Code Breaking in the Pacific

This book reveals the historical context and the evolution of the technically complex Allied Signals Intelligence (Sigint) activity against Japan from 1920 to 1945. It traces the all-important genesis and development of the cryptanalytic techniques used to break the main Japanese Navy code (JN-25) a...

Full description

Bibliographic Details
Main Authors: Donovan, Peter, Mack, John (Author)
Format: eBook
Language:English
Published: Cham Springer International Publishing 2014, 2014
Edition:1st ed. 2014
Subjects:
Online Access:
Collection: Springer eBooks 2005- - Collection details see MPG.ReNa
LEADER 03403nmm a2200433 u 4500
001 EB000895647
003 EBX01000000000000000692767
005 00000000000000.0
007 cr|||||||||||||||||||||
008 140908 ||| eng
020 |a 9783319082783 
100 1 |a Donovan, Peter 
245 0 0 |a Code Breaking in the Pacific  |h Elektronische Ressource  |c by Peter Donovan, John Mack 
250 |a 1st ed. 2014 
260 |a Cham  |b Springer International Publishing  |c 2014, 2014 
300 |a XXVI, 387 p  |b online resource 
505 0 |a Communications and Sigint -- Japanese Expansion 1895-1941 -- The GCCS 1919-1941 -- William Friedman and the US Army -- Early American Naval Sigint -- Developments in Australia -- Preparedness for Attack?- Major Technical Encryption Systems -- JN-25 and its Cryptanalysis -- Using Common Book Groups -- Recovery of a Code Book -- Breaking Additive Systems -- Making Additive Systems Secure -- Redundant Encryption -- The Scanning Distribution -- Ciphers and the Submarines -- Central Bureau 1942-1945 -- Organisation and Reorganisation -- Security, Censorship and Leaks -- Conclusion -- From Pearl Harbor to Midway -- Guadalcanal and Papua -- Rabaul and the Philippines 
653 |a Coding and Information Theory 
653 |a Coding theory 
653 |a Computer science / Mathematics 
653 |a Cryptography 
653 |a Computers / History 
653 |a Data Structures and Information Theory 
653 |a Mathematical Applications in Computer Science 
653 |a Data protection 
653 |a Information theory 
653 |a Data encryption (Computer science) 
653 |a Data structures (Computer science) 
653 |a Cryptology 
653 |a Data and Information Security 
653 |a History of Computing 
700 1 |a Mack, John  |e [author] 
041 0 7 |a eng  |2 ISO 639-2 
989 |b Springer  |a Springer eBooks 2005- 
028 5 0 |a 10.1007/978-3-319-08278-3 
856 4 0 |u https://doi.org/10.1007/978-3-319-08278-3?nosfx=y  |x Verlag  |3 Volltext 
082 0 |a 003.54 
082 0 |a 005.73 
520 |a This book reveals the historical context and the evolution of the technically complex Allied Signals Intelligence (Sigint) activity against Japan from 1920 to 1945. It traces the all-important genesis and development of the cryptanalytic techniques used to break the main Japanese Navy code (JN-25) and the Japanese Army’s Water Transport Code during WWII. This is the first book to describe, explain and analyze the code breaking techniques developed and used to provide this intelligence, thus closing the sole remaining gap in the published accounts of the Pacific War. The authors also explore the organization of cryptographic teams and issues of security, censorship, and leaks. Correcting gaps in previous research, this book illustrates how Sigint remained crucial to Allied planning throughout the war. It helped direct the advance to the Philippines from New Guinea, the sea battles and the submarine onslaught on merchant shipping. Written by well-known authorities on the history of cryptography and mathematics, Code Breaking in the Pacific is designed for cryptologists, mathematicians and researchers working in communications security. Advanced-level students interested in cryptology, the history of the Pacific War, mathematics or the history of computing will also find this book a valuable resource