Real Life Cryptology
A large number of enciphered documents survived from early modern Hungary. This area was a particularly fertile territory where cryptographic methods proliferated, because a large portion of the population was living in the frontier zone, and participated (or was forced to participate) in the networ...
Saved in:
| Main Author: | |
|---|---|
| Format: | eBook |
| Language: | English |
| Published: |
Amsterdam University Press
2018
|
| Subjects: | |
| ISBN: | 9789462985544, 9462985545 |
| Online Access: | Get full text |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Abstract | A large number of enciphered documents survived from early modern Hungary. This area was a particularly fertile territory where cryptographic methods proliferated, because a large portion of the population was living in the frontier zone, and participated (or was forced to participate) in the network of the information flow. A quantitative analysis of sixteenth-century to seventeenth-century Hungarian ciphers (300 cipher keys and 1,600 partly or entirely enciphered letters) reveals that besides the dominance of diplomatic use of cryptography, there were many examples of “private” applications too. This book reconstructs the main reasons and goals why historical actors chose to use ciphers in a diplomatic letter, a military order, a diary or a private letter, what they decided to encrypt, and how they perceived the dangers threatening their messages. |
|---|---|
| AbstractList | A large number of enciphered documents survived from early modern Hungary. This area was a particularly fertile territory where cryptographic methods proliferated, because a large portion of the population was living in the frontier zone, and participated (or was forced to participate) in the network of the information flow. A quantitative analysis of sixteenth-century to seventeenth-century Hungarian ciphers (300 cipher keys and 1,600 partly or entirely enciphered letters) reveals that besides the dominance of diplomatic use of cryptography, there were many examples of ŸprivateŒ applications too. This book reconstructs the main reasons and goals why historical actors chose to use ciphers in a diplomatic letter, a military order, a diary or a private letter, what they decided to encrypt, and how they perceived the dangers threatening their messages. A large number of enciphered documents survived from early modern Hungary. This area was a particularly fertile territory where cryptographic methods proliferated, because a large portion of the population was living in the frontier zone, and participated (or was forced to participate) in the network of the information flow. A quantitative analysis of sixteenth-century to seventeenth-century Hungarian ciphers (300 cipher keys and 1,600 partly or entirely enciphered letters) reveals that besides the dominance of diplomatic use of cryptography, there were many examples of “private” applications too. This book reconstructs the main reasons and goals why historical actors chose to use ciphers in a diplomatic letter, a military order, a diary or a private letter, what they decided to encrypt, and how they perceived the dangers threatening their messages. |
| Author | Lang, Benedek |
| Author_xml | – sequence: 1 fullname: Lang, Benedek |
| BookMark | eNpVT0tLw0AQXvGBWosXPXnJzVN1d2dnHwUPEnxBsCDidZkkm5KadkNSD_33tkRET998fC_mlB2s4iowdin4DQphbp2xTmnpLKJSe2y841xZBK2d3h_4r37Ezmfp6zQR3GiD3Al9zMZ9v-CcS9BSaDxhF2-BmiSrq5Ck3aZdxybON2fssKKmD-MfHLGPx4f39HmSzZ5e0vtsQiC0gsl2mPJgSaIqeGkQjNDBWiqCKVAKh4LrqrJYhRwtVbkkKPPSQAGAnKSBEbseitsuLkKxXn71wYc8xs_e_3tt67wbnJHasPJtVy-p2_hItW_qvBvunRK7uZfcI-deSI3GS6tQbvNXf_NlpGEF0IGBb95vYLc |
| ContentType | eBook |
| DBID | V1H A7I |
| DOI | 10.5117/9789462985544 |
| DatabaseName | DOAB: Directory of Open Access Books OAPEN |
| DatabaseTitleList | |
| Database_xml | – sequence: 1 dbid: V1H name: DOAB: Directory of Open Access Books url: https://directory.doabooks.org/ sourceTypes: Publisher |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Education |
| EISBN | 9789048536696 9048536693 |
| ExternalDocumentID | 9789048536696 oai_library_oapen_org_20_500_12657_28452 35937 |
| GroupedDBID | A7I AABBV AAJMW AANXU AAVCP AAYCG AAZEP ABPDF ABPMT ACBYE ACISH ACKJY ADOOI AESKO AETUO AFQQW AFVRY AFWMH AGBLZ AGHZW AGIZT AGWHU AIIFP AIQUZ ALMA_UNASSIGNED_HOLDINGS AOLFF AOURY BAHZO BBABE BIANM CZZ EIXGO F-. FILVX HELXT I4C JLPMJ MUSTB PYIOH QD8 V1H YSPEL ~I6 AESSL AEUHU AIXXW AXTGW CNGAX EBATF INALI JTX OXWLL DGVNY ECYUO |
| ID | FETCH-LOGICAL-a31643-485abe8a254c0d753716e88ace7c52195106ff85feb58afb2a3dbd73c3350a273 |
| IEDL.DBID | A7I |
| ISBN | 9789462985544 9462985545 |
| IngestDate | Tue May 07 20:39:07 EDT 2024 Mon Dec 01 21:32:37 EST 2025 Wed Oct 08 00:49:25 EDT 2025 |
| IsDoiOpenAccess | true |
| IsOpenAccess | true |
| IsPeerReviewed | false |
| IsScholarly | false |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-a31643-485abe8a254c0d753716e88ace7c52195106ff85feb58afb2a3dbd73c3350a273 |
| OCLC | OCN: 1076750916 1076750916 |
| OpenAccessLink | http://library.oapen.org/handle/20.500.12657/28452 |
| PageCount | 224 |
| ParticipantIDs | projectmuse_ebooks_9789048536696 oapen_primary_oai_library_oapen_org_20_500_12657_28452 oapen_doabooks_35937 |
| PublicationCentury | 2000 |
| PublicationDate | 2018 |
| PublicationDateYYYYMMDD | 2018-01-01 |
| PublicationDate_xml | – year: 2018 text: 2018 |
| PublicationDecade | 2010 |
| PublicationYear | 2018 |
| Publisher | Amsterdam University Press |
| Publisher_xml | – name: Amsterdam University Press |
| SSID | ssj0002362165 |
| Score | 2.1403508 |
| Snippet | A large number of enciphered documents survived from early modern Hungary. This area was a particularly fertile territory where cryptographic methods... |
| SourceID | projectmuse oapen |
| SourceType | Publisher |
| SubjectTerms | Austria & Hungary Coding theory and cryptology Cryptography Early modern history Europe HISTORY History of science Reference, Information and Interdisciplinary subjects Research and information: general Social history |
| TableOfContents | Cover
Title Page, Copyright
Contents
Abbreviations
Note on terminology
Note on names
1. Introduction
2. Uncovered fields in the research literature
3. Secret writings and attitudes - research questions
4. Theory and practice of cryptography in early modern Europe
5. Ciphers in Hungary: the source material
6. Ciphers in action
7. Ways of knowledge transfer
8. Scenes of secrecy
9. Summary
10. Appendix
Acknowledgements
Earlier publications
Bibliography
Index |
| Title | Real Life Cryptology |
| URI | https://directory.doabooks.org/handle/20.500.12854/35937 http://library.oapen.org/handle/20.500.12657/28452 https://muse.jhu.edu/book/66424 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3Pa8IwFH6I7rDTfrgx94sedq3UpPl1HDJxIDLGEG8haVLwoqJu4H_vSyJOr14KTUvafqQv3_eafg_gzdSucqWnObWoTUojerkyVOWiEFYRwVzlo8_sSIzHcjpVXw0gp6mL7sKgmI8f8pPZAGr0LiuCFwJHBY8hlWHYbXFCVBjV7-LzkFchGJF7nKEAUyUnKqzCYslo57BfJq9NpBrRYPa_PRQ9Chc-zYMczTeDq3Pu9BpaPvy5cAMNP78N5Zj3Szfa0P5GOpiNZrXP-qvtMpas3d7BZPDx0x_m-3IIuaEoamheSmaslwY1XVU41BmodbyUBuGscBYOXInXtWS1t0ya2hJDnXWCVpSywiBPuYfmfDH3D5AxK5VHaYdiwZSV8BJP5tiJQzaE77ztQDs-mHYLE9j-WlOGRKYDPDUvkxWGDubUeyR0OoJIaFJohEBHCHSEoAPZEaLapz4D-BhBGOVc8cdz-36CS2QxMuVFnqG5Wf36F7io_jaz9eo1jg7cTnrDHeQ9s-Y |
| linkProvider | Open Access Publishing in European Networks |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.title=Real+Life+Cryptology&rft.au=Lang%2C+Benedek&rft.date=2018-01-01&rft.pub=Amsterdam+University+Press&rft.isbn=9789462985544&rft_id=info:doi/10.5117%2F9789462985544&rft.externalDocID=9789048536696 |
| thumbnail_m | http://cvtisr.summon.serialssolutions.com/2.0.0/image/custom?url=https%3A%2F%2Fmuse.jhu.edu%2Fbook%2F66424%2Fimage%2Ffront_cover.jpg%3Fformat%3D180 |

