问答文章1 问答文章501 问答文章1001 问答文章1501 问答文章2001 问答文章2501 问答文章3001 问答文章3501 问答文章4001 问答文章4501 问答文章5001 问答文章5501 问答文章6001 问答文章6501 问答文章7001 问答文章7501 问答文章8001 问答文章8501 问答文章9001 问答文章9501

求密码学英文文献

发布网友 发布时间:2023-04-15 05:00

我来回答

2个回答

热心网友 时间:2023-10-14 10:20

从美国百科大全书里搜到,希望能有所帮助。翻译就算了吧……
Cryptology, the technology of making and breaking codes and ciphers, has furnished America with excellent protection for its transmitted documents and with its best intelligence.

Revolution to World War I

James Lovell, a member of the Continental Congress who may be considered America's first cryptanalyst, solved British cryptograms for the rebels. One of them enabled Washington to alert the French admiral Comte de Grasse to blockade Yorktown, which then surrendered. Edgar Allan Poe popularized cryptology in 1843 with his story "The Gold Bug." During the Civil War, the Union utilized a word-transposition cipher; the South, a letter-substitution. The State Department printed its first cable code in 1867. In 1878, the New York Tribune solved and published encrypted telegrams showing that Democrats had bought electoral votes for Samuel J. Tilden in 1876. Though the Republican candidate, Rutherford B. Hayes, had nevertheless won the presidency, the disclosures helped lead to Republican gains in the midterm elections and to a Republican president, James A. Garfield, in 1880.

Code Breaking

Though some army officers investigated cryptology, the United States had no official cryptanalytic bureau until World War I. U.S. involvement in the war came about in part through codebreaking: Britain had cryptanalyzed a German offer to Mexico to make joint war on the United States; five weeks after newspapers headlined this, Congress declared war on Germany. In the spring of 1917, the Army's Military Intelligence Section established a codebreaking agency, called MI-8, placing a charismatic former State Department code clerk, Herbert O. Yardley, in charge. One of its solutions convicted a German spy. The American Expeditionary Forces had its own codebreaking unit, G.2 A.6, to solve German front-line codes, and its own Code Compilation Section, which printed and distributed new codes every few weeks. In 1919, MI-8 evolved into the joint Army-State Cipher Bureau under Yardley. During the Washington naval disarmament conference of 1921–1922, it solved Japanese diplomatic messages that helped America compel Tokyo to accept the equivalent of a battleship-and-a-half less than it wanted. America, Japan, and other nations saved millions that would otherwise have been spent on warships.

In 1929, Secretary of State Henry L. Stimson withdrew the Bureau's funds, on the ground that "gentlemen do not read each other's mail." Yardley, jobless in the Depression, awoke America to the importance of cryptology in his best-selling The American Black Chamber (1931). His bureau's work was assumed by the army's tiny Signal Intelligence Service (SIS) under the brilliant cryptologist William F. Friedman. During World War I, Friedman, at the Riverbank Laboratories, a think tank near Chicago, had broken new paths for cryptanalysis; soon after he joined the War Department as a civilian employee in 1921, he reconstructed the locations and starting positions of the rotors in a cipher machine. His work placed the United States at the forefront of world cryptology. Beginning in 1931, he expanded the SIS, hiring mathematicians first. By 1940, a team under the cryptanalyst Frank B. Rowlett had reconstructed the chief Japanese diplomatic cipher machine, which the Americans called purple. These solutions could not prevent Pearl Harbor because no messages saying anything like "We will attack Pearl Harbor" were ever transmitted; the Japanese diplomats themselves were not told of the attack. Later in the war, however, the solutions of the radiograms of the Japanese ambassador in Berlin, enciphered in purple, provided the Allies with what Army Chief of Staff General George C. Marshall called "our main basis of information regarding Hitler's intentions in Europe." One revealed details of Hitler's Atlantic Wall defenses.

The U.S. Navy's OP-20-G, established in 1924 under Lieutenant Laurence F. Safford, solved Japanese naval codes. This work flowered when the solutions of its branch in Hawaii made possible the American victory at Midway in 1942, the midair shootdown of Admiral Isoroku Yamamoto in 1943, and the sinking of Japanese freighters throughout the Pacific war, strangling Japan. Its headquarters in Washington cooperated with the British code breaking agency, the Government Code and Cypher School, at Bletchley Park, northwest of London, to solve U-boat messages encrypted in the Enigma rotor cipher machine. This enabled Allied convoys to dodge wolf packs and so help win the Battle of the Atlantic. Teams of American cryptanalysts and tabulating machine engineers went to the British agency to cooperate in solving German Enigma and other cipher systems, shortening the land war in Europe. No other source of information—not spies, aerial photographs, or prisoner interrogations—provided such trustworthy, high-level, voluminous, detailed, and prompt intelligence as code breaking.

At the San Francisco conference of 1945, which created the United Nations, the United States used information from code breaking to get its way on important matters, such as its desire, despite French opposition, for a veto procere in the Security Council. In the 1940s, the United States began solving Soviet spy messages. Disclosed in 1995, these solutions, codenamed venona, showed that the Soviet Union had concted massive espionage in America, including espionage related to nuclear armament.

Code Making

Dramatic though code breaking is, more important than getting other people's secrets is keeping one's own. America has excelled in this as well. The first law specifying the ties of the Post Office, 20 February 1792 made it a crime for its employees to open mail, thus protecting privacy before European countries did. Thomas Jefferson invented an ingenious cipher system but filed and forgot it; the U.S. Army adopted an independent invention of it in 1922 that was used until World War II. In 1917, an engineer at the American Telephone & Telegraph Company, Gilbert S. Vernam, devised the first online cipher machine. Based on a teletypewriter, it electromechanically added the on-off impulses of the plain-text message to those of a key tape and transmitted the resultant ciphertext. This mechanism, the first binary device in cryptology, was perfected by Major Joseph O. Mauborgne, who, by making the key tape random and prohibiting more than a single use of it, created the only theoretically unbreakable cipher, the one-time tape. Also in 1917, an amateur inventor, Edward H. Hebern of California, devised the first rotor cipher machine before three Europeans independently had the same idea. In the 1930s, Rowlett and Friedman irregularized the turning of rotors. Their cipher machine, the sigaba, armored U.S. Army and Navy communications against the technology of the time; none of its messages were broken by Axis powers. During World War II, Navajos in the Marine Corps translated English-language orders into their language for walkie-talkie transmission; the Japanese never understood them. In 1943, AT&T engineers built a radiotelephone scrambler, sigsaly, that used a one-time key and proved invulnerable to German eavesdropping. Another AT&T employee, Claude E. Shannon, the conceiver of information theory, provided cryptology with a theoretical underpinning in his article "Communication Theory of Secrecy Systems," published in 1949.

In 1976, the National Institute of Standards and Technology promulgated a Data Encryption Standard so computers could intercommunicate securely; it was replaced on 26 May 2002 by the Advanced Encryption Standard. Also in 1976, an electrical engineering student, Whitfield Diffie, aided by Professor Martin Hellman, both of Stanford University, devised the most important advance in cryptography since the invention of cryptography itself: public-key cryptography. This permitted people to communicate in secret without prearrangement and ultimately opened the way to online Electronic Commerce.

热心网友 时间:2023-10-14 10:21

这个,,,估计你是找不到了

太专业了

*为力
声明声明:本网页内容为用户发布,旨在传播知识,不代表本网认同其观点,若有侵权等问题请及时与本网联系,我们将在第一时间删除处理。E-MAIL:11247931@qq.com
工程制图会学什么电脑操作CAD制图 电脑装了声卡驱动还是没声音如何处理_电脑装了声卡驱动还是没声音怎么... 关于the reason why…is that…句型 用the reason why...is that..句型回答选择朗诵我不再归去这首诗原因... the reason why is that造句 一篇文章教你学会尺寸标注的所有知识 信贷公司一般什么流程 电脑如何为qq音乐设置快捷方式怎样将qq音乐的图标显示到桌面上 我是做凉皮销售的,想买一台圆形凉皮机,不知道哪款好,求推荐 请问哪位朋友用的圆形凉皮机,好用吗? 生番的造句生番的造句是什么 电压力锅再加热和中间加菜的区别 士当先天下之忧而忧,后天下之乐而乐也。 用先与后写四字成语 水泵怎么样才能上水 徐州九龙水泵厂,20-40/2-4潜水泵怎样加水 三千界的造句三千界的造句是什么 鸡翘的意思鸡翘的意思是什么 物换星移意思? 梦见白色鲶鱼的预兆 梦见细鲇鱼的预兆 用5个相等的小长方形拼成一个大长方形,如果小长方形的宽比长短3cm,那么大长方形的面积是多少平方厘米, 5个大小相等的小长方形拼成一个大长方形,小长方形的宽比长短3厘米,大长方形的面积 用四个面积都是8平方厘米的长方形拼成一个大正方形。长方形的宽比长短2厘米,拼喊的大正方形的面和是多 一个长方形,宽比长短3厘米,怎样拼出一个图形? 脱胶的造句脱胶的造句是什么 乌拉草是什么意思 北京房子没有燃气热水器出风口 人寿的造句人寿的造句是什么 中国发行的中国高铁和谐号背面万里长城八达岭是纯金帀吗 呻吟的造句呻吟的造句是什么 用拦腰造句(大约30个左右) 以守为攻是什么意思?以守为攻成语造句和典故 以守待攻·以守为攻·以守待敌,王霸败苏茂 用神气自若造句(大约30个左右) 无妄的造句无妄的造句是什么 人老珠黄后,会一如即往吗 梦见自己一只眼看不见了的预兆 win7系统不能切换字体.找不到字体图标. 词语造句:用漆布造句(约30个) 一如的造句一如的造句是什么 残疾人励志的名言句子 魔方怎么变回原形 磨方块怎么拼回原形 魔方怎么拼回原形 用糯米做米酒的时候如果温度高重量少的话是不是容易使包子产生黑色的? 什么意思啊,给解释一下啊!它出自哪里啊! 为什么他们总想让我孝心变质有没有类似的 转造句(三声) 我的孝心变质了为什么没了