throbber
EBSCO Publishing : eBook Collection (EBSCOhost) - printed on 6/20/2013 11:15 AM via US PATENT AND TRADEMARK OFFICE
`AN: 1475 ; Newton, David E..; Encyclopedia of Cryptology
`Account: s5138672
`
`Copyright © 1997. ABC-CLIO. All rights reserved. May not be reproduced in any form without permission from the publisher, except fair uses permitted under U.S. or applicable copyright law.
`
`Venice, Naples, Mantua, Florence, and other city­states, along with the political intrigue and plotting that developed as a consequence of this economic interchange. 
`David Kahn reports that, by the end of the sixteenth century, cryptology had become important enough for most Italian city states to employ full­time cipher 
`secretaries. These officials were responsible for developing new nomenclators, enciphering plaintexts, deciphering incoming messages, and breaking captured 
`cryptograms.
`
`A nomenclator is actually a hybrid of code and cipher systems. In its earliest form, it consisted of a relatively short list of names alluded to in secret documents, along 
`with codewords representing the names. In one nomenclator, for example, "Naples" was represented by the word nobile (noble), while "Florence" was represented 
`by the word terra (land).
`
`Before long, a simple monosubstitution cipher alphabet was added to the list of names. The nomenclator mentioned above, for example, used the symbol g for the 
`letter C and the symbol T for the letter O. Over time, both the codenames and cipher alphabets used in nomenclators became more extensive and complex. Rather 
`than a few dozen codewords, they often contained a few thousand. In place of a monosubstitution alphabet, these nomenclators employed multiple substitutes, or 
`homophones. Nomenclators also commonly included symbols for nulls, or nihil importantes (nothing important), to confuse prospective cryptanalysts.
`
`Page 197
`
`An example of a message encrypted by means of a nomenclator (using modern symbols and language) might look like the following:
`PLAINTEXT:
`M O
`N
`E
`Y
`T
`O
`S
`M
`I
`T
`H
`S E N D  


`x t v i k j c
`b

`
`nomenclator:
`
`v
`
`e
`
`a
`
`p
`
`c
`
`t
`
`u
`
`l
`
`i
`
`p
`
`See also: cipher; code; homophones; monoalphabetic substitution; null.
`
`For further reading: David Kahn, The Codebreakers: The Story of Secret Writing, New York: Macmillan, 1967, ch. 3.
`
`Nonce
`
`A number used in a cryptographic protocol to indicate the unique character of a message. Nonces are essential when the same protocol is used many times with the 
`same set of participants. Theoretically, it would be simple for a third party to alter any particular transmission using the protocol if no change were made in its use each 
`time. A number of different devices can be used as nonces, including large random numbers and time­stamps.
`
`See also: random number; time­stamp.
`
`For further reading: Charlie Kaufman, Radia Perlman, and Mike Speciner, Network Security: Private Communication in a Public World, Englewood Cliffs, NJ: Prentice­Hall, 
`1995, pp. 244, 254­256.
`
`Nonrepudiation
`
`Proof that a particular person or organization has made some type of agreement with one or more other people or organizations. Nonrepudiation means that a person 
`or organization cannot say at some time in the future that he, she, or it never really agreed to some arrangement with another party.
`
`Nonrepudiation is a normal and common feature of agreements in everyday life. For example, when someone wants to borrow money from a bank, he or she signs an 
`agreement indicating that the money really was borrowed and that it will be paid back. The person cannot later say that the money was never really obtained and/or 
`that there was never any intent to pay the money back.
`
`Nonrepudiation is normal in business transactions also. Alice may sign an agreement with Bob to buy 10,000 shares of stock in the ABC Company for $1 million. Her 
`signature on the agreement is accepted as proof that she made the agreement in the first place.
`
`For many everyday transactions, a personal signature is sufficient evidence for later nonrepudiation of an agreement. In many cases, the signature may need to be 
`witnessed by a trusted third party,
`
`  

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket