Nicht aus der Schweiz? Besuchen Sie lehmanns.de
Code Breaking in the Pacific - Peter Donovan, John Mack

Code Breaking in the Pacific

Buch | Softcover
XXVI, 387 Seiten
2016 | 1. Softcover reprint of the original 1st ed. 2014
Springer International Publishing (Verlag)
978-3-319-35982-3 (ISBN)
CHF 224,65 inkl. MwSt
  • Versand in 10-15 Tagen
  • Versandkostenfrei
  • Auch auf Rechnung
  • Artikel merken
This book reveals the historical context and the evolution of the technically complex Allied Signals Intelligence (Sigint) activity against Japan from 1920 to 1945. It traces the all-important genesis and development of the cryptanalytic techniques used to break the main Japanese Navy code (JN-25) and the Japanese Army's Water Transport Code during WWII. This is the first book to describe, explain and analyze the code breaking techniques developed and used to provide this intelligence, thus closing the sole remaining gap in the published accounts of the Pacific War. The authors also explore the organization of cryptographic teams and issues of security, censorship, and leaks. Correcting gaps in previous research, this book illustrates how Sigint remained crucial to Allied planning throughout the war. It helped direct the advance to the Philippines from New Guinea, the sea battles and the submarine onslaught on merchant shipping. Written by well-known authorities on the history of cryptography and mathematics, Code Breaking in the Pacific is designed for cryptologists, mathematicians and researchers working in communications security. Advanced-level students interested in cryptology, the history of the Pacific War, mathematics or the history of computing will also find this book a valuable resource.

Communications and Sigint.- Japanese Expansion 1895-1941.- The GCCS 1919-1941.- William Friedman and the US Army.- Early American Naval Sigint.- Developments in Australia.- Preparedness for Attack?- Major Technical Encryption Systems.- JN-25 and its Cryptanalysis.- Using Common Book Groups.- Recovery of a Code Book.- Breaking Additive Systems.- Making Additive Systems Secure.- Redundant Encryption.- The Scanning Distribution.- Ciphers and the Submarines.- Central Bureau 1942-1945.- Organisation and Reorganisation.- Security, Censorship and Leaks.- Conclusion.- From Pearl Harbor to Midway.- Guadalcanal and Papua.- Rabaul and the Philippines.

"It is an important contribution to both the history of the war and the history of cryptanalysis development, as well as an interesting text on techniques of cryptography and cryptanalysis. ... The book is well written and reads well. It is well referenced with myriad footnotes. I admire and recommend it." (Mordechai Ben-Menachem, Computing Reviews, April, 2015)

Erscheinungsdatum
Zusatzinfo XXVI, 387 p.
Verlagsort Cham
Sprache englisch
Maße 155 x 235 mm
Themenwelt Informatik Theorie / Studium Algorithmen
Schlagworte algorithms and data structures • Breaking additive systems • Censorship and leaks • ciphers • Code breaking • Coding and information theory • Coding theory and cryptology • Computer Science • Computer Security • Computing and information technology • Crypanalysis • Cryptology • Damning • data encryption • Data Structures, Cryptology and Information Theory • Encryption systems • Gap closing • History of Computing • History of engineering and technology • Information Theory • Math applications in computer science • Mathematical and statistical software • Maths for computer scientists • Network Security • Redundant encryption • systems and data security
ISBN-10 3-319-35982-7 / 3319359827
ISBN-13 978-3-319-35982-3 / 9783319359823
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich
IT zum Anfassen für alle von 9 bis 99 – vom Navi bis Social Media

von Jens Gallenbacher

Buch | Softcover (2021)
Springer (Verlag)
CHF 41,95
Interlingua zur Gewährleistung semantischer Interoperabilität in der …

von Josef Ingenerf; Cora Drenkhahn

Buch | Softcover (2023)
Springer Fachmedien (Verlag)
CHF 46,15