%PDF-1.4 % 9 0 obj << /S /GoTo /D (Outline1) >> endobj 12 0 obj (History of cryptography) endobj 13 0 obj << /S /GoTo /D (Outline14.1) >> endobj 16 0 obj (CHAPTER 14: Machines and history of cryptography) endobj 17 0 obj << /S /GoTo /D (Outline14.2) >> endobj 20 0 obj (Prologue) endobj 21 0 obj << /S /GoTo /D (Outline14.3) >> endobj 24 0 obj (What to value more?) endobj 25 0 obj << /S /GoTo /D (Outline14.4) >> endobj 28 0 obj (Who are codebreakers) endobj 29 0 obj << /S /GoTo /D (Outline14.5) >> endobj 32 0 obj (History of cryptography - summary) endobj 33 0 obj << /S /GoTo /D (Outline14.6) >> endobj 36 0 obj (From very early history of cryptography) endobj 37 0 obj << /S /GoTo /D (Outline14.7) >> endobj 40 0 obj (Polyalphabetic cryptosystem) endobj 41 0 obj << /S /GoTo /D (Outline14.8) >> endobj 44 0 obj (PRODUCT CRYPTOSYSTEMS) endobj 45 0 obj << /S /GoTo /D (Outline14.9) >> endobj 48 0 obj (Codebooks cryptography) endobj 49 0 obj << /S /GoTo /D (Outline14.10) >> endobj 52 0 obj (Nomenclators) endobj 53 0 obj << /S /GoTo /D (Outline14.11) >> endobj 56 0 obj (Old golden times of cryptography) endobj 57 0 obj << /S /GoTo /D (Outline14.12) >> endobj 60 0 obj (Examples of "unbreakable codes") endobj 61 0 obj << /S /GoTo /D (Outline14.13) >> endobj 64 0 obj (Beale code) endobj 65 0 obj << /S /GoTo /D (Outline14.14) >> endobj 68 0 obj (Beale code - 1 page) endobj 69 0 obj << /S /GoTo /D (Outline14.15) >> endobj 72 0 obj (Black chambers) endobj 73 0 obj << /S /GoTo /D (Outline14.16) >> endobj 76 0 obj (FAMOUS CRYPTOGRAPHERS of pre COMPUTER ERA) endobj 77 0 obj << /S /GoTo /D (Outline14.17) >> endobj 80 0 obj (Thomas Jefferson) endobj 81 0 obj << /S /GoTo /D (Outline14.18) >> endobj 84 0 obj (From cryptography seen as "black magic" to science view) endobj 85 0 obj << /S /GoTo /D (Outline14.19) >> endobj 88 0 obj (Cryptography in Japan) endobj 89 0 obj << /S /GoTo /D (Outline14.20) >> endobj 92 0 obj (History of cryptographic machines) endobj 93 0 obj << /S /GoTo /D (Outline14.21) >> endobj 96 0 obj (First known devices - scytale) endobj 97 0 obj << /S /GoTo /D (Outline14.22) >> endobj 100 0 obj (Encryption discs) endobj 101 0 obj << /S /GoTo /D (Outline14.23) >> endobj 104 0 obj (Jefferson's wheel) endobj 105 0 obj << /S /GoTo /D (Outline14.24) >> endobj 108 0 obj (Cryptography of the first World War) endobj 109 0 obj << /S /GoTo /D (Outline14.25) >> endobj 112 0 obj (Beginning of the First World War) endobj 113 0 obj << /S /GoTo /D (Outline14.26) >> endobj 116 0 obj (ADFGVX cryptosystem) endobj 117 0 obj << /S /GoTo /D (Outline14.27) >> endobj 120 0 obj (Room 40) endobj 121 0 obj << /S /GoTo /D (Outline14.28) >> endobj 124 0 obj (Zimmerman telegram) endobj 125 0 obj << /S /GoTo /D (Outline14.29) >> endobj 128 0 obj (Zimmerman telegram - story) endobj 129 0 obj << /S /GoTo /D (Outline14.30) >> endobj 132 0 obj (Cryptography of the Second World War) endobj 133 0 obj << /S /GoTo /D (Outline14.31) >> endobj 136 0 obj (Battle of Atlantic) endobj 137 0 obj << /S /GoTo /D (Outline14.32) >> endobj 140 0 obj (Battle of Atlantic - II) endobj 141 0 obj << /S /GoTo /D (Outline14.33) >> endobj 144 0 obj (Battle of Atlantic - summary) endobj 145 0 obj << /S /GoTo /D (Outline14.34) >> endobj 148 0 obj (Story of Enigma) endobj 149 0 obj << /S /GoTo /D (Outline14.35) >> endobj 152 0 obj (ENIGMA -- its principles) endobj 153 0 obj << /S /GoTo /D (Outline14.36) >> endobj 156 0 obj (PICTURE of ENIGMA) endobj 157 0 obj << /S /GoTo /D (Outline14.37) >> endobj 160 0 obj (Impacts of a moving scrambler) endobj 161 0 obj << /S /GoTo /D (Outline14.38) >> endobj 164 0 obj (Impacts of two sramblers) endobj 165 0 obj << /S /GoTo /D (Outline14.39) >> endobj 168 0 obj (ENIGMA structure in case of three scramblers) endobj 169 0 obj << /S /GoTo /D (Outline14.40) >> endobj 172 0 obj (Cracking of ENIGMA) endobj 173 0 obj << /S /GoTo /D (Outline14.41) >> endobj 176 0 obj (Day keys versus message keys I) endobj 177 0 obj << /S /GoTo /D (Outline14.42) >> endobj 180 0 obj (Cracking Enigma - basic insights) endobj 181 0 obj << /S /GoTo /D (Outline14.43) >> endobj 184 0 obj (Day keys versus message keys II) endobj 185 0 obj << /S /GoTo /D (Outline14.44) >> endobj 188 0 obj (NAVAL ENIGMA) endobj 189 0 obj << /S /GoTo /D (Outline14.45) >> endobj 192 0 obj (Story of Bletchey park) endobj 193 0 obj << /S /GoTo /D (Outline14.46) >> endobj 196 0 obj (Bletchey park - I.) endobj 197 0 obj << /S /GoTo /D (Outline14.47) >> endobj 200 0 obj (Bletchey park - II.) endobj 201 0 obj << /S /GoTo /D (Outline14.48) >> endobj 204 0 obj (Work in Bletchey park) endobj 205 0 obj << /S /GoTo /D (Outline14.49) >> endobj 208 0 obj (Problems and main successes of Bletchey Park) endobj 209 0 obj << /S /GoTo /D (Outline14.50) >> endobj 212 0 obj (Cribs) endobj 213 0 obj << /S /GoTo /D (Outline14.51) >> endobj 216 0 obj (Intelligence reporting) endobj 217 0 obj << /S /GoTo /D (Outline14.52) >> endobj 220 0 obj (Turing's role in Bletchey park) endobj 221 0 obj << /S /GoTo /D (Outline14.53) >> endobj 224 0 obj (Bombs - photo from war time) endobj 225 0 obj << /S /GoTo /D (Outline14.54) >> endobj 228 0 obj (Bombs - reconstruction - view from back) endobj 229 0 obj << /S /GoTo /D (Outline14.55) >> endobj 232 0 obj (LORENZ SZ40 and COLOSSUS) endobj 233 0 obj << /S /GoTo /D (Outline14.56) >> endobj 236 0 obj (Lorenz SZ40) endobj 237 0 obj << /S /GoTo /D (Outline14.57) >> endobj 240 0 obj (Lorenz SZ40 I) endobj 241 0 obj << /S /GoTo /D (Outline14.58) >> endobj 244 0 obj (COLOSSUS - technical details) endobj 245 0 obj << /S /GoTo /D (Outline14.59) >> endobj 248 0 obj (Colossus - prehistory) endobj 249 0 obj << /S /GoTo /D (Outline14.60) >> endobj 252 0 obj (Colossus - decryption of Lorenz) endobj 253 0 obj << /S /GoTo /D (Outline14.61) >> endobj 256 0 obj (Design of Colossus) endobj 257 0 obj << /S /GoTo /D (Outline14.62) >> endobj 260 0 obj (Colossus - photo) endobj 261 0 obj << /S /GoTo /D (Outline14.63) >> endobj 264 0 obj (Colossus - photo from back) endobj 265 0 obj << /S /GoTo /D (Outline14.64) >> endobj 268 0 obj (Colossus - details) endobj 269 0 obj << /S /GoTo /D (Outline14.65) >> endobj 272 0 obj (Colossus - comments) endobj 273 0 obj << /S /GoTo /D (Outline14.66) >> endobj 276 0 obj (Story of encryption machines) endobj 277 0 obj << /S /GoTo /D (Outline14.67) >> endobj 280 0 obj (Navajo code) endobj 281 0 obj << /S /GoTo /D (Outline14.68) >> endobj 284 0 obj (Story of RSA) endobj 285 0 obj << /S /GoTo /D (Outline14.69) >> endobj 288 0 obj (History of RSA) endobj 289 0 obj << /S /GoTo /D (Outline14.70) >> endobj 292 0 obj (History of RSA revisited) endobj 293 0 obj << /S /GoTo /D (Outline14.71) >> endobj 296 0 obj (Attacks on RSA) endobj 297 0 obj << /S /GoTo /D (Outline14.72) >> endobj 300 0 obj (Pretty Good Privacy) endobj 301 0 obj << /S /GoTo /D (Outline14.73) >> endobj 304 0 obj (History of quantum cryptography) endobj 305 0 obj << /S /GoTo /D (Outline14.74) >> endobj 308 0 obj (Epilogue) endobj 309 0 obj << /S /GoTo /D (Outline14.75) >> endobj 312 0 obj (Cryptography tools as weapons) endobj 313 0 obj << /S /GoTo /D (Outline14.76) >> endobj 316 0 obj (Useful observations) endobj 317 0 obj << /S /GoTo /D [318 0 R /Fit ] >> endobj 324 0 obj << /Length 641 /Filter /FlateDecode >> stream xڽVM@Wf'T8 ](ݖJؓ&ʹ)ZDƉ=1pf9ncՉ