Franklin

Code Breaking in the Pacific [electronic resource] / by Peter Donovan, John Mack.

Author/Creator:
Donovan, Peter author., Author,
Publication:
Cham : Springer International Publishing : Imprint: Springer, 2014.
Format/Description:
Book
1 online resource (XXVI, 387 pages)
Edition:
1st ed. 2014.
Series:
Computer Science (Springer-11645)
Contained In:
Springer eBooks
Status/Location:
Loading...

Options
Location Notes Your Loan Policy

Details

Subjects:
Data structures (Computer science).
Data encryption (Computer science).
Coding theory.
Information theory.
Computer science-Mathematics.
Computers.
Computer security.
Local subjects:
Data Structures and Information Theory. (search)
Cryptology. (search)
Coding and Information Theory. (search)
Math Applications in Computer Science. (search)
History of Computing. (search)
Systems and Data Security. (search)
System Details:
text file PDF
Summary:
This book reveals the historical context and the evolution of the technically complex Allied Signals Intelligence (Sigint) activity against Japan from 1920 to 1945. It traces the all-important genesis and development of the cryptanalytic techniques used to break the main Japanese Navy code (JN-25) and the Japanese Army's Water Transport Code during WWII. This is the first book to describe, explain and analyze the code breaking techniques developed and used to provide this intelligence, thus closing the sole remaining gap in the published accounts of the Pacific War. The authors also explore the organization of cryptographic teams and issues of security, censorship, and leaks. Correcting gaps in previous research, this book illustrates how Sigint remained crucial to Allied planning throughout the war. It helped direct the advance to the Philippines from New Guinea, the sea battles and the submarine onslaught on merchant shipping. Written by well-known authorities on the history of cryptography and mathematics, Code Breaking in the Pacific is designed for cryptologists, mathematicians and researchers working in communications security. Advanced-level students interested in cryptology, the history of the Pacific War, mathematics or the history of computing will also find this book a valuable resource.
Contents:
Communications and Sigint
Japanese Expansion 1895-1941
The GCCS 1919-1941
William Friedman and the US Army
Early American Naval Sigint
Developments in Australia
Preparedness for Attack?- Major Technical Encryption Systems
JN-25 and its Cryptanalysis
Using Common Book Groups
Recovery of a Code Book
Breaking Additive Systems
Making Additive Systems Secure
Redundant Encryption
The Scanning Distribution
Ciphers and the Submarines
Central Bureau 1942-1945
Organisation and Reorganisation
Security, Censorship and Leaks
Conclusion
From Pearl Harbor to Midway
Guadalcanal and Papua
Rabaul and the Philippines.
Contributor:
Mack, John, author., Author,
SpringerLink (Online service)
Other format:
Printed edition:
Printed edition:
Printed edition:
ISBN:
978-3-319-08278-3
9783319082783
Publisher Number:
10.1007/978-3-319-08278-3 doi
Access Restriction:
Restricted for use by site license.