000 03828nam a22005655i 4500
001 978-3-319-08278-3
003 DE-He213
005 20200421112051.0
007 cr nn 008mamaa
008 140814s2014 gw | s |||| 0|eng d
020 _a9783319082783
_9978-3-319-08278-3
024 7 _a10.1007/978-3-319-08278-3
_2doi
050 4 _aQA76.9.D35
072 7 _aUMB
_2bicssc
072 7 _aURY
_2bicssc
072 7 _aCOM031000
_2bisacsh
082 0 4 _a005.74
_223
100 1 _aDonovan, Peter.
_eauthor.
245 1 0 _aCode Breaking in the Pacific
_h[electronic resource] /
_cby Peter Donovan, John Mack.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2014.
300 _aXXVI, 387 p.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
505 0 _aCommunications and Sigint -- Japanese Expansion 1895-1941 -- The GCCS 1919-1941 -- William Friedman and the US Army -- Early American Naval Sigint -- Developments in Australia -- Preparedness for Attack?- Major Technical Encryption Systems -- JN-25 and its Cryptanalysis -- Using Common Book Groups -- Recovery of a Code Book -- Breaking Additive Systems -- Making Additive Systems Secure -- Redundant Encryption -- The Scanning Distribution -- Ciphers and the Submarines -- Central Bureau 1942-1945 -- Organisation and Reorganisation -- Security, Censorship and Leaks -- Conclusion -- From Pearl Harbor to Midway -- Guadalcanal and Papua -- Rabaul and the Philippines.
520 _aThis book reveals the historical context and the evolution of the technically complex Allied Signals Intelligence (Sigint) activity against Japan from 1920 to 1945. It traces the all-important genesis and development of the cryptanalytic techniques used to break the main Japanese Navy code (JN-25) and the Japanese Army's Water Transport Code during WWII. This is the first book to describe, explain and analyze the code breaking techniques developed and used to provide this intelligence, thus closing the sole remaining gap in the published accounts of the Pacific War. The authors also explore the organization of cryptographic teams and issues of security, censorship, and leaks. Correcting gaps in previous research, this book illustrates how Sigint remained crucial to Allied planning throughout the war. It helped direct the advance to the Philippines from New Guinea, the sea battles and the submarine onslaught on merchant shipping. Written by well-known authorities on the history of cryptography and mathematics, Code Breaking in the Pacific is designed for cryptologists, mathematicians and researchers working in communications security. Advanced-level students interested in cryptology, the history of the Pacific War, mathematics or the history of computing will also find this book a valuable resource.
650 0 _aComputer science.
650 0 _aComputer security.
650 0 _aData structures (Computer science).
650 0 _aData encryption (Computer science).
650 0 _aCoding theory.
650 0 _aComputer science
_xMathematics.
650 0 _aComputers.
650 1 4 _aComputer Science.
650 2 4 _aData Structures, Cryptology and Information Theory.
650 2 4 _aData Encryption.
650 2 4 _aCoding and Information Theory.
650 2 4 _aMath Applications in Computer Science.
650 2 4 _aHistory of Computing.
650 2 4 _aSystems and Data Security.
700 1 _aMack, John.
_eauthor.
710 2 _aSpringerLink (Online service)
773 0 _tSpringer eBooks
776 0 8 _iPrinted edition:
_z9783319082776
856 4 0 _uhttp://dx.doi.org/10.1007/978-3-319-08278-3
912 _aZDB-2-SCS
942 _cEBK
999 _c57230
_d57230