Nicht zu knacken by Klaus Schmeh

By Klaus Schmeh

San Francisco. Späte 60er Jahre. Eine Stadt hält den Atem an. Der Zodiac-Killer mordet in Serie. Und er schickt verschlüsselte Botschaften an die lokale Zeitung. Selbst die Nationale Sicherheitsagentur NSA scheitert daran, ihren Code zu knacken. Die Identität des Mörders wurde nie gelüftet. In "Nicht zu knacken" hat Klaus Schmeh die faszinierendsten Rätsel der Verschlüsslungsgeschichte zusammengetragen. Er lässt uns die Frustrationen und Heureka-Momente der Codeknacker miterleben. Ob sie von Serienmördern an der Nase herumgeführt werden, sich an Enigma-Codes aus dem Zweiten Weltkrieg oder an Nachrichten des Spions Günter Guillaume die Zähne ausbeißen. Ein Buch voller abenteuerlicher Geschichten, das nebenbei einen Beitrag zur Lösung der größten kryptologischen Rätsel der Gegenwart leistet.

Show description

Read or Download Nicht zu knacken PDF

Best cryptography books

Introduction to Cryptography

As a result of the quick progress of electronic communique and digital information alternate, info protection has turn into a vital factor in undefined, enterprise, and management. glossy cryptography offers crucial ideas for securing details and preserving info. within the first half, this ebook covers the main recommendations of cryptography on an undergraduate point, from encryption and electronic signatures to cryptographic protocols.

Public Key Cryptography – PKC 2004: 7th International Workshop on Theory and Practice in Public Key Cryptography, Singapore, March 1-4, 2004. Proceedings

This e-book constitutes the refereed lawsuits of the seventh foreign Workshop on thought and perform in Public Key Cryptography, PKC 2004, held in Singapore in March 2004. The 32 revised complete papers provided have been rigorously reviewed and chosen from 106 submissions. All present matters in public key cryptography are addressed starting from theoretical and mathematical foundations to a large number of public key cryptosystems.

The Mathematics of Coding Theory, 1st Edition

This e-book makes a really available creation to an important modern software of quantity concept, summary algebra, and likelihood. It comprises quite a few computational examples all through, giving novices the chance to use, perform, and money their figuring out of key options. KEY themes insurance begins from scratch in treating likelihood, entropy, compression, Shannon¿s theorems, cyclic redundancy assessments, and error-correction.

Extra info for Nicht zu knacken

Sample text

The code is self-enforced by the technical infrastructure in the sense that it is bound to operate based on the underlying code and cannot deviate. A property transfer specified in the code cannot but occur as encoded. Blockchainbased smart property thus contemplates the possibility of widespread decentralized trustless asset management systems as well as cryptographically activated assets. There could be widespread implications for the entire field of property law—or great simplifications in that property ownership can be recorded on the property itself: Trustless lending The trustless networks feature of blockchain technology is a key enabler in the con‐ text of smart property and smart contracts.

One blockchain infrastructure project aiming to deliver a Turingcomplete scripting language and Turing-complete platform is Ethereum. Ethereum is a platform and a programming language for building and publishing dis‐ tributed applications. More fundamentally, Ethereum is a foundational generalpurpose cryptocurrency platform that is a Turing-complete virtual machine (meaning that it can run any coin, script, or cryptocurrency project). Rather than being a block‐ chain, or a protocol running over a blockchain, or a metaprotocol running over a protocol like other projects, Ethereum is a fundamental underlying infrastructure platform that can run all blockchains and protocols, rather like a unified universal development platform.

Org/ Bitcoin asset marking for digital/physical assets Bitcoin blockchain overlay Wallet Development Projects Perhaps the primary category of applications being built atop blockchain protocols is wallets. Wallets are obviously a core infrastructural element for cryptocurrencies, because they are the mechanism for the secure holding and transfer of Bitcoin and any cryptographic asset. Table 2-3 lists some of the different wallet projects and com‐ panies in development, with their name and URL and the underlying platform upon which they are built.

Download PDF sample

Rated 4.36 of 5 – based on 25 votes