MARC details
| 000 -LEADER |
| fixed length control field |
03865nam a22004695i 4500 |
| 001 - CONTROL NUMBER |
| control field |
978-0-387-27160-6 |
| 003 - CONTROL NUMBER IDENTIFIER |
| control field |
DE-He213 |
| 005 - DATE AND TIME OF LATEST TRANSACTION |
| control field |
20250710083937.0 |
| 007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION |
| fixed length control field |
cr nn 008mamaa |
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
| fixed length control field |
100301s2005 xxu| s |||| 0|eng d |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
| International Standard Book Number |
9780387271606 |
| -- |
99780387271606 |
| 024 7# - OTHER STANDARD IDENTIFIER |
| Standard number or code |
10.1007/b138699 |
| Source of number or code |
doi |
| 082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER |
| Classification number |
500 |
| Edition information |
23 |
| 082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER |
| Classification number |
600 |
| Edition information |
23 |
| 100 1# - MAIN ENTRY--PERSONAL NAME |
| Personal name |
Curtin, Matt. |
| Relator term |
author. |
| 245 10 - TITLE STATEMENT |
| Title |
Brute Force |
| Medium |
[recurso electrónico] : |
| Remainder of title |
Cracking the Data Encryption Standard / |
| Statement of responsibility, etc. |
by Matt Curtin. |
| 264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE |
| Place of production, publication, distribution, manufacture |
New York, NY : |
| Name of producer, publisher, distributor, manufacturer |
Springer New York, |
| Date of production, publication, distribution, manufacture, or copyright notice |
2005. |
| 300 ## - PHYSICAL DESCRIPTION |
| Extent |
X, 291 p. |
| Other physical details |
online resource. |
| 336 ## - CONTENT TYPE |
| Content type term |
text |
| Content type code |
txt |
| Source |
rdacontent |
| 337 ## - MEDIA TYPE |
| Media type term |
computer |
| Media type code |
c |
| Source |
rdamedia |
| 338 ## - CARRIER TYPE |
| Carrier type term |
recurso en línea |
| Carrier type code |
cr |
| Source |
rdacarrier |
| 347 ## - DIGITAL FILE CHARACTERISTICS |
| File type |
text file |
| Encoding format |
PDF |
| Source |
rda |
| 505 0# - FORMATTED CONTENTS NOTE |
| Formatted contents note |
Working Late -- Keeping Secrets -- Data Encryption Standard -- Key Length -- Discovery -- RSA Crypto Challenges -- Congress Takes Note -- Supercomputer -- Organizing DESCHALL -- Needle in a Haystack -- Spreading the Word -- The Race Is On -- Clients -- Architecture -- Progress -- Trouble -- Milestones -- Gateways -- Network -- Download -- Short Circuit -- DESCHALL Community -- Proposal -- In the Lead -- Recruiting -- Threats -- Overdrive -- Distributed -- An Obstacle -- Export -- Getting Word Out -- Salvos in the Crypto Wars -- New Competition -- Netlag -- Terminal Velocity -- Duct Tape -- Showdown in the Senate -- "Strong Cryptography Makes the World a Safer Place" -- Aftermath -- Staying the Course -- In Retrospect. |
| 520 ## - SUMMARY, ETC. |
| Summary, etc. |
In the 1960s, it became increasingly clear that more and more information was going to be stored on computers, not on pieces of paper. With these changes in technology and the ways it was used came a need to protect both the systems and the information. For the next ten years, encryption systems of varying strengths were developed, but none proved to be rigorous enough. In 1973, the NBS put out an open call for a new, stronger encryption system that would become the new federal standard. Several years later, IBM responded with a system called Lucifer that came to simply be known as DES (data encryption standard). The strength of an encryption system is best measured by the attacks it is able to withstand, and because DES was the federal standard, many tried to test its limits. (It should also be noted that a number of cryptographers and computer scientists told the NSA that DES was not nearly strong enough and would be easily hacked.) Rogue hackers, usually out to steal as much information as possible, tried to break DES. A number of "white hat" hackers also tested the system and reported on their successes. Still others attacked DES because they believed it had outlived its effectiveness and was becoming increasingly vulnerable. The sum total of these efforts to use all of the possible keys to break DES over time made for a brute force attack. In 1996, the supposedly uncrackable DES was broken. In this captivating and intriguing book, Matt Curtin charts DES's rise and fall and chronicles the efforts of those who were determined to master it. |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name entry element |
SCIENCE (GENERAL). |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name entry element |
DATA ENCRYPTION (COMPUTER SCIENCE). |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name entry element |
CODING THEORY. |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name entry element |
COMPUTER SCIENCE. |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name entry element |
MATHEMATICS. |
| 650 14 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name entry element |
POPULAR SCIENCE. |
| 650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name entry element |
POPULAR SCIENCE IN MATHEMATICS/COMPUTER SCIENCE/NATURAL SCIENCE/TECHNOLOGY. |
| 650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name entry element |
COMPUTERS AND SOCIETY. |
| 650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name entry element |
DATA ENCRYPTION. |
| 650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name entry element |
CODING AND INFORMATION THEORY. |
| 710 2# - ADDED ENTRY--CORPORATE NAME |
| Corporate name or jurisdiction name as entry element |
SpringerLink (Online service) |
| 773 0# - HOST ITEM ENTRY |
| Title |
Springer eBooks |
| 776 08 - ADDITIONAL PHYSICAL FORM ENTRY |
| Relationship information |
Printed edition: |
| International Standard Book Number |
9780387201092 |
| 856 40 - ELECTRONIC LOCATION AND ACCESS |
| Uniform Resource Identifier |
<a href="http://dx.doi.org/10.1007/b138699">http://dx.doi.org/10.1007/b138699</a> |
| Public note |
Ver el texto completo en las instalaciones del CICY |
| 912 ## - |
| -- |
ZDB-2-SHU |
| 942 ## - ADDED ENTRY ELEMENTS (KOHA) |
| Source of classification or shelving scheme |
Dewey Decimal Classification |
| Koha item type |
Libros electrónicos |