solutions to problems Chapter 7
- Page 238 and 239:
226 solutions to problems Chapter 9
- Page 240 and 241:
228 solutions to problems The solut
- Page 242 and 243:
References Chapter 1 [1.1] Hill, R.
- Page 244 and 245:
232 references [6.7] Almost any ele
- Page 246 and 247:
234 references [12.8] Rabin, M.O.:
- Page 248 and 249:
236 name index Piper, F. 233 Poe, E
- Page 250 and 251:
238 subject index computers early 1
- Page 252:
240 subject index polyalphabetic sy