In this Book

summary
A large number of enciphered documents survived from early modern Hungary. This area was a particularly fertile territory where cryptographic methods proliferated, because a large portion of the population was living in the frontier zone, and participated (or was forced to participate) in the network of the information flow. A quantitative analysis of sixteenth-century to seventeenth-century Hungarian ciphers (300 cipher keys and 1,600 partly or entirely enciphered letters) reveals that besides the dominance of diplomatic use of cryptography, there were many examples of ŸprivateŒ applications too. This book reconstructs the main reasons and goals why historical actors chose to use ciphers in a diplomatic letter, a military order, a diary or a private letter, what they decided to encrypt, and how they perceived the dangers threatening their messages.

Table of Contents

  1. Cover
  2. open access
    • Download PDF Download
    contents
  1. Title Page, Copyright
  2. pp. i-iv
  3. open access
    • Download PDF Download
    contents
  1. Contents
  2. pp. v-vi
  3. open access
    • Download PDF Download
    contents
  1. Abbreviations
  2. pp. vii-viii
  3. open access
    • Download PDF Download
    contents
  1. Note on terminology
  2. pp. ix-x
  3. open access
    • Download PDF Download
    contents
  1. Note on names
  2. pp. xi-xii
  3. open access
    • Download PDF Download
    contents
  1. 1. Introduction
  2. pp. 13-14
  3. open access
    • Download PDF Download
    contents
  1. 2. Uncovered fields in the research literature
  2. pp. 15-28
  3. open access
    • Download PDF Download
    contents
  1. 3. Secret writings and attitudes - research questions
  2. pp. 29-30
  3. open access
    • Download PDF Download
    contents
  1. 4. Theory and practice of cryptography in early modern Europe
  2. pp. 31-50
  3. open access
    • Download PDF Download
    contents
  1. 5. Ciphers in Hungary: the source material
  2. pp. 51-84
  3. open access
    • Download PDF Download
    contents
  1. 6. Ciphers in action
  2. pp. 85-112
  3. open access
    • Download PDF Download
    contents
  1. 7. Ways of knowledge transfer
  2. pp. 113-130
  3. open access
    • Download PDF Download
    contents
  1. 8. Scenes of secrecy
  2. pp. 131-178
  3. open access
    • Download PDF Download
    contents
  1. 9. Summary
  2. pp. 179-182
  3. open access
    • Download PDF Download
    contents
  1. 10. Appendix
  2. pp. 183-206
  3. open access
    • Download PDF Download
    contents
  1. Acknowledgements
  2. pp. 207-208
  3. open access
    • Download PDF Download
    contents
  1. Earlier publications
  2. pp. 209-210
  3. open access
    • Download PDF Download
    contents
  1. Bibliography
  2. pp. 211-220
  3. open access
    • Download PDF Download
    contents
  1. Index
  2. pp. 221-224
  3. open access
    • Download PDF Download
    contents

Additional Information

ISBN
9789048536696
Related ISBN
9789462985544
MARC Record
OCLC
1178720882
Pages
224
Launched on MUSE
2020-07-28
Language
English
Open Access
Yes
Back To Top

This website uses cookies to ensure you get the best experience on our website. Without cookies your experience may not be seamless.