|
|
Авторизация |
|
|
Поиск по указателям |
|
|
|
|
|
|
|
|
|
|
Bauer F.L. — Decrypted Secrets: Methods and Maxims of Cryptology |
|
|
Предметный указатель |
Pangram 266—267
Panizzardi, Alessandro 213
Parallels see repetitions
Parker, R.D. 386
Parkerism 482
Partition 49 110 291—292 297—304
Paschke, Adolf 415 483 484
Password 45 47 50—51 53—54 56—57 59 64 94 98 100—102 108 131 134 137 141 166—170 179 190 192 197 192 211 256 276 279 314 315 364 460 463 469
Password, reconstruction of 373—374
Pastoure 9
Pastry dough mixing 174
Patrick, J.N.H. 172
Patronen — Geheimschrift 96
Pattern 78 252—254
Pattern finding method 234 252—259 260 264—266 439—440 466—467 479
Pattern, normal form of patterns 252
Pawl 117 397
Pearl Harbor 18 214
Pendergrass, James T. 457
Penetmzione squadra 214 475
Pepys, Samuel 9
Perch (link) 411
Perec, Georges 257 258
Perfect security 487 491—493
Period length 144 157 340 348
Perioden- und Phasensuchgeraet 335 344
Periodic 36 139—140 145 168 330 339
Perl, William 164
Permutation 22 36 46—52 59 63 143
Permutation class 398
Permutation, construction of 102
Permutation, properly self-reciprocal 48 61 433 434 437 445 449 451
Permutation, self-reciprocal 47 48 59 62 67 82 85
PERMUTE encryption step 131 136 242 244
Pers Z 154 115 464 467 470 483
Petard (destroyer) 219
PETER ROBINSON 337 407
Peter the Great 45 71
Peterson's (code) 76
Phaistos,disc of 26 Plate
Phi 327—328 332 345
Phi Test 345—349 416
Philby, Harold 164
Philip II of Spain 70
Phillips, Cecil James 164
Photoelectric sensing 335 338 339 344 345 372 373
Picture encryption 175—178
Picture transmission 495
Pierce, Clayton 143
Pig Latin 22
Pinion/cogwheel 124 148
Piper, F. 499
Placode, plain code 370—373 414—415
Plaintext 32—42 43 46
Plaintext attack, chosen 479 480
Plaintext attack, derived 480
Plaintext attack, known 479 480
Plaintext vocabulary 33
Plaintext-cryptotext compromise 224 288—289 375 437 448—457 474—475 479
Plaintext-plaintext compromise 212 224 375—376 387 389 398 399 409 419 421 467 478
Planned obsolescence 27 76 78 235
PLAYFAIR encryption step 64—67 214 225 239 248 314 316—317 332
Playfair, Lyon Baron of St. Andrews 27 64
Plugboard 48 92 118 120 123—124 148—151 153 156 172 179 282 445 451 482
Poe,Edgar Allan 5 295 317 331 354
Pokorny, Hermann 49 259 472
Polar-es (Schiff 26) (ship) 218 444
Polhem, Christofer 54
Pollard, John 198 201
POLLUX 180
Polyalphabetic encryption 15 35 87 106 131 133 139 ] 144—145 157 204 217 223 234 241—243 248 251—252 268 330
Polybios square 40 53 57 67 114 173 179 382
Polygraphic 35 36 58 70 80—81 98 203
Polygraphic substitution 58 140 141 178 234 239
Polymorphism 398
Polyphones, polyphony 37—38 50 73—74 134 159 251 255 279 292 295 460
Pomerance, C. 198
Poore, Ralph Spencer 190
Porta, Giambattista PORTA encryption step 41 130 159—160 225 268 271—272 280 382
Porta. Giovanni Battista see Delia
Postal Congress, International 112
Poste de Commandement Bruno 447
Powers of a mixed alphabet 50 52 84 106 107 127 156 374
ppmpqs 198
Pratt, Fletcher 306 500
Praun, Albert 211
Preamble 432 439 469
Pretty Good Privacy (PGP) 191—192 228
Primary alphabet 106—109 130 142 168 69 350 354—355 357—359 364 373
Priming key 159—161 188
Primitive root 200
PRIMROSE 482
Private key 194—196 480
Probable word 2] 1 224 245 259—264 265 268—272 273—281 459—462 467 479
Prof's book 281 416 443
Progressive encryption 140 145 157 275
Properly self-reciprocal 47 115 130 143 225 238 268 433
Protocol 209 230 485
Pseudorandom keytext 168 188 192 495
Psi 324—325 326 327 328—329
Psi-wheel 393—395 403 404 410
Ptydepe 258
Public cryptography 7—8 32 210 236 480
Public key system V 193 195—208 210
Punched card machines 279 333—335 415
Punched sheets 442—443 445—447
Punctuation 19 20 38—39 224 309—310
Pure (cryptosystem) 43 170 377—378 388
Pure cryptanalysis 217 265 310 314 338 394 454 478—480 486
PURPLE 4 153—156 415 476 482
Pyry 442—443 446
Python 339 457
Q-boat 444
Qalqashandi 45
Quadratic reciprocity 202
Quadratic sieve 198 199 201
Quasi-nonperiodic key 144—145 158 161 217 460
Quaternary cipher 40 140
Quatsch 216 406
Quinary cipher 40
Quine, Willard van Orman 3
Quinpartite simple substitution 55
QWERTZU 433 436 438
R.S.H.A.Amt VI 60 61 470
Rabin, M.O. 202
Radio call signal 60 87
Rail fence transposition 95
Raising to a power modulo q 182 202
Ramsey, Frank Plumpton 496
Randell, Brian VI 498
Random key sequence 161 163 164 495
Random text 215 254
Random variable 488
RAPID SELECTOR 345
Raps, August 385
Rasterschliissel 44- 101
Ratchet wheel notch 117
Ratcliff, Rebecca 470
RATTLER 339 457
Rave, Cort 415 472
Raven, Frank 156
Razvedupr 476
RC2, RC4 190
Rebus 69
Reciphering 171
Reciprocal pairs 88—90 182 183
Recovery exponent 205—207 208
Rectangle method 409
RED (code) 77 211
RED (key net) 443 447 448 484
| RED (machine) 87 153—156 415
Reductio ad absurdum 446
Reencipherment, reencodement 224 420
Reflection 47—49 51 52 60 8 187 378
Reflection, genuine 48
Reflector 111—118 120 121 123—125 288
Reflector, pluggable 120 123 286 457
Regular matrix 83 85 86 90 460
Reichling, Walter 18
Reichs-Marineamt 111—112
Reichsbahn, Deutsche 118 124 375
Reichsluftfahrtministerium 32
Reichspost, Deutsche 10 118
Reichssicherheitshauptamt 60—61 470
Reichswehr 32 48 117—118 166 433 474
Rejewski, Marian VII 2 2 92 431 433—440 442 445 447 448 477 482 496
Remmert,Reinhold 84
Renyi, Alfred 329 485
Renyi-rt-entropy 329
Reparto crittogrvfico 259
repeat rate 416
Repetition pattern 252—259
Repetitions 335 339—345 346 351 359 365
Repetitions, accidental 341—344 365
Reqlette 52
Residue classes (messages) 43 252 371
Residue classes (numbers) 80 83 85 181
Reversal 291 294
Reversed alphabet 47 90 129 173 252
Reverses 76 306
Ribbentrop, Joachim von 32 415 470
Richelieu, Armand Jean du Plessis Duede 23 98
Riesel, Hans 203
Right- univalent 33
Rijmen, Vincent 191
Rijndael 191
Ring setting 117 121 122 126 148 168 219 432 437—441 444 448 481—482
Ringelnatz, Joachim 21 22
Rittler, Franz 258
Rivest, Ronald L. 203 204
ROBINSON AND CLEAVER 337 338 407
Robinson, Ralph M. 157
ROCKEX 164
Rogers, Henry 75
Rohrbach's maxim 224 256 266 354—355 365 428 460 472 474 477 482—483 497
Rohrbach, Hans VI 3 135 217 220 224 235 255 256 278—280 281 464 471
Rohwer, Juergen 121 155 212 415 473 498
Romanini, Ch. Vesin de 295
Rommel, Erwin 223 411 448 474
ROMSing 416
Ronge, Maximilian 259 472
Room 40 420 443 484
Room 47 Foreign Office 31 442
Roosevelt, Franklin Delano 10 69 77 135 152 214 221 224 423 456 475
Rosen, Leo 4 286 476
Rosenberg, Julius and Ethel 164
Rossberg,Ehrhard 170 387
Rosser,Barkley 3
Rossignol, Antoine 71 72 140
Rotated alphabets 107 109—110 126 137 281—282
Rothstein, J. 137
Rotor 110—113 114—116 117—126 330
ROTOR encryption step 109—110 169 281 357
Rotor movement,irregular 145—148 151 155
Rotor order see wheel order
Rotor, 'fast' (rightmost) 148 282 284 436 439
Rotor, 'medium' (middle) 148 282 284—286
Rotor, regular 145—146 148
Rotor,'slow' (leftmost) 148
Rotscheidt, Wilhelm 415
Rotterdam — Gerat 221
Rotwelsch 15
Route transcription 94
Row-column transcription 94
Rowlett, Frank 87 123 150 151 154 155 163 471 483 498
Royal Flags Wave Kings Above 148
Rozycki. Jerzy VII 166 415 415—418 431 437 440 442 447
RSA method 203—205 207—208 210
Rudolf Mosse (code) 76
Rudolf, Erzherzog von Habsburg 97 97
Rundstedt, Gerd von 411 412
Running down the alphabet 245
Running key 36 140 158 179 210
Russian copulation 57 151 215 260 449
Russians 3 11 28 49 53 71 150 152 162 163 217 227 280 476 485
S-box 184 185 189
S.I.S.(Secret Intelligence Service) 30
S.O.E. 101
SA Cipher 37 74
Sacco, Luigi VI 131 139 216 223 236 259 295 296 472 500
Safe primes 183 207
Safford, Laurance F. 3
Saga 281 436
Saint-Cyr slide 41 52 129
Sale, Tony 168
Salomaa, Arto 43 146 170 196 197 199 203 204 207 499
Sampling theorem 495
Sandherr, Jean 213
Sandwith, Humphrey 442
Satzbuch 72 73 78 172
Sayre, David 486
Schauffler, Rudolf 162 415
Schellenberg, Walter 10 32 60
Scherbius, Arthur 111 112 113 114 145 147 445
Schiff 26 (ship) 218 444
Schiff 45 (ship) 219
Schilling von Cannstatt, Paul 28
Schimmel, Annemarie 278
Schleyer, Johann Martin 368
SchluesselgerSt 41 147
Schluesselheft 69 172
Schluesselhenngruppe 412 444
Schluesselzusatz 171 372 387—389 397 N
Schmidt, Arno 30
Schmidt, Hans-Thilo (Asche) 118 432 433 437
Schmidt, Rudolf 118 433
Schneickert,Hans 97 500
Schneier, Bruce 499
Schnelltelegrnph 385
Schnorr, Claus-Peter 163 209
Schott, Caspar 9
Schroder, Georg 472
Schur,Issai 496
Schwab, Henri 469
Scissors-and-paste method 251 464
Scoring, method of 416
SCORPION (key net) 448 482
Scrambler 445—446 448—451 453—456 482
Scritch, scritchmus 282 286—287 457
SD see Sicherheitsdienst
SEAHORSE, 'Bertok' (key net) 482
Sebag-Montefiori, Hugh 418 498
Secrecy 2 25 26 27 30 69—70 194
Secret Intelligence Service (S.I.S.) 30
Secret marks 14 28 44—45 69
Secret writing, covert 9 24 139
Secret writing, masked 13—16 18 24
Secret writing, overt 9 24 32
Secret writing, veiled 19 23 24
Secure Sockets Layer (SSL) 192
Security check 209 218
Seifert, Walther 472
Selchow, Kurt 415
Self-reciprocal linear substitution 82
Self-reciprocal matrix 85 86
Self-reciprocal permutation 47 48 90 115 172 256 340 383 386 392 434 482
Self-steckered letter 445 451
Selmer, Ernst S. 3 398
Semagram 10 11 12 24 53
Senary cipher 40
|
|
|
Реклама |
|
|
|