Code Breaking in the Pacific

This book reveals the historical context and the evolution of the technically complex Allied Signals Intelligence (Sigint) activity against Japan from 1920 to 1945. It traces the all-important genesis and development of the cryptanalytic techniques used to break the main Japanese Navy code (JN-25) a...

Full description

Main Authors: Donovan, Peter. (Author, http://id.loc.gov/vocabulary/relators/aut), Mack, John. (http://id.loc.gov/vocabulary/relators/aut)
Corporate Author: SpringerLink (Online service)
Language:English
Published: Cham : Springer International Publishing : Imprint: Springer, 2014.
Edition:1st ed. 2014.
Subjects:
Online Access:https://doi.org/10.1007/978-3-319-08278-3
LEADER 04560nam a22006135i 4500
001 978-3-319-08278-3
003 DE-He213
005 20210617083410.0
007 cr nn 008mamaa
008 140814s2014 gw | s |||| 0|eng d
020 |a 9783319082783  |9 978-3-319-08278-3 
024 7 |a 10.1007/978-3-319-08278-3  |2 doi 
050 4 |a QA76.9.D35 
050 4 |a Q350-390 
072 7 |a UMB  |2 bicssc 
072 7 |a COM031000  |2 bisacsh 
072 7 |a UMB  |2 thema 
072 7 |a GPF  |2 thema 
082 0 4 |a 005.73  |2 23 
100 1 |a Donovan, Peter.  |e author.  |4 aut  |4 http://id.loc.gov/vocabulary/relators/aut 
245 1 0 |a Code Breaking in the Pacific  |h [electronic resource] /  |c by Peter Donovan, John Mack. 
250 |a 1st ed. 2014. 
264 1 |a Cham :  |b Springer International Publishing :  |b Imprint: Springer,  |c 2014. 
300 |a XXVI, 387 p.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
505 0 |a Communications and Sigint -- Japanese Expansion 1895-1941 -- The GCCS 1919-1941 -- William Friedman and the US Army -- Early American Naval Sigint -- Developments in Australia -- Preparedness for Attack?- Major Technical Encryption Systems -- JN-25 and its Cryptanalysis -- Using Common Book Groups -- Recovery of a Code Book -- Breaking Additive Systems -- Making Additive Systems Secure -- Redundant Encryption -- The Scanning Distribution -- Ciphers and the Submarines -- Central Bureau 1942-1945 -- Organisation and Reorganisation -- Security, Censorship and Leaks -- Conclusion -- From Pearl Harbor to Midway -- Guadalcanal and Papua -- Rabaul and the Philippines. 
520 |a This book reveals the historical context and the evolution of the technically complex Allied Signals Intelligence (Sigint) activity against Japan from 1920 to 1945. It traces the all-important genesis and development of the cryptanalytic techniques used to break the main Japanese Navy code (JN-25) and the Japanese Army’s Water Transport Code during WWII. This is the first book to describe, explain and analyze the code breaking techniques developed and used to provide this intelligence, thus closing the sole remaining gap in the published accounts of the Pacific War. The authors also explore the organization of cryptographic teams and issues of security, censorship, and leaks. Correcting gaps in previous research, this book illustrates how Sigint remained crucial to Allied planning throughout the war. It helped direct the advance to the Philippines from New Guinea, the sea battles and the submarine onslaught on merchant shipping. Written by well-known authorities on the history of cryptography and mathematics, Code Breaking in the Pacific is designed for cryptologists, mathematicians and researchers working in communications security. Advanced-level students interested in cryptology, the history of the Pacific War, mathematics or the history of computing will also find this book a valuable resource. 
650 0 |a Data structures (Computer science). 
650 0 |a Data encryption (Computer science). 
650 0 |a Coding theory. 
650 0 |a Information theory. 
650 0 |a Computer science—Mathematics. 
650 0 |a Computers. 
650 0 |a Computer security. 
650 1 4 |a Data Structures and Information Theory.  |0 https://scigraph.springernature.com/ontologies/product-market-codes/I15009 
650 2 4 |a Cryptology.  |0 https://scigraph.springernature.com/ontologies/product-market-codes/I28020 
650 2 4 |a Coding and Information Theory.  |0 https://scigraph.springernature.com/ontologies/product-market-codes/I15041 
650 2 4 |a Math Applications in Computer Science.  |0 https://scigraph.springernature.com/ontologies/product-market-codes/I17044 
650 2 4 |a History of Computing.  |0 https://scigraph.springernature.com/ontologies/product-market-codes/I24024 
650 2 4 |a Systems and Data Security.  |0 https://scigraph.springernature.com/ontologies/product-market-codes/I28060 
700 1 |a Mack, John.  |e author.  |4 aut  |4 http://id.loc.gov/vocabulary/relators/aut 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer Nature eBook 
776 0 8 |i Printed edition:  |z 9783319082790 
776 0 8 |i Printed edition:  |z 9783319082776 
776 0 8 |i Printed edition:  |z 9783319359823 
856 4 0 |u https://doi.org/10.1007/978-3-319-08278-3 
912 |a ZDB-2-SCS 
912 |a ZDB-2-SXCS 
950 |a Computer Science (SpringerNature-11645) 
950 |a Computer Science (R0) (SpringerNature-43710)