Disappearing Cryptography - Being and Nothingness on the Net (1996)
Front Cover Book Details
Author
Peter Wayner
Genre Cryptology; Internet
Publication Date 1996
Format Paperback (240 x mm)
Publisher Morgan Kaufmann Publishers
Language English
Plot
Amazon.com
Disappearing Cryptography, by Peter Wayner, asks what happens after you use encryption to encode your data. After all, encryption doesn't protect you from a jammed transmission, a diverted e-mail message, or an erased file. The gobbledygook that is encrypted data often attracts attention. But there are ways to hide data so that no one knows it's there. Wayner carefully walks the reader through the fundamentals of encryption, error correction, secret sharing, compression, and grammar. Each technique builds on the next until you are able to pull off some impressive tricks using these technologies. You can secret your journals in a picture of your dog or encode your financials as a baseball announcer's monologue.

Each chapter begins with a clever anecdote or game that introduces the subject (sometimes elliptically, which is only appropriate for a book on data hiding). A plain-language description of the technology follows, and each chapter finishes with mathematically rigorous proofs and solutions. If you are a newcomer, you will enjoy the new ideas, though you will have to trust that the technology works. If you understand some of what's going on, you will appreciate the new information and applications, as well as the in-depth descriptions of the technologies. And if you are an expert, you will still certainly find something to take away from Wayner's clever way of integrating ideas, which at times recalls Douglas R. Hofstedter's Godel, Escher, Bach: An Eternal Golden Braid.

Book Description
Standard cryptography locks information in a mathematical safe and many governments, corporations, and citizens of the Net are quickly embracing it to protect their privacy. But traditional algorithms like DES won't protect you against an active attack that jams a transmission, diverts an e-mail message, or erases some files. The disappearing cryptography (aka steganography) in this book is the solution. The algorithms show how to make information invisible. If you don't know it's there, you can't find it. Each chapter in the book is divided into three sections. The first approaches the topic with humor, the second offers a general introduction, and the third provides a complete technical solution.

Ingram
Conventional cryptography merely scrambles information into an impenetrable block. This book describes how data can be hidden in the background noise of pictures, sound recording, or even bad poetry and reveals how to encrypt information within both text and images.

Book Info
Discusses textual cryptanalysis: how to hide data innocuously in text. Provides information on setting up networks with hidden communications. Paper. DLC: Computer networks - Security measures.
Personal Details
Collection Status Not In Collection
Store Bookpool.com
Location quarto
Purchase Price $21.50
Purchase Date 6/26/97
Condition Very Good
Index 371
Owner Paulo Mendes
Read It No
Links URL
Collection # 00319
Order # zQW68
Product Details
LoC Classification TK5105.59 .W39 1996
Dewey 005.8/2 20
ISBN 0127386718
Edition 01
Printing 1
Paper Type acid-free
Country USA
Cover Price $36.95
Nr of Pages 295
First Edition Yes
Rare No
Notes
Includes bibliographical references (p. 279-289) and index.