Show simple item record

dc.contributor.authorWolfe, Henry Ben_NZ
dc.date.available2011-04-07T03:05:36Z
dc.date.copyright1996-06en_NZ
dc.identifier.citationWolfe, H. B. (1996). Politics and techniques of data encryption (Information Science Discussion Papers Series No. 96/10). University of Otago. Retrieved from http://hdl.handle.net/10523/923en
dc.identifier.urihttp://hdl.handle.net/10523/923
dc.descriptionPlease note that this is a searchable PDF derived via optical character recognition (OCR) from the original source document. As the OCR process is never 100% perfect, there may be some discrepancies between the document image and the underlying text.en_NZ
dc.description.abstractCryptography is the art or science, depending on how you look at it, of keeping messages secure. It has been around for a couple of thousand years in various forms. The Spartan Lysander and even Caesar made use of cryptography in some of their communications. Others in history include Roger Bacon, Edgar Allan Poe, Geoffrey Chaucer, and many more. By today’s standards cryptographic techniques, through the ages right up to the end of World War I, have been pretty primitive. With the development of the electro-mechanical devices cryptography came of age. The subsequent evolution of the computer has raised the level of security that cryptography can provide in communications and data storage.en_NZ
dc.format.mimetypeapplication/pdf
dc.publisherUniversity of Otagoen_NZ
dc.relation.ispartofseriesInformation Science Discussion Papers Seriesen_NZ
dc.subject.lcshQA76 Computer softwareen_NZ
dc.titlePolitics and techniques of data encryptionen_NZ
dc.typeDiscussion Paperen_NZ
dc.description.versionUnpublisheden_NZ
otago.bitstream.pages10en_NZ
otago.date.accession2011-02-01 19:42:50en_NZ
otago.schoolInformation Scienceen_NZ
otago.openaccessOpen
otago.place.publicationDunedin, New Zealanden_NZ
dc.identifier.eprints1085en_NZ
otago.school.eprintsSecurity Research Groupen_NZ
otago.school.eprintsInformation Scienceen_NZ
dc.description.referencesSchneier, Bruce, Applied Cryptography, 2nd Edition, New York, John Wiley & Sons, Inc., 1996, ISBN 0-471-11709-9. Schneier, Bruce, E-MAIL SECURITY: How to Keep Your Electronic Messages Private, New York, John Wiley & Sons, Inc., 1995, ISBN 0-471-05318-X. Stallings, William, PROTECT YOUR PRIVACY: A Guide for PGP Users, Englewood Cliffs, New Jersey, Prentice Hall PTR, 1995, ISBN 0-13-185596-4. Bamford, James, The Puzzle Palace, Harmondworth, England, Penguin Books, Ltd., 1983, ISBN 0-14-006748-5. Kahn, David, THE CODE-BREAKERS: The Story of Secret Writing, New York, MacMillan Publishing Company, 1967, ISBN 0-02-560460-0. Bok, Sissela, SECRETS: Concealment & Revelation, Oxford, England, Oxford University Press, 1986, ISBN 0-19-286072-0.en_NZ
otago.relation.number96/10en_NZ
 Find in your library

Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record