Real Life Cryptology

A large number of enciphered documents survived from early modern Hungary. This area was a particularly fertile territory where cryptographic methods proliferated, because a large portion of the population was living in the frontier zone, and participated (or was forced to participate) in the networ...

Full description

Saved in:
Bibliographic Details
Main Author: Lang, Benedek
Format: eBook
Language:English
Published: Amsterdam University Press 2018
Subjects:
ISBN:9789462985544, 9462985545
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Abstract A large number of enciphered documents survived from early modern Hungary. This area was a particularly fertile territory where cryptographic methods proliferated, because a large portion of the population was living in the frontier zone, and participated (or was forced to participate) in the network of the information flow. A quantitative analysis of sixteenth-century to seventeenth-century Hungarian ciphers (300 cipher keys and 1,600 partly or entirely enciphered letters) reveals that besides the dominance of diplomatic use of cryptography, there were many examples of “private” applications too. This book reconstructs the main reasons and goals why historical actors chose to use ciphers in a diplomatic letter, a military order, a diary or a private letter, what they decided to encrypt, and how they perceived the dangers threatening their messages.
AbstractList A large number of enciphered documents survived from early modern Hungary. This area was a particularly fertile territory where cryptographic methods proliferated, because a large portion of the population was living in the frontier zone, and participated (or was forced to participate) in the network of the information flow. A quantitative analysis of sixteenth-century to seventeenth-century Hungarian ciphers (300 cipher keys and 1,600 partly or entirely enciphered letters) reveals that besides the dominance of diplomatic use of cryptography, there were many examples of ŸprivateŒ applications too. This book reconstructs the main reasons and goals why historical actors chose to use ciphers in a diplomatic letter, a military order, a diary or a private letter, what they decided to encrypt, and how they perceived the dangers threatening their messages.
A large number of enciphered documents survived from early modern Hungary. This area was a particularly fertile territory where cryptographic methods proliferated, because a large portion of the population was living in the frontier zone, and participated (or was forced to participate) in the network of the information flow. A quantitative analysis of sixteenth-century to seventeenth-century Hungarian ciphers (300 cipher keys and 1,600 partly or entirely enciphered letters) reveals that besides the dominance of diplomatic use of cryptography, there were many examples of “private” applications too. This book reconstructs the main reasons and goals why historical actors chose to use ciphers in a diplomatic letter, a military order, a diary or a private letter, what they decided to encrypt, and how they perceived the dangers threatening their messages.
Author Lang, Benedek
Author_xml – sequence: 1
  fullname: Lang, Benedek
BookMark eNpVT0tLw0AQXvGBWosXPXnJzVN1d2dnHwUPEnxBsCDidZkkm5KadkNSD_33tkRET998fC_mlB2s4iowdin4DQphbp2xTmnpLKJSe2y841xZBK2d3h_4r37Ezmfp6zQR3GiD3Al9zMZ9v-CcS9BSaDxhF2-BmiSrq5Ck3aZdxybON2fssKKmD-MfHLGPx4f39HmSzZ5e0vtsQiC0gsl2mPJgSaIqeGkQjNDBWiqCKVAKh4LrqrJYhRwtVbkkKPPSQAGAnKSBEbseitsuLkKxXn71wYc8xs_e_3tt67wbnJHasPJtVy-p2_hItW_qvBvunRK7uZfcI-deSI3GS6tQbvNXf_NlpGEF0IGBb95vYLc
ContentType eBook
DBID V1H
A7I
DOI 10.5117/9789462985544
DatabaseName DOAB: Directory of Open Access Books
OAPEN
DatabaseTitleList


Database_xml – sequence: 1
  dbid: V1H
  name: DOAB: Directory of Open Access Books
  url: https://directory.doabooks.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Education
EISBN 9789048536696
9048536693
ExternalDocumentID 9789048536696
oai_library_oapen_org_20_500_12657_28452
35937
GroupedDBID A7I
AABBV
AAJMW
AANXU
AAVCP
AAYCG
AAZEP
ABPDF
ABPMT
ACBYE
ACISH
ACKJY
ADOOI
AESKO
AETUO
AFQQW
AFVRY
AFWMH
AGBLZ
AGHZW
AGIZT
AGWHU
AIIFP
AIQUZ
ALMA_UNASSIGNED_HOLDINGS
AOLFF
AOURY
BAHZO
BBABE
BIANM
CZZ
EIXGO
F-.
FILVX
HELXT
I4C
JLPMJ
MUSTB
PYIOH
QD8
V1H
YSPEL
~I6
AESSL
AEUHU
AIXXW
AXTGW
CNGAX
EBATF
INALI
JTX
OXWLL
DGVNY
ECYUO
ID FETCH-LOGICAL-a31643-485abe8a254c0d753716e88ace7c52195106ff85feb58afb2a3dbd73c3350a273
IEDL.DBID A7I
ISBN 9789462985544
9462985545
IngestDate Tue May 07 20:39:07 EDT 2024
Mon Dec 01 21:32:37 EST 2025
Wed Oct 08 00:49:25 EDT 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-a31643-485abe8a254c0d753716e88ace7c52195106ff85feb58afb2a3dbd73c3350a273
OCLC OCN: 1076750916
1076750916
OpenAccessLink http://library.oapen.org/handle/20.500.12657/28452
PageCount 224
ParticipantIDs projectmuse_ebooks_9789048536696
oapen_primary_oai_library_oapen_org_20_500_12657_28452
oapen_doabooks_35937
PublicationCentury 2000
PublicationDate 2018
PublicationDateYYYYMMDD 2018-01-01
PublicationDate_xml – year: 2018
  text: 2018
PublicationDecade 2010
PublicationYear 2018
Publisher Amsterdam University Press
Publisher_xml – name: Amsterdam University Press
SSID ssj0002362165
Score 2.1403508
Snippet A large number of enciphered documents survived from early modern Hungary. This area was a particularly fertile territory where cryptographic methods...
SourceID projectmuse
oapen
SourceType Publisher
SubjectTerms Austria & Hungary
Coding theory and cryptology
Cryptography
Early modern history
Europe
HISTORY
History of science
Reference, Information and Interdisciplinary subjects
Research and information: general
Social history
TableOfContents Cover Title Page, Copyright Contents Abbreviations Note on terminology Note on names 1. Introduction 2. Uncovered fields in the research literature 3. Secret writings and attitudes - research questions 4. Theory and practice of cryptography in early modern Europe 5. Ciphers in Hungary: the source material 6. Ciphers in action 7. Ways of knowledge transfer 8. Scenes of secrecy 9. Summary 10. Appendix Acknowledgements Earlier publications Bibliography Index
Title Real Life Cryptology
URI https://directory.doabooks.org/handle/20.500.12854/35937
http://library.oapen.org/handle/20.500.12657/28452
https://muse.jhu.edu/book/66424
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3Pa8IwFH6I7rDTfrgx94sedq3UpPl1HDJxIDLGEG8haVLwoqJu4H_vSyJOr14KTUvafqQv3_eafg_gzdSucqWnObWoTUojerkyVOWiEFYRwVzlo8_sSIzHcjpVXw0gp6mL7sKgmI8f8pPZAGr0LiuCFwJHBY8hlWHYbXFCVBjV7-LzkFchGJF7nKEAUyUnKqzCYslo57BfJq9NpBrRYPa_PRQ9Chc-zYMczTeDq3Pu9BpaPvy5cAMNP78N5Zj3Szfa0P5GOpiNZrXP-qvtMpas3d7BZPDx0x_m-3IIuaEoamheSmaslwY1XVU41BmodbyUBuGscBYOXInXtWS1t0ya2hJDnXWCVpSywiBPuYfmfDH3D5AxK5VHaYdiwZSV8BJP5tiJQzaE77ztQDs-mHYLE9j-WlOGRKYDPDUvkxWGDubUeyR0OoJIaFJohEBHCHSEoAPZEaLapz4D-BhBGOVc8cdz-36CS2QxMuVFnqG5Wf36F7io_jaz9eo1jg7cTnrDHeQ9s-Y
linkProvider Open Access Publishing in European Networks
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.title=Real+Life+Cryptology&rft.au=Lang%2C+Benedek&rft.date=2018-01-01&rft.pub=Amsterdam+University+Press&rft.isbn=9789462985544&rft_id=info:doi/10.5117%2F9789462985544&rft.externalDocID=9789048536696
thumbnail_m http://cvtisr.summon.serialssolutions.com/2.0.0/image/custom?url=https%3A%2F%2Fmuse.jhu.edu%2Fbook%2F66424%2Fimage%2Ffront_cover.jpg%3Fformat%3D180