LEADER 00000cam 2200481Ki 4500 001 on1076750916 003 OCoLC 005 20190416063048.9 006 m o d 007 cu uuu---auuuu 008 180921s2018 xx o 000 u und d 020 9789462985544|q(electronic bk.) 020 9462985545|q(electronic bk.) 020 9789048536696|q(electronic bk.) 020 9048536693|q(electronic bk.) 024 7 10.5117/9789462985544|2doi 035 (OCoLC)1076750916 037 22573/ctvfpvfw1|bJSTOR 040 LVT|beng|epn|erda|cLVT|dOCLCQ|dOAPEN|dOCLCQ|dJSTOR 049 CKEA 050 4 Z103.4.H86 082 04 306.09|223 100 1 Láng, Benedek,|d1974-|4aut,|eauthor. 245 10 Real Life Cryptology. 264 1 |bAmsterdam University Press|c2018. 300 1 online resource 336 text|btxt|2rdacontent 337 computer|bc|2rdamedia 338 online resource|bcr|2rdacarrier 347 data file|2rda 520 A large number of enciphered documents survived from early modern Hungary. This area was a particularly fertile territory where cryptographic methods proliferated, because a large portion of the population was living in the frontier zone, and participated (or was forced to participate) in the network of the information flow. A quantitative analysis of sixteenth-century to seventeenth- century Hungarian ciphers (300 cipher keys and 1,600 partly or entirely enciphered letters) reveals that besides the dominance of diplomatic use of cryptography, there were many examples of?private? applications too. This book reconstructs the main reasons and goals why historical actors chose to use ciphers in a diplomatic letter, a military order, a diary or a private letter, what they decided to encrypt, and how they perceived the dangers threatening their messages. 546 Undetermined. 650 0 Cryptography|zHungary|xHistory. 650 7 Coding theory & cryptology.|2bicssc 653 0 Cryptography. 653 0 Early modern history. 653 0 History of science. 653 0 Social history. 914 on1076750916 994 92|bCKE
|