The Virtual Bookcase : Shelf Privacy
Your privacy, protecting it through encryption, the law.
Shelf parts : First Previous Next Last
Review:
The book seems to be rather ambitious, since the preface says that it
is addressed to any (and therefore all) audience(s), without any
limitation on the stated purpose.
Part one addressed secret key (symmetric) cryptography. Chapter one
tries to draw an analogy between locks and encryption, although the
relation is strained at best. Substitution, frequency analysis, and
polyalphabetic ciphers are covered in chapter two. Chapter three
introduces transposition. The Polybius square is used, in chapter
four, as an example of the combination of substitution and
transposition. For those in the know, this leads nicely into the
discussion of DES (Data Encryption Standard), in chapter five,
although the neat segue would be lost on most reader...
Rest of this review on the detail page
(Review by Rob Slade)
I want to add my review for this book!
Reviews (1) and details of Cryptography Decrypted
Shelf parts : First Previous Next Last