Skip to main content Accessibility help
×
Hostname: page-component-77c89778f8-vsgnj Total loading time: 0 Render date: 2024-07-16T10:24:37.809Z Has data issue: false hasContentIssue false
This chapter is part of a book that is no longer available to purchase from Cambridge Core

Preface to the First Edition

Todd Feil
Affiliation:
Denison University
Get access

Summary

To a very great extent, mankind owes its progress to the ability to communicate, and a key aspect in this ability is the capability of communicating in writing. From the earliest days of writing, there have been occasions when individuals have desired to limit their information to a restricted group of people. They had secrets they wanted to keep. To this end, such individuals developed ideas by means of which their communications could be made unintelligible to those who had not been provided with the special information needed for decipherment. The general techniques used to accomplish such a purpose, i.e. the hiding of the meaning of messages, constitute the study known as cryptography.

Before the development of postal systems and electrical transmission of information, the usual manner of sending a communication was by private messenger. Even under these circumstances the use of the concealment tactics of cryptography was often advisable because of the possibility that the messenger might be apprehended or prove disloyal. In recent times a message transmitted by radio could be copied by anyone having appropriate equipment and listening to the right frequency at the right time. In such a case, a sender desiring privacy of communication would be required to employ some method of cryptographic concealment.

Now, just as the sender of the message attempted to conceal information from any but the desired recipient, there would be individuals very much interested in determining what the message said—most probably the very individuals from whom the sender was trying to keep the information.

Type
Chapter
Information
Elementary Cryptanalysis
A Mathematical Approach
, pp. ix - xii
Publisher: Mathematical Association of America
Print publication year: 2009

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

Save book to Kindle

To save this book to your Kindle, first ensure coreplatform@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

Available formats
×