Citaten:
- Science is the study of all things Masta Killah, Wu-Tang Clan
- Bijgeloof brengt ongeluk Openingscitaat van de slinger van Foucault.
Werk in uitvoering
Statistieken voor de liefhebber.
Notities
Artikelen waar ik momenteel aan werk:
Bronnen die ik bezit of online beschikbaar zijn (selectie).
spionage
[1]
[2]
[3]
[4]
[5]
[6]
[7]
[8]
[9]
[10]
[11]
[12]
[13]
[14]
[15]
[16]
[17]
cryptologie
[18]
[19]
[20]
[21]
[22]
[23]
[24]
[25]
[26]
enigma-specifiek (en gerelateerd)
[27]
[28]
[29]
[30]
[31]
[32]
[33]
[34]
[35]
[36]
[37]
[38]
[39]
[40]
[41]
[42]
[43]
[44]
[45]
[46]
[47]
[48]
[49]
[50]
[51]
[52]
overig
- ↑ Dulles, Allen W. ([194x]2006) The craft of intelligence The Lyons Press ISBN 1592282970 (10) ISBN 978592282975 (13)
- ↑ Pinto, Lt.-Kol Oreste (g.d.) Spionage Contra Spionage. Schelten & Gilten
- ↑ Foote, Alexander (1965) Agent voor Moskou Prisma-Boeken
- ↑ Gunnewegh, Will (1974) Spion van het koninkrijk Contact ISBN 9025463061
- ↑ Haswell, Jack (1977) Spies & Spymasters, a concise history of intelligence. Thames and Hudson ISBN 0500011788
- ↑ Brown, Anthony Cave (1979) Het onzichtbare front. Van Holkema & Warendorf ISBN 9026945469
- ↑ Stevenson, William ([1984]1995) Codenaam Intrepid. De geheime operaties van Churchills meesterspion. A.W. Bruna Uitgevers ISBN 9044925881
- ↑ Wright, Peter (1987) Spycatcher, de onthullende memoires van een topambtenaar van de Britse inlichtingendienst MI5. Uitgeverij Jan Mets ISBN 9070509903
- ↑ Knightly, Phillip (1990) Philby, Spion uit overtuiging. Uitgeverij Jan Mets ISBN 9070509830
- ↑ Hoy, Claire & Ostrovsky, Victor (1991) Het web van de mossad. Onthullingen van een Israëlisch geheim agent. M & P Uitgeverij ISBN 9065904794
- ↑ Koedijk, P & Linssen, J. & Engelen, D. (red) (1996) Verspieders voor het vaderland: Nederlandse spionage voor, tijdens en na de Koude Oorlog. Sdu Uitgevers ISBN 9012083818
- ↑ Polmer, Norman & Allen, Thomas B. (1997) Spy book, The Encyclopedia of Espionage. Random House ISBN 1853672785
- ↑ Wolf, Markus (1997) Memoirs of a spymaster, The man who waged a secret war against the west Pimlico ISBN 0712666559
- ↑ Dorril, Stephen (2000) MI6. Inside the Covert World of Her Majesty's Secret Intelligence Service. Free Press ISBN 0743203798
- ↑ Dröge, Philip (2002) Beroep: Meesterspion. Het geheime leven van Prins Bernhard. Vassalucci ISBN 9050004393
- ↑ Jeffreys-Jones, Rhodri (2002) Cloak and dollar: a history of American secret intelligence. Yale University Press ISBN 0300074743
- ↑ Budiansky, Stephen (2005) Her Majesty's spymaster: Elizabeth I, Sir Francis Walsingham and the birth of modern espionage. Viking ISBN 9780670034260
- ↑ Mendelsohn, Charles J. (1940) Blaise de Vigenère and the "Chiffre Carré" American Philosophical Society online
- ↑ Smith, Laurence Dwiight (1943) Cryptography. The science of secret writing Dover Publications ISBN 048620247X
- ↑ Gaines, Helen Fouché ([1939]1956) Cryptanalysis. A study of cipher and their solution Dover Publications ISBN 0486200973
- ↑ Tuchman, Barbara W. (1965) The Zimmermann Telegramm. Dell Publishing
- ↑ Kahn, David ([1967]1996) The Codebreakers. The Comprehensive History of Secret Communication from Ancient Times to the Internet. Scribner ISBN 0684831309
- ↑ Moore, Dan Tyler & Waller, Martha (1968) Geheimschriften en codes Prisma-Boeken
- ↑ Beckett, Brian (1988) Introduction to Cryptology Blackwell Scientific Publications ISBN 0632018364
- ↑ Butler, William S. & Keeney, Douglas L. (2001) Concealment, codes, & other types of ingenious communication Simon & Schuster ISBN 0684869985
- ↑ Pincock, Stephen & Frary, Mark (2006) Geheimtalen, Vanaf de farao's tot de kwantumcryptografie Veen Magazines ISBN 9789085710936
- ↑ The Glow-Lamp Ciphering and Deciphering Machine: Enigma Sales Brochure. cryptologia online pdf
- ↑ Koot, H ([1926]2002) Expert's opinion on the Enigma ciphering machine. cryptologia online
- ↑ Hamer David (1997) Enigma: Actions Involved in the ‘Double-Stepping’ of the Middle Rotor. cryptologia online pdf
- ↑ Hamer, David H., Sullivan, Geoff & Weierud, Frode (1998) Enigma Variations: an Extended Family of Machines. cryptologia. online pdf
- ↑ Bauer, Friedrich L (1999) An error in the history of rotor encryption devices. cryptologia online
- ↑ Davies, Donald W (1999) The bombe: A remarkable logic machine. cryptologia online
- ↑ Erskine, Ralph (1999) Kriegsmarine short signal systems--and how Bletchley Park exploited them. cryptologia online
- ↑ Ulbricht, Heinz (1999) Enigma-uhr. cryptologia online
- ↑ Marks, Philip (2000) Recovering the wiring of Enigma's Umkehrwalze A. cryptologia online
- ↑ Williams, Heidi (2000) Applying statistical language recognition techniques in the Ciphertext-Only Cryptanalysis of Enigma. cryptologia online
- ↑ Hamer, David H. (2000) G-312: An Abwehr Enigma. cryptologia online
- ↑ Smith, Michael (2001) Station X. Het ENIGMA-raadsel ontrafeld Tririon ISBN 9043901709
- ↑ Marks, Philip C. (2001) Umkehrwalze D: Enigma's rewirable reflector. cryptologia deel I deel II deel III
- ↑ Kruh, Louis (2002) The Commercial Enigma: Beginnings of machine cryptography. cryptologia online
- ↑ Glunder, Georg & Mache, Wolfgang W. (2002) Wireless and "geheimschreiber" operator in the war, 1941-1945. cryptologia online
- ↑ Hamer, David H. (2003) The enigmas - and other recovered artefacts - of U-85. cryptologia online
- ↑ Erskine, Ralph (2003) From the archives: What the Sinkov mission brought to Bletchley Park. cryptologia online
- ↑ De Leeuw, Karl (2003) The Dutch invention of the rotor machine, 1915-1923. cryptologia online errata
- ↑ Erskine, Ralph & Freeman, Peter (2003) Brigadier John Tiltman: One of Britain's finest cryptologists. cryptologia online
- ↑ Gladwin, Lee A. (2003) Alan M. Turing's critique of running short cribs on the US Navy Bombe. cryptologia online
- ↑ Ratcliff, R. A. (2003) How statistics led the Germans to believe enigma secure and why they were wrong: Neglecting the practical mathematics of cipher machines cryptologia online
- ↑ Erskine, Ralph & Marks, Philip (2004) Naval Enigma: Seahorse and Other Kriegsmachine Cipher Blunders. cryptologia online
- ↑ Cowan, Michael J (2004) Rasterschlussel 44 - The Epitome of Hand Field Ciphers. cryptologia online
- ↑ Fuensanta, JoséRamón Soler (2004) Mechanical Cipher Systems in the Spanish Civil War cryptologia online
- ↑ Quirantes, Arturo (2004) Model Z: A numbers-only enigma version. cryptologia online
- ↑ Ulbricht, Heinz (2005) Die Chiffriermaschine Enigma — Trügerische Sicherheit: Ein Beitrag zur Geschichte der Nachrichtendienste. dissertatie online pdf
Bijdragen
(Klassieke) cryptografie
bewerkenMethodes
bewerken- Atbash - Baconalfabet - Caesarcijfer - Paardensprongcijfer - Polybiusvierkant - |Scytale
- Salt (cryptografie)
- Woordenlijstaanval
- TrueCrypt (gekaapt)
- Hans-Thilo Schmidt - B-Dienst - Rasterschlussel 44 - - Government Communications Headquarters - SIGINT - Biuro Szyfrów - Bombe - Kryha - Lacida - Clock (cryptografie) - Zygalski-bladen -
- Friedrich Kasiski - Henryk Zygalski - Raphael Mnishovsky - Blaise de Vigenère - Felix Delastelle - Johannes Trithemius - Antoine Rossignol - Auguste Kerckhoffs von Nieuwenhoff - Pierre Lyonet - Abel Tasien d'Alonne - Heinrich Cornelius Agrippa von Nettesheim - Thomas Phelippes - Giambattista della Porta - Étienne Bazeries - George Scovell - Alfred Dillwyn Knox - William Blencowe - John Wilkins - Herbert Yardley - Charles Wheatstone
- Arthur Scherbius - Hugo Alexander Koch (revisie) - Edward Hebern
Informatica en gerelateerd
bewerken- nslookup - cp - Pocket Linux Guide - National Science Foundation Network - Clifford Stoll
- port scan (herschreven) - nmap - hping - smurf - Teardrop - Ping-of-Death - tcpdump