Skip to:Content
Cover image for Cryptology unlocked
Cryptology unlocked
Personal Author:
Publication Information:
Hoboken, NJ : John Wiley & Sons, 2007
Physical Description:
xiii, 540 p. : ill. ; 24 cm.


Item Barcode
Call Number
Material Type
30000003487323 QA76.9.A25 W62 2007 Open Access Book

On Order



Cryptology includes data encryption (cryptography), cryptographic protocols and code breaking to provide the fundamentals of data security.

This new book introduces cryptography in a unique and non-mathematical style. Cryptology Unlocked explains encryption, crypto analysis (classic and modern algorithms), cryptographic protocols, digital standards and much more. This innovative book will reveal some of the dangers of code breaking, and highlights ways to master code-breaking and attack algorithms.

Topics range from the simplest enciphering methods to precise investigations of modern algorithms. Everything you need to understand the delicate balance between complex and actual information, with a peppering of anecdotes along the way.

Join the cryptology adventure, and understand:

The difference between good and bad algorithms Whether or not secret services can read all messages The real-world affect cryptography had on World War II The unspoken security risks behind digital mobile standards GSM and UMTS The everyday implications on digital signatures, PINs and online banking

Author Notes

Reinhard Wobst studied mathematics at Technical University of Dresden and obtained his PhD in the field of scholastic processes in 1980. He now works as an independent programmer for scientific and industrial applications in C/C++ as well as script languages.
In 1980, he conducted his first experiments with cryptographic algorithms. This hobby has led to numerous articles discussing cryptography, through to security consulting and security software development. All this writing has resulted in this book, which is now in its third edition in the original German and is published here in English for the first time.

Table of Contents

Cryptology from the Romans to World War II
Cryptanalysis in Detail
Development Milestones: DES, RSA
Life After DES: New Methods, New Attacks
Cryptographic Protocols
Practical Applications
Cryptology, Politics, and Business
Appendix 1 Sources of Information
Appendix 2 Bibliography
Go to:Top of Page