|
![]() |
|||
|
||||
OverviewThis book reveals the historical context and the evolution of the technically complex Allied Signals Intelligence (Sigint) activity against Japan from 1920 to 1945. It traces the all-important genesis and development of the cryptanalytic techniques used to break the main Japanese Navy code (JN-25) and the Japanese Army’s Water Transport Code during WWII. This is the first book to describe, explain and analyze the code breaking techniques developed and used to provide this intelligence, thus closing the sole remaining gap in the published accounts of the Pacific War. The authors also explore the organization of cryptographic teams and issues of security, censorship, and leaks. Correcting gaps in previous research, this book illustrates how Sigint remained crucial to Allied planning throughout the war. It helped direct the advance to the Philippines from New Guinea, the sea battles and the submarine onslaught on merchant shipping. Written by well-known authorities on the history of cryptography and mathematics, Code Breaking in the Pacific is designed for cryptologists, mathematicians and researchers working in communications security. Advanced-level students interested in cryptology, the history of the Pacific War, mathematics or the history of computing will also find this book a valuable resource. Full Product DetailsAuthor: Peter Donovan , John MackPublisher: Springer International Publishing AG Imprint: Springer International Publishing AG Edition: 2014 ed. Dimensions: Width: 15.50cm , Height: 2.40cm , Length: 23.50cm Weight: 0.787kg ISBN: 9783319082776ISBN 10: 3319082779 Pages: 387 Publication Date: 26 August 2014 Audience: Professional and scholarly , Professional & Vocational Format: Hardback Publisher's Status: Active Availability: Manufactured on demand ![]() We will order this item for you from a manufactured on demand supplier. Table of ContentsReviewsIt is an important contribution to both the history of the war and the history of cryptanalysis development, as well as an interesting text on techniques of cryptography and cryptanalysis. ... The book is well written and reads well. It is well referenced with myriad footnotes. I admire and recommend it. (Mordechai Ben-Menachem, Computing Reviews, April, 2015) It is an important contribution to both the history of the war and the history of cryptanalysis development, as well as an interesting text on techniques of cryptography and cryptanalysis. The book is well written and reads well. It is well referenced with myriad footnotes. I admire and recommend it. (Mordechai Ben-Menachem, Computing Reviews, April, 2015) Author InformationTab Content 6Author Website:Countries AvailableAll regions |