000 03643cam a2200421Ii 4500
001 ocn887817555
003 OCoLC
005 20240726104718.0
008 140819t20142014sz ob 001 0 eng d
040 _aNT
_beng
_erda
_epn
_cNT
_dGW5XE
_dYDXCP
_dCOO
_dUPM
_dE7B
_dOCLCF
_dEBLCP
_dDEBSZ
_dOCLCQ
_dOCL
_dSTF
_dIOG
_dZ5A
_dOCLCA
_dESU
_dOCLCQ
_dVT2
_dOCLCO
_dREB
_dCEF
_dDEHBZ
_dOCLCQ
_dOCLCO
_dINT
_dU3W
_dOCLCQ
_dOCLCO
_dWYU
_dYOU
_dTKN
_dOCLCQ
_dOCLCO
_dOL
020 _a9783319082783
_q((electronic)l(electronic)ctronic)
020 _a3319082787
_q((electronic)l(electronic)ctronic)
020 _a3319082795
020 _a3319359827
043 _ap------
_an-us---
050 0 4 _aD810
_b.C634 2014
049 _aMAIN
100 1 _aDonovan, Peter,
_e1
245 1 0 _aCode breaking in the Pacific /Peter Donovan, John Mack.
260 _aCham :
_bSpringer,
_c(c)2014.
300 _a1 online resource
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _adata file
_2rda
504 _a2
505 0 0 _aCommunications and Sigint --
_tJapanese Expansion 1895-1941 --
_tThe GCCS 1919-1941 --
_tWilliam Friedman and the US Army --
_tEarly American Naval Sigint --
_tDevelopments in Australia --
_tPreparedness for Attack?- Major Technical Encryption Systems --
_tJN-25 and its Cryptanalysis --
_tUsing Common Book Groups --
_tRecovery of a Code Book --
_tBreaking Additive Systems --
_tMaking Additive Systems Secure --
_tRedundant Encryption --
_tThe Scanning Distribution --
_tCiphers and the Submarines --
_tCentral Bureau 1942-1945 --
_tOrganisation and Reorganisation --
_tSecurity, Censorship and Leaks --
_tConclusion --
_tFrom Pearl Harbor to Midway --
_tGuadalcanal and Papua --
_tRabaul and the Philippines.
520 0 _aThis book reveals the historical context and the evolution of the technically complex Allied Signals Intelligence (Sigint) activity against Japan from 1920 to 1945. It traces the all-important genesis and development of the cryptanalytic techniques used to break the main Japanese Navy code (JN-25) and the Japanese Army's Water Transport Code during WWII. This is the first book to describe, explain and analyze the code breaking techniques developed and used to provide this intelligence, thus closing the sole remaining gap in the published accounts of the Pacific War. The authors also explore the organization of cryptographic teams and issues of security, censorship, and leaks. Correcting gaps in previous research, this book illustrates how Sigint remained crucial to Allied planning throughout the war. It helped direct the advance to the Philippines from New Guinea, the sea battles and the submarine onslaught on merchant shipping. Written by well-known authorities on the history of cryptography and mathematics, Code Breaking in the Pacific is designed for cryptologists, mathematicians and researchers working in communications security. Advanced-level students interested in cryptology, the history of the Pacific War, mathematics or the history of computing will also find this book a valuable resource.
530 _a2
_ub
650 0 _aWorld War, 1939-1945
_zPacific Ocean
_xCryptography.
650 0 _aCryptography
_zUnited States
_xHistory
_y20th century.
655 1 _aElectronic Books.
700 1 _aMack, John,
_e1
856 4 0 _zClick to access digital title | log in using your CIU ID number and my.ciu.edu password.
_uhttpss://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=830735&site=eds-live&custid=s3260518
942 _cOB
_D
_eEB
_hD.
_m2014
_QOL
_R
_x
_8NFIC
_2LOC
994 _a92
_bNT
999 _c75746
_d75746
902 _a1
_bCynthia Snell
_c1
_dCynthia Snell