English | MP4 | AVC 1280×720 | AAC 44KHz 2ch | 109 Lessons (16h 51m) | 2.56 GB

Explore the fascinating and rich world of Secret Key cryptography! This book provides practical methods for encrypting messages, an interesting and entertaining historical perspective, and an incredible collection of ciphers and codes—including 30 unbreakable methods.

In Secret Key Cryptography: Ciphers, from simple to unbreakable you will:

- Measure the strength of your ciphers and learn how to guarantee their security
- Construct and incorporate data-compression codes
- Generate true random numbers in bulk
- Construct huge primes and safe primes
- Add an undetectable backdoor to a cipher
- Defeat hypothetical ultracomputers that could be developed decades from now
- Construct 30 unbreakable ciphers

Secret Key Cryptography gives you a toolbox of cryptographic techniques and Secret Key methods. The book’s simple, non-technical language is easy to understand and accessible for any reader, even without the advanced mathematics normally required for cryptography. You’ll learn how to create and solve ciphers, as well as how to measure their strength. As you go, you’ll explore both historic ciphers and groundbreaking new approaches—including a never-before-seen way to implement the uncrackable One-Time Pad algorithm.

Whoever you are, this book is for you! History buffs will love seeing the evolution of sophisticated cryptographic methods, hobbyists will get a gentle introduction to cryptography, and engineers and computer scientists will learn the principles of constructing secure ciphers. Even professional cryptographers will find a range of new methods and concepts never published before.

From the Roman empire’s Caesar cipher to the WWII Enigma machine, secret messages have influenced the course of history. Today, Secret Key cryptography is the backbone of all modern computing infrastructure. Properly designed, these algorithms are efficient and practical. Some are actually unbreakable, even using supercomputers or quantum technology!

Secret Key Cryptography teaches you how to create Secret Key ciphers, ranging from simple pen-and-paper methods to advanced techniques used in modern computer-based cryptography. It reveals both historic examples and current innovations. You’ll learn how to efficiently encrypt large files with fast stream ciphers, discover alternatives to AES encryption, and avoid strong-looking but weak ciphers. Simple language and fun-to-solve mini-ciphers make learning serious concepts easy and engaging.

What’s Inside

- Construct 30 unbreakable ciphers
- Measure the strength of your ciphers and guarantee their security
- Add an undetectable backdoor to a cipher
- Defeat hypothetical ultracomputers of the future

## Table of Contents

1 Introduction

2 What is cryptography

3 Types of cryptography

4 Mechanical vs. digital

5 Why choose Secret Key

6 Preliminary concepts

7 Number bases

8 Prime numbers

9 Cryptographer’s toolbox

10 Transposition

11 Chained digit generator

12 Substitution ciphers

13 Simple substitution

14 Mixing the alphabet

15 Nomenclators

16 The Kasiski method

17 Index of Coincidence

18 Solving a polyalphabetic cipher

19 Solving a general polyalphabetic cipher

20 Running key

21 Simulated rotor machines

22 Three-rotor machine

23 Countermeasures

24 Interrupted key

25 Bigram and trigram substitution

26 Adding null bits

27 Transposition

28 Columnar transposition

29 Double columnar transposition

30 Key transposition Part 1

31 Key transposition Part 2

32 Jefferson Wheel Cypher

33 Ciphertext-only solution

34 Fractionation

35 Solving a Playfair cipher

36 Three Square

37 Bifid

38 Diagonal bifid

39 Rectangular grids

40 Cyclic 8×N

41 Variable-length fractionation

42 Periodic lengths

43 Post tag systems

44 Different-length tags

45 Text compression

46 Arithmetic coding

47 Adaptive arithmetic coding

48 Block ciphers

49 Double DES

50 Matrix multiplication

51 Fixed vs. keyed substitution

52 Involutory block cipher

53 Ripple ciphers

54 Block chaining

55 Chaining mode summary

56 Principles for secure encryption

57 Confusion

58 Correlation coefficient

59 Base-26 linearity

60 Base-256 linearity

61 Adding a backdoor

62 Condensed linearity

63 Constructing an S-box

64 Diffusion

65 Saturation Part 1

66 Saturation Part 2

67 Stream ciphers

68 Multiplicative congruential generator Part 1

69 Multiplicative congruential generator Part 2

70 Linear congruential generator

71 Chained addition generator

72 Mersenne Twister

73 Estimating the period

74 Combining generators Part 1

75 Combining generators Part 2

76 True random numbers

77 Refreshing the random bytes

78 Hash functions

79 One-time pad

80 Key supply

81 Diffie-Hellman key exchange

82 Constructing large primes, new Part 1

83 Constructing large primes, new Part 2

84 Matrix methods

85 Transposition matrix

86 Hill cipher, computer versions

87 Large integer multiplication

88 Solving a linear congruence

89 Laddering

90 Large integer ciphers

91 Multiplication modulo P

92 Rings

93 Matrices over a ring

94 Finding an invertible matrix

95 Three pass protocol

96 Discrete logarithm

97 Factoring

98 Matrix three pass protocol

99 Maximum order

100 Solving bilinear equations

101 Two-sided three pass protocol

102 Codes

103 Quantum computers

104 Error correction

105 Equations

106 Minimization

107 Ultracomputers

108 Ultrasubstitution cipher US-A

109 Epilogue

Resolve the captcha to access the links!