{"provider_name":"Hatena Blog","url":"https://yamdas.hatenablog.com/entry/20090924/cryptography","description":"SLIDESHOW: CIO Blast from the Past - 60 years of cryptography - cryptography, history - CIO Slashdot \u3067\u77e5\u3063\u305f\u306e\u3060\u304c\u3001\u4eca\u5e74\u306f\u30af\u30ed\u30fc\u30c9\u30fb\u30b7\u30e3\u30ce\u30f3\u304c\u8ad6\u6587\u300c\u79d8\u533f\u7cfb\u3067\u306e\u901a\u4fe1\u7406\u8ad6\uff08Communication Theory of Secrecy Systems\uff09\u300d\u3092\u767a\u8868\u3057\u306660\u5e74\u306b\u306a\u308b\u3002CIO.com \u304c\u6319\u3052\u308b\u3053\u306e60\u5e74\u9593\u3067\u306e\u6697\u53f7\u306b\u95a2\u3059\u308b\u30c8\u30d4\u30c3\u30af\u3092\u3044\u304f\u3064\u304b\u6319\u3052\u3066\u304a\u304f\u3002 1967\u5e74\uff1aDavid Kahn \u304c The Codebreakers\uff08\u90a6\u8a33\u300e\u6697\u53f7\u6226\u4e89\u2015\u65e5\u672c\u6697\u53f7\u306f\u3044\u304b\u306b\u89e3\u8aad\u3055\u308c\u305f\u304b\u300f\u3001asin:B000J\u2026","blog_title":"YAMDAS\u73fe\u66f4\u65b0\u5c65\u6b74","provider_url":"https://hatena.blog","height":"190","categories":["Security"],"image_url":"https://images-fe.ssl-images-amazon.com/images/I/41Br4tbu4aL._SL160_.jpg","version":"1.0","type":"rich","published":"2009-09-24 00:00:01","html":"<iframe src=\"https://hatenablog-parts.com/embed?url=https%3A%2F%2Fyamdas.hatenablog.com%2Fentry%2F20090924%2Fcryptography\" title=\" \u73fe\u4ee3\u6697\u53f7\u306e60\u5e74 - YAMDAS\u73fe\u66f4\u65b0\u5c65\u6b74\" class=\"embed-card embed-blogcard\" scrolling=\"no\" frameborder=\"0\" style=\"display: block; width: 100%; height: 190px; max-width: 500px; margin: 10px 0px;\"></iframe>","author_name":"yomoyomo","width":"100%","blog_url":"https://yamdas.hatenablog.com/","title":" \u73fe\u4ee3\u6697\u53f7\u306e60\u5e74","author_url":"https://blog.hatena.ne.jp/yomoyomo/"}