Real Life Cryptology

A large number of enciphered documents survived from early modern Hungary. This area was a particularly fertile territory where cryptographic methods proliferated, because a large portion of the population was living in the frontier zone, and participated (or was forced to participate) in the networ...

Full description

Saved in:
Bibliographic Details
Main Author: Lang, Benedek (auth)
Format: Electronic Book Chapter
Language:English
Published: Amsterdam University Press 2018
Subjects:
Online Access:OAPEN Library: download the publication
OAPEN Library: description of the publication
Tags: Add Tag
No Tags, Be the first to tag this record!

MARC

LEADER 00000naaaa2200000uu 4500
001 oapen_2024_20_500_12657_28452
005 20180921
003 oapen
006 m o d
007 cr|mn|---annan
008 20180921s2018 xx |||||o ||| 0|eng d
020 |a 9789462985544 
020 |a 9789462985544 
040 |a oapen  |c oapen 
024 7 |a 10.5117/9789462985544  |c doi 
041 0 |a eng 
042 |a dc 
072 7 |a GPJ  |2 bicssc 
100 1 |a Lang, Benedek  |4 auth 
245 1 0 |a Real Life Cryptology 
260 |b Amsterdam University Press  |c 2018 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
506 0 |a Open Access  |2 star  |f Unrestricted online access 
520 |a A large number of enciphered documents survived from early modern Hungary. This area was a particularly fertile territory where cryptographic methods proliferated, because a large portion of the population was living in the frontier zone, and participated (or was forced to participate) in the network of the information flow. A quantitative analysis of sixteenth-century to seventeenth-century Hungarian ciphers (300 cipher keys and 1,600 partly or entirely enciphered letters) reveals that besides the dominance of diplomatic use of cryptography, there were many examples of "private" applications too. This book reconstructs the main reasons and goals why historical actors chose to use ciphers in a diplomatic letter, a military order, a diary or a private letter, what they decided to encrypt, and how they perceived the dangers threatening their messages. 
540 |a Creative Commons  |f https://creativecommons.org/licenses/by-nc-nd/4.0/  |2 cc  |4 https://creativecommons.org/licenses/by-nc-nd/4.0/ 
546 |a English 
650 7 |a Coding theory & cryptology  |2 bicssc 
653 |a Cryptography 
653 |a Early modern history 
653 |a History of science 
653 |a Social history 
856 4 0 |a www.oapen.org  |u https://library.oapen.org/bitstream/id/2627ed79-c5c6-47d0-91a1-94a7f7dea998/1001507.pdf  |7 0  |z OAPEN Library: download the publication 
856 4 0 |a www.oapen.org  |u http://library.oapen.org/handle/20.500.12657/28452  |7 0  |z OAPEN Library: description of the publication