Real Life CryptologyReal Life Cryptology
— Undetermined
Title rated 0 out of 5 stars, based on 0 ratings(0 ratings)
Website or Online Data, 2018
Current format, Website or Online Data, 2018, , In-library use only.Website or Online Data, 2018
Current format, Website or Online Data, 2018, , In-library use only. Offered in 0 more formatsA large number of enciphered documents survived from early modern Hungary. This area was a particularly fertile territory where cryptographic methods proliferated, because a large portion of the population was living in the frontier zone, and participated (or was forced to participate) in the network of the information flow. A quantitative analysis of sixteenth-century to seventeenth-century Hungarian ciphers (300 cipher keys and 1,600 partly or entirely enciphered letters) reveals that besides the dominance of diplomatic use of cryptography, there were many examples of?private? applications too. This book reconstructs the main reasons and goals why historical actors chose to use ciphers in a diplomatic letter, a military order, a diary or a private letter, what they decided to encrypt, and how they perceived the dangers threatening their messages.
Title availability
About
Subject and genre
Details
Publication
- Amsterdam University Press 2018.
Opinion
More from the community
Community lists featuring this title
There are no community lists featuring this title
Community contributions
There are no quotations from this title

From the community