Books on cryptography
Encyclopedia
Books on cryptography
have been published sporadically and with highly variable quality for a long time. This is despite the tempting, though superficial, paradox
that secrecy is of the essence in sending confidential messages — see Kerckhoffs' principle
.
In contrast, the revolution in cryptography
and secure communications
of the last 25 years is well covered in the available literature.
as being about black magic or witchcraft. Many writers claimed to have invented unbreakable cipher
s. None were, though it sometimes took a long while to establish this.
In the 19th century, the general standard improved somewhat (eg, works by Auguste Kerckhoffs
, Friedrich Kasiski
, and Étienne Bazeries
). Colonel Parker Hitt and William Friedman
in the early 20th century also wrote books on cryptography. These authors, and others, mostly abandoned any mystical or magical tone.
, cryptography and its literature began to be officially limited. One exception was The American Black Chamber by Herbert Yardley
, which gave some insight into American cryptologic success stories, including the Zimmermann telegram
and the breaking of Japanese codes during the Washington Naval Conference
.
, which was published at a time (mid-1960s) when virtually no information on the modern practice of cryptography was available. Kahn has said that over ninety percent of its content was previously unpublished. The book caused serious concern at the NSA despite its lack of coverage of specific modern cryptographic practice, so much so that after failing to prevent the book being published, NSA staff were informed to not even acknowledge the existence of the book if asked. In the US military, mere possession of a copy by cryptographic personnel was grounds for some considerable suspicion. Perhaps the single greatest importance of the book was the impact it had on the next generation of cryptographers. Whitfield Diffie
has made comments in interviews about the effect it had on him.
Cryptography
Cryptography is the practice and study of techniques for secure communication in the presence of third parties...
have been published sporadically and with highly variable quality for a long time. This is despite the tempting, though superficial, paradox
Paradox
Similar to Circular reasoning, A paradox is a seemingly true statement or group of statements that lead to a contradiction or a situation which seems to defy logic or intuition...
that secrecy is of the essence in sending confidential messages — see Kerckhoffs' principle
Kerckhoffs' principle
In cryptography, Kerckhoffs's principle was stated by Auguste Kerckhoffs in the 19th century: A cryptosystem should be secure even if everything about the system, except the key, is public knowledge.Kerckhoffs's principle was reformulated by Claude Shannon as...
.
In contrast, the revolution in cryptography
Cryptography
Cryptography is the practice and study of techniques for secure communication in the presence of third parties...
and secure communications
Information transfer
In telecommunications, information transfer is the process of moving messages containing user information from a source to a sink.Note: The information transfer rate may or may not be equal to the transmission modulation rate.-See also:...
of the last 25 years is well covered in the available literature.
Early history
An early example of a book about cryptography was a Roman work, now lost and known only by references. Many early cryptographic works were esoteric, mystical, and/or reputation-promoting; cryptography being mysterious, there was much opportunity for such things. At least one work by Trithemius was banned by the Catholic Church and put on the Index Librorum ProhibitorumIndex Librorum Prohibitorum
The Index Librorum Prohibitorum was a list of publications prohibited by the Catholic Church. A first version was promulgated by Pope Paul IV in 1559, and a revised and somewhat relaxed form was authorized at the Council of Trent...
as being about black magic or witchcraft. Many writers claimed to have invented unbreakable cipher
Cipher
In cryptography, a cipher is an algorithm for performing encryption or decryption — a series of well-defined steps that can be followed as a procedure. An alternative, less common term is encipherment. In non-technical usage, a “cipher” is the same thing as a “code”; however, the concepts...
s. None were, though it sometimes took a long while to establish this.
In the 19th century, the general standard improved somewhat (eg, works by Auguste Kerckhoffs
Auguste Kerckhoffs
Auguste Kerckhoffs was a Dutch linguist and cryptographer who was professor of languages at the École des Hautes Études Commerciales in Paris in the late 19th century....
, Friedrich Kasiski
Friedrich Kasiski
Major Friedrich Wilhelm Kasiski was a Prussian infantry officer, cryptographer and archeologist. Kasiski was born in Schlochau, West Prussia .-Military service:...
, and Étienne Bazeries
Étienne Bazeries
Étienne Bazeries was a French military cryptanalyst active between 1890 and the First World War. He is best known for developing the "Bazeries Cylinder", an improved version of Thomas Jefferson's cipher cylinder. It was later refined into the US Army M-94 cipher device. Historian David Kahn...
). Colonel Parker Hitt and William Friedman
William F. Friedman
William Frederick Friedman was a US Army cryptographer who ran the research division of the Army's Signals Intelligence Service in the 1930s, and parts of its follow-on services into the 1950s...
in the early 20th century also wrote books on cryptography. These authors, and others, mostly abandoned any mystical or magical tone.
Open literature versus classified literature
With the invention of radio, much of military communications went wireless, allowing the possibility of enemy interception much more readily than tapping into a landline. This increased the need to protect communications. By the end of World War IWorld War I
World War I , which was predominantly called the World War or the Great War from its occurrence until 1939, and the First World War or World War I thereafter, was a major war centred in Europe that began on 28 July 1914 and lasted until 11 November 1918...
, cryptography and its literature began to be officially limited. One exception was The American Black Chamber by Herbert Yardley
Herbert Yardley
Herbert Osborne Yardley was an American cryptologist best known for his book The American Black Chamber . The title of the book refers to the Cipher Bureau, the cryptographic organization of which Yardley was the founder and head...
, which gave some insight into American cryptologic success stories, including the Zimmermann telegram
Zimmermann Telegram
The Zimmermann Telegram was a 1917 diplomatic proposal from the German Empire to Mexico to make war against the United States. The proposal was caught by the British before it could get to Mexico. The revelation angered the Americans and led in part to a U.S...
and the breaking of Japanese codes during the Washington Naval Conference
Washington Naval Conference
The Washington Naval Conference also called the Washington Arms Conference, was a military conference called by President Warren G. Harding and held in Washington from 12 November 1921 to 6 February 1922. Conducted outside the auspices of the League of Nations, it was attended by nine nations...
.
The Codebreakers
Until the late twentieth century most aspects of modern cryptography were regarded as the special concern of governments and the military, and were protected by custom and, in some cases, by statute. The most significant work to be published on cryptography in this period is undoubtedly David Kahn's The CodebreakersThe Codebreakers
The Codebreakers – The Story of Secret Writing is a book by David Kahn, published in 1967 comprehensively chronicling the history of cryptography from ancient Egypt to the time of its writing...
, which was published at a time (mid-1960s) when virtually no information on the modern practice of cryptography was available. Kahn has said that over ninety percent of its content was previously unpublished. The book caused serious concern at the NSA despite its lack of coverage of specific modern cryptographic practice, so much so that after failing to prevent the book being published, NSA staff were informed to not even acknowledge the existence of the book if asked. In the US military, mere possession of a copy by cryptographic personnel was grounds for some considerable suspicion. Perhaps the single greatest importance of the book was the impact it had on the next generation of cryptographers. Whitfield Diffie
Whitfield Diffie
Bailey Whitfield 'Whit' Diffie is an American cryptographer and one of the pioneers of public-key cryptography.Diffie and Martin Hellman's paper New Directions in Cryptography was published in 1976...
has made comments in interviews about the effect it had on him.
List
Significant books on cryptography include:- Gaines, Helen FouchéHelen Fouché GainesHelen Fouché Gaines was a member of the American Cryptogram Association and editor of the book Cryptanalysis . Her nom was PICCOLA. Shortly after the publication of the book, she died.-External links:**...
– Cryptanalysis, 1939, Dover, ISBN 0-486-20097-3. Considered one of the classic books on the subject, and includes many sample ciphertext for practice. It reflects public amateur practice as of the inter-War period. The book was compiled as one of the first projects of the American Cryptogram AssociationAmerican Cryptogram AssociationThe American Cryptogram Association is an American non-profit organization devoted to the hobby of cryptography, with an emphasis on types of codes, ciphers, and cryptograms that can be solved either with pencil and paper, or with computers, but not computer-only systems.-History:The ACA was formed...
. - Dominic Welsh – Codes and Cryptography, Oxford University Press, 1988. A brief textbook intended for undergraduates. Some coverage of fundamental information theory. Requires some mathematical maturityMathematical maturityMathematical maturity is an informal term used by mathematicians to refer to a mixture of mathematical experience and insight that cannot be directly taught...
; is well written, and otherwise accessible. - Patterson, Wayne (1987). Mathematical Cryptology for Computer Scientists and Mathematicians, Rowman & Littlefield, ISBN 0-8476-7438-X
- Konheim, Alan G. (1981). Cryptography: A Primer, John Wiley & Sons, ISBN 0-471-08132-9. Written by one of the IBM team who developed DESDES-Computing:* Data Encryption Standard* DirectShow Editing Services, an Application Programming Interface-Medical:* Diethylstilbestrol, a synthetic estrogen and the origin of the phrase "DES daughter"* DES gene, which encodes the Desmin protein...
. - Jonathan Katz and Yehuda Lindell's Introduction to Modern Cryptography, CRC Press. Presents modern cryptography at a level appropriate for undergraduates, graduate students, or practitioners. Assumes mathematical maturity but presents all the necessary mathematical and computer science background.
- Mao, Wenbo (2004).Modern Cryptography Theory and Practice ISBN 0-13-066943-1. An up-to-date book on cryptography. Touches on provable security, and written with students and practitioners in mind.
- Douglas Stinson – Cryptography: Theory and Practice ISBN 1-58488-508-4. Covers topics in a textbook style but with more mathematical detail than is usual.
- Nigel SmartNigel Smart (Cryptographer)Nigel Smart is a professor in the Department of Computer Science at the University of Bristol and a current holder of the Royal Society-Wolfson Research Merit Award.He is best known for his work in Elliptic curve cryptography, especially work on the ECDLP...
– Cryptography: An introduction ISBN 0-07-709987-7 (online version). Similar in intent to Applied Cryptography but less comprehensive. Covers more modern material and is aimed at undergraduates covering topics such as number theoryNumber theoryNumber theory is a branch of pure mathematics devoted primarily to the study of the integers. Number theorists study prime numbers as well...
and group theoryGroup theoryIn mathematics and abstract algebra, group theory studies the algebraic structures known as groups.The concept of a group is central to abstract algebra: other well-known algebraic structures, such as rings, fields, and vector spaces can all be seen as groups endowed with additional operations and...
not generally covered in cryptography books. - Lawrence C. Washington – Elliptic Curves: Number Theory and Cryptography ISBN 1-58488-365-0. A book focusing on elliptic curves, beginning at an undergraduate level (at least for those who have had a course on abstract algebraAbstract algebraAbstract algebra is the subject area of mathematics that studies algebraic structures, such as groups, rings, fields, modules, vector spaces, and algebras...
), and progressing into much more advanced topics, even at the end touching on Andrew WilesAndrew WilesSir Andrew John Wiles KBE FRS is a British mathematician and a Royal Society Research Professor at Oxford University, specializing in number theory...
' proof of the Taniyama-Shimura conjecture which led to the proof of Fermat's last theoremFermat's Last TheoremIn number theory, Fermat's Last Theorem states that no three positive integers a, b, and c can satisfy the equation an + bn = cn for any integer value of n greater than two....
. - Christof Paar and Jan Pelzl – Understanding Cryptography: A Textbook for Students and Practitioners, Springer, 2009, ISBN 978-3-642-04100-6 (companion website includes 2 semesters of video lectures, slides and sample book chapters). Very accessible introduction to applied cryptography which covers most schemes of practical relevance. The focus is on being a textbook, i.e., it has pedagogical approach, many problems and further reading sections. The main target audience are readers without a background in pure mathematics.
- A. J. MenezesAlfred MenezesAlfred Menezes is co-author of several books on cryptography, most notably the Handbook of Applied Cryptography.Menezes is a professor in the Department of Combinatorics & Optimization at the University of Waterloo. He is also the Managing Director of the Centre for Applied Cryptographic...
, P. C. van OorschotPaul van OorschotPaul C. van Oorschot is a cryptographer and computer security researcher, currently a professor of computer science at Carleton University, where he holds the Canada Research Chair in network and software security. He is best known as co-author of the Handbook of Applied Cryptography , together...
, and S. A. VanstoneScott VanstoneScott A. Vanstone is a cryptographer who co-authored the Handbook of Applied Cryptography. He is currently on faculty at the University of Waterloo's Faculty of Mathematics and a member of the school's Centre for Applied Cryptographic Research. He is also the founder of Certicom. In 1998, he was...
– Handbook of Applied Cryptography ISBN 0-8493-8523-7 (online version). Equivalent to Applied Cryptography in many ways, but somewhat more mathematical. For the technically inclined. Covers few meta-cryptographic topics, such as crypto system design. This is currently (2004) regarded as the standard reference work in technical cryptography. - Ferguson, NielsNiels FergusonNiels T. Ferguson is a Dutch cryptographer and consultant who currently works for Microsoft. He has worked with others, including Bruce Schneier, designing cryptographic algorithms, testing algorithms and protocols, and writing papers and books...
, and Schneier, BruceBruce SchneierBruce Schneier is an American cryptographer, computer security specialist, and writer. He is the author of several books on general security topics, computer security and cryptography, and is the founder and chief technology officer of BT Managed Security Solutions, formerly Counterpane Internet...
– Practical Cryptography, Wiley, 2003, ISBN 0-471-22357-3. A cryptosystem design consideration primer. Covers both algorithms and protocols. This is an in depth consideration of one cryptographic problem, including paths not taken and some reasons why. At the time of its publication, most of the material was not otherwise available in a single source. Some was not otherwise available at all. According to the authors, it is (in some sense) a follow-up to Applied Cryptography. - Schneier, BruceBruce SchneierBruce Schneier is an American cryptographer, computer security specialist, and writer. He is the author of several books on general security topics, computer security and cryptography, and is the founder and chief technology officer of BT Managed Security Solutions, formerly Counterpane Internet...
– Applied Cryptography, 2 ed, Wiley, 1996, (ISBN 0-471-11709-9). The most accessible single volume available covering modern cryptographic practice, and approachable by the non mathematically oriented. Extensive bibliography which can serve as an entry into the modern literature. It is a great book for beginners but note that it is getting a bit dated—many important schemes such as AES or the eSTREAM candidates are missing entirely, others like elliptic curves are only very briefly treated. Less immediately mathematical than some others, eg Menezes et al. Handbook of Applied Cryptography. - Mel, H.X., and Baker, Doris -- Cryptography Decrypted, Addison Wesley 2001, ISBN 0-201-61647-5. This technical overview of basic cryptographic components (including extensive diagrams and graphics) explains the evolution of cryptography from the simplest concepts to some modern concepts. It details the basics of symmetric key, and asymmetric key ciphers, MACs, SSL, secure mail and IPsec. No math background is required, though there's some public key mathematics in the appendix.
- Candela, RosarioRosario CandelaRosario Candela was an Italian American architect who achieved renown through his apartment building designs in New York City, primarily during the boom years of the 1920s. He is credited with defining the city's characteristic terraced setbacks and signature penthouses. Over time, Candela's...
, The Military Cipher of Commandant BazeriesÉtienne BazeriesÉtienne Bazeries was a French military cryptanalyst active between 1890 and the First World War. He is best known for developing the "Bazeries Cylinder", an improved version of Thomas Jefferson's cipher cylinder. It was later refined into the US Army M-94 cipher device. Historian David Kahn...
. New York: Cardanus Press, 1938. This book detailed cracking of a famous code from 1898 created by Commandant Bazeries, a brilliant French Army Cryptanalyst.
Cryptographic environment/context or security
- Schneier, BruceBruce SchneierBruce Schneier is an American cryptographer, computer security specialist, and writer. He is the author of several books on general security topics, computer security and cryptography, and is the founder and chief technology officer of BT Managed Security Solutions, formerly Counterpane Internet...
– Secrets and Lies, Wiley, ISBN 0-471-25311-1, a discussion of the context within which cryptography and cryptosystems work. Practical Cryptography also includes some contextual material in the discussion of crypto system design. - Schneier, BruceBruce SchneierBruce Schneier is an American cryptographer, computer security specialist, and writer. He is the author of several books on general security topics, computer security and cryptography, and is the founder and chief technology officer of BT Managed Security Solutions, formerly Counterpane Internet...
– Beyond Fear, Wiley, ISBN 0-387-02620-7 - Ross Anderson – Security Engineering, Wiley, ISBN 0-471-38922-6 (online version), advanced coverage of computer security issues, including cryptography. Covers much more than merely cryptography. Brief on most topics due to the breadth of coverage. Well written, especially compared to the usual standard.
- Edney, Jon and Arbaugh, William A – Real 802.11 Security: Wi-Fi Protected Access and 802.11i, Addison-Wesley, ISBN 0-321-13620-9, covers the use of cryptography in Wi-FiWi-FiWi-Fi or Wifi, is a mechanism for wirelessly connecting electronic devices. A device enabled with Wi-Fi, such as a personal computer, video game console, smartphone, or digital audio player, can connect to the Internet via a wireless network access point. An access point has a range of about 20...
networks. Includes details on Wi-Fi Protected AccessWi-Fi Protected AccessWi-Fi Protected Access and Wi-Fi Protected Access II are two security protocols and security certification programs developed by the Wi-Fi Alliance to secure wireless computer networks...
(which is based on the IEEE 802.11i specification). The book is slightly out of date as it was written before IEEE 802.11i was finalized but much of the content is still useful for those who want to find out how encryption and authentication is done in a Wi-Fi network.
Declassified works
- Callimahos, Lambros D.Lambros D. CallimahosLambros Demetrios Callimahos was a US Army cryptologist. Born in Alexandria of Greek parents, the family emigrated to the United States when he was four...
and Friedman, William F.William F. FriedmanWilliam Frederick Friedman was a US Army cryptographer who ran the research division of the Army's Signals Intelligence Service in the 1930s, and parts of its follow-on services into the 1950s...
Military CryptanalyticsMilitary CryptanalyticsMilitary Cryptanalytics is a revision by Lambros D. Callimahos of the series of books written by William F. Friedman under the title Military Cryptanalysis. It also contains contributions by other cryptanalysts. It was a training manual for National Security Agency and military cryptanalysts...
. A (partly) declassified text intended as a training manual for NSANational Security AgencyThe National Security Agency/Central Security Service is a cryptologic intelligence agency of the United States Department of Defense responsible for the collection and analysis of foreign communications and foreign signals intelligence, as well as protecting U.S...
cryptanalysts.
History of cryptography
- Richard J. Aldrich, GCHQ: The Uncensored Story of Britain's Most Secret Intelligence Agency, HarperCollins, July 2010.
- Bamford, JamesJames BamfordV. James Bamford is an American bestselling author and journalist who writes about United States intelligence agencies, most notably the National Security Agency.-Biography:...
, The Puzzle PalaceThe Puzzle PalaceThe Puzzle Palace is a book written by James Bamford, in which he discusses the National Security Agency, a United States Intelligence organization.The term "Puzzle Palace" refers to the NSA at Fort Meade, Maryland....
: A Report on America's Most Secret Agency (ISBN 0-14-006748-5), and the more recent Body of Secrets: Anatomy of the Ultra-Secret National Security AgencyBody of SecretsBody of Secrets: Anatomy of the Ultra-Secret National Security Agency is a book by James Bamford about the NSA and its operations. It also covers the history of espionage in the United States from uses of the Fulton surface-to-air recovery system to retrieve personnel on Arctic Ocean drift...
. The first is one of a very few books about the US Government's NSA. The second is also about NSA but concentrates more on its history. There is some very interesting material in Body of Secrets about US attempts (the TICOMTICOMTICOM was a project formed in World War II by the United States to find and seize German intelligence assets, particularly cryptographic ones. The project was stimulated chiefly by the US military cryptography organizations, and had support from the highest levels.Several teams were sent into the...
mission) to investigate German cryptographic efforts immediately as WW II wound down. - Gustave BertrandGustave BertrandGustave Bertrand was a French military intelligence officer who made a vital contribution to the decryption, by Poland's Cipher Bureau, of German Enigma ciphers, beginning in December 1932...
, Enigma ou la plus grande énigme de la guerre 1939–1945 (Enigma: the Greatest Enigma of the War of 1939–1945), Paris, 1973. The first public disclosure in the West of the breaking of Enigma, by the chief of French military cryptography prior to WW II. The first public disclosure anywhere was made in the first edition of Bitwa o tajemnice by the late Władysław Kozaczuk. - James GannonJames GannonJames Gannon is a freelance writer and producer of documentaries for NBC News. He has published articles in a variety of subjects and venues....
, Stealing Secrets, Telling Lies: How Spies and Codebreakers Helped Shape the Twentieth Century, Washington, D.C., Brassey's, 2001: an overview of major 20th-century episodes in cryptology and espionageEspionageEspionage or spying involves an individual obtaining information that is considered secret or confidential without the permission of the holder of the information. Espionage is inherently clandestine, lest the legitimate holder of the information change plans or take other countermeasures once it...
, particularly strong regarding the misappropriation of credit for conspicuous achievements. - Kahn, David – The CodebreakersThe CodebreakersThe Codebreakers – The Story of Secret Writing is a book by David Kahn, published in 1967 comprehensively chronicling the history of cryptography from ancient Egypt to the time of its writing...
(ISBN 0-684-83130-9) A single-volume source for cryptographic history, at least for events up to the mid-'60s (ie, to just before DES and the public release of asymmetric key cryptography). The added chapter on more recent developments (in the most recent edition) is quite thin. Kahn has written other books and articles on cryptography, and on cryptographic history. They are very highly regarded. - Kozaczuk, Władysław, Enigma: How the German Machine Cipher Was Broken, and How It Was Read by the Allies in World War II, edited and translated by Christopher KasparekChristopher KasparekChristopher Kasparek is a Scottish-born writer of Polish descent who has translated works by Ignacy Krasicki, Bolesław Prus, Florian Znaniecki, Władysław Tatarkiewicz, Marian Rejewski and Władysław Kozaczuk, as well as the Polish-Lithuanian Constitution of May 3, 1791.He has published papers on...
, Frederick, MD, 1984: a history of cryptological efforts against Enigma, concentrating on the contributions of Polish mathematicians Marian RejewskiMarian RejewskiMarian Adam Rejewski was a Polish mathematician and cryptologist who in 1932 solved the plugboard-equipped Enigma machine, the main cipher device used by Germany...
, Jerzy RóżyckiJerzy RózyckiJerzy Witold Różycki was a Polish mathematician and cryptologist who worked at breaking German Enigma-machine ciphers.-Life:Różycki was born in what is now Ukraine, the fourth and youngest child of Zygmunt Różycki, a pharmacist and graduate of Saint Petersburg University, and Wanda, née Benita. ...
and Henryk ZygalskiHenryk ZygalskiHenryk Zygalski was a Polish mathematician and cryptologist who worked at breaking German Enigma ciphers before and during World War II.-Life:...
; of particular interest to specialists will be several technical appendices by Rejewski. - Levy, Steven – Crypto: How the Code Rebels Beat the Government—Saving Privacy in the Digital Age (ISBN 0-14-024432-8): a journalistic overview of the development of public cryptographic techniques and the US regulatory context for cryptography. This is an account of a major policy conflict.
- Singh, SimonSimon SinghSimon Lehna Singh, MBE is a British author who has specialised in writing about mathematical and scientific topics in an accessible manner....
, The Code BookThe Code BookThis is about a book called The Code Book, for other uses see Codebook The Code Book: The Evolution of Secrecy from Mary, Queen of Scots to Quantum Cryptography is a book written by Simon Singh and published in 1999 by Doubleday of New York; ISBN 0-385-49531-5.The Code Book covers a diverse set of...
(ISBN 1-85702-889-9): an anecdotal introduction to the history of cryptography. Covers more recent material than does even the revised edition of Kahn's The Codebreakers. Clearly written and quite readable. The included cryptanalytic contest has been won and the prize awarded, but the cyphertexts are still worth attempting. - Bauer, F L, Decrypted Secrets, This book is unusual. It is both a history of cryptography, and a discussion of mathematical topics related to cryptography. In his review, David Kahn said he thought it the best book he'd read on the subject. It is essentially two books, in more or less alternating chapters. Originally in German, and the translation shows it in places. Some surprising content, eg, in the discussion of President Edgar Hoover's Secretary of State, Henry Stimson.
- Budiansky, StephenStephen BudianskyStephen Budiansky is an American author who writes primarily about history and science. He is a former national security correspondent, foreign editor, and deputy editor of U.S. News & World Report and former Washington editor of the scientific journal Nature. He was also for many years a...
, Battle of Wits: a one-volume history of cryptography in WW II. It is well written, well researched, and responsible. Technical material (eg, a description of the cryptanalysis of Enigma) is limited, but clearly presented. - Prados, John – Combined Fleet Decoded, An account of cryptography in the Pacific Theatre of World War II with special emphasis on the Japanese side. Reflects extensive research in Japanese sources and recently available US material. Contains material not previously accessible or unvailable.
- Marks, LeoLeo MarksLeopold Samuel Marks was an English cryptographer, screenwriter and playwright.-Early life:Born the son of an antiquarian bookseller in London, he was first introduced to cryptography when his father showed him a copy of Edgar Allan Poe's story, "The Gold-Bug"...
, Between Silk and Cyanide: a Codemaker's Story, 1941–1945, (HarperCollins, 1998). (ISBN 0-684-86780-X). A humorous but informative account of code-making and -breaking in Britain's WWIIWorld War IIWorld War II, or the Second World War , was a global conflict lasting from 1939 to 1945, involving most of the world's nations—including all of the great powers—eventually forming two opposing military alliances: the Allies and the Axis...
Special Operations ExecutiveSpecial Operations ExecutiveThe Special Operations Executive was a World War II organisation of the United Kingdom. It was officially formed by Prime Minister Winston Churchill and Minister of Economic Warfare Hugh Dalton on 22 July 1940, to conduct guerrilla warfare against the Axis powers and to instruct and aid local...
. - Yardley, HerbertHerbert YardleyHerbert Osborne Yardley was an American cryptologist best known for his book The American Black Chamber . The title of the book refers to the Cipher Bureau, the cryptographic organization of which Yardley was the founder and head...
, The American Black Chamber (ISBN 0-345-29867-5), a classic 1931 account of American code-breaking during and after World War IWorld War IWorld War I , which was predominantly called the World War or the Great War from its occurrence until 1939, and the First World War or World War I thereafter, was a major war centred in Europe that began on 28 July 1914 and lasted until 11 November 1918...
; and Chinese Black Chamber: An Adventure in Espionage (ISBN 0-395-34648-7), about Yardley's work with the Chinese government in the years just before World War IIWorld War IIWorld War II, or the Second World War , was a global conflict lasting from 1939 to 1945, involving most of the world's nations—including all of the great powers—eventually forming two opposing military alliances: the Allies and the Axis...
. Yardley has an enduring reputation for embellishment, and some of the material in these books is less than reliable. The American Black Chamber was written after the New York operation Yardley ran was shut down by Secretary of State Henry L. StimsonHenry L. StimsonHenry Lewis Stimson was an American statesman, lawyer and Republican Party politician and spokesman on foreign policy. He twice served as Secretary of War 1911–1913 under Republican William Howard Taft and 1940–1945, under Democrat Franklin D. Roosevelt. In the latter role he was a leading hawk...
and the US Army, on the grounds that "gentlemen don't read each other's mail".
Historic works
- Abu Yusuf Yaqub ibn Ishaq al-Sabbah Al-Kindi, (A Manuscript on Deciphering Cryptographic Messages), 9th century included first known explanation of frequency analysisFrequency analysisIn cryptanalysis, frequency analysis is the study of the frequency of letters or groups of letters in a ciphertext. The method is used as an aid to breaking classical ciphers....
cryptanalysisCryptanalysisCryptanalysis is the study of methods for obtaining the meaning of encrypted information, without access to the secret information that is normally required to do so. Typically, this involves knowing how the system works and finding a secret key... - Michel de Nostredame, (16th century prophet famed since 1555 for prognostications), known widely for his "Les Propheties" sets of quatrains composed from four languages into a ciphertext, deciphered in a series called "Rise to Consciousness" (Deschausses, M., Outskirts Press, Denver, CO, Nov 2008).
- Roger BaconRoger BaconRoger Bacon, O.F.M. , also known as Doctor Mirabilis , was an English philosopher and Franciscan friar who placed considerable emphasis on the study of nature through empirical methods...
(English friar and polymath), Epistle on the secret Works of Art and Nobility of Magic, 13th century, possibly the first European work on cryptography since Classical times, written in Latin and not widely available then or now - Johannes TrithemiusJohannes TrithemiusJohannes Trithemius , born Johann Heidenberg, was a German abbot, lexicographer, historian, cryptographer, polymath and occultist who had an influence on later occultism. The name by which he is more commonly known is derived from his native town of Trittenheim on the Mosel in Germany.-Life:He...
, Steganographia ("Hidden Writing"), written ca. 1499; pub 1606, banned by the Catholic Church 1609 as alleged discussion of magicMagic and religionMagical thinking in various forms is a cultural universal and an important aspect of religion.In many cases it becomes difficult or impossible to draw any meaningful line between beliefs and practices that are magical versus those that are religious, but in general the term religion is reserved for...
, see Polygraphiae (below). - Johannes TrithemiusJohannes TrithemiusJohannes Trithemius , born Johann Heidenberg, was a German abbot, lexicographer, historian, cryptographer, polymath and occultist who had an influence on later occultism. The name by which he is more commonly known is derived from his native town of Trittenheim on the Mosel in Germany.-Life:He...
, Polygraphiae Libri Sex ("Six Books on Polygraphy"), 1518, first printed book on cryptography (thought to really be about magic by some observers at the time) - Giovan Battista BellasoGiovan Battista Bellaso-Biography:Bellaso was born of a distinguished family in 1505. His father was Piervincenzo, a patrician of Brescia, owner since the 15th century of a house in town and a suburban estate in Capriano, in a neighborhood called Fenili Belasi , including the Holy Trinity chapel. The chaplain was...
, La cifra del. Sig. Giovan Battista Bellaso, 1553, first pub of the cypher widely misattributed to Vigenère. - Giambattista della PortaGiambattista della PortaGiambattista della Porta , also known as Giovanni Battista Della Porta and John Baptist Porta, was an Italian scholar, polymath and playwright who lived in Naples at the time of the Scientific Revolution and Reformation....
, De Furtivis Literarum Notis ("On concealed characters in writing"), 1563. - Blaise de VigenèreBlaise de VigenèreBlaise de Vigenère was a French diplomat and cryptographer. The Vigenère cipher is so named due to the cipher being incorrectly attributed to him in the 19th century....
, Traicte de Chiffres, 1585. - Gustavus SelenusAugustus the Younger, Duke of Brunswick-LüneburgAugustus of Brunswick-Lüneburg , called the Younger, was duke of Brunswick-Lüneburg. In the estate division of the House of Welf of 1635, he received the Principality of Wolfenbüttel....
, Cryptomenytics, 1624, (modern era English trans by J W H Walden) - John WilkinsJohn WilkinsJohn Wilkins FRS was an English clergyman, natural philosopher and author, as well as a founder of the Invisible College and one of the founders of the Royal Society, and Bishop of Chester from 1668 until his death....
, Mercury, 1647, earliest printed book in English about cryptography - Friedrich KasiskiFriedrich KasiskiMajor Friedrich Wilhelm Kasiski was a Prussian infantry officer, cryptographer and archeologist. Kasiski was born in Schlochau, West Prussia .-Military service:...
, Die Geheimschriften und die Dechiffrierkunst ("Secret writing and the Art of Deciphering"), pub 1863, contained the first public description of a technique for cryptanalyzing polyalphabetic cyphers. - Etienne BazeriesÉtienne BazeriesÉtienne Bazeries was a French military cryptanalyst active between 1890 and the First World War. He is best known for developing the "Bazeries Cylinder", an improved version of Thomas Jefferson's cipher cylinder. It was later refined into the US Army M-94 cipher device. Historian David Kahn...
, Les Chiffres secrets dévoilés ("Secret ciphers unveiled") about 1900. - Émile Victor Théodore Myszkowski, Cryptographie indéchiffrable: basée sur de nouvelles combinaisons rationelles ("Unbreakable cryptography"), published 1902.
Overview of cryptography
- Piper, Fred and Sean Murphy, Cryptography : A Very Short Introduction ISBN 0-19-280315-8 This book outlines the major goals, uses, methods, and developments in cryptography.
Fiction
- Neal StephensonNeal StephensonNeal Town Stephenson is an American writer known for his works of speculative fiction.Difficult to categorize, his novels have been variously referred to as science fiction, historical fiction, cyberpunk, and postcyberpunk...
– CryptonomiconCryptonomiconCryptonomicon is a 1999 novel by American author Neal Stephenson. The novel follows the exploits of two groups of people in two different time periods, presented in alternating chapters...
(ISBN 0-06-051280-6) The adventures of some World War IIWorld War IIWorld War II, or the Second World War , was a global conflict lasting from 1939 to 1945, involving most of the world's nations—including all of the great powers—eventually forming two opposing military alliances: the Allies and the Axis...
codebreakerCodebreakerCodebreaker may refer to:*A person who performs cryptanalysis*The Codebreakers, a 1967 book on history of cryptography by David Kahn*Codebreaker , a 1981 puzzle-based computer game, originally released for the Atari 2600...
s and their modern day progeny. - Edgar Allan PoeEdgar Allan PoeEdgar Allan Poe was an American author, poet, editor and literary critic, considered part of the American Romantic Movement. Best known for his tales of mystery and the macabre, Poe was one of the earliest American practitioners of the short story and is considered the inventor of the detective...
– "The Gold-BugThe Gold-Bug"The Gold-Bug" is a short story by Edgar Allan Poe. Set on Sullivan's Island, South Carolina, the plot follows William Legrand, who was recently bitten by a gold-colored bug. His servant Jupiter fears him to be going insane and goes to Legrand's friend, an unnamed narrator who agrees to visit his...
" (1843) An eccentric man discovers an ancient parchment which contains a cryptogram which, when solved, leads to the discovery of buried treasure. Includes a lengthy discourse on a method of solving a simple cypherSubstitution cipherIn cryptography, a substitution cipher is a method of encryption by which units of plaintext are replaced with ciphertext according to a regular system; the "units" may be single letters , pairs of letters, triplets of letters, mixtures of the above, and so forth...
. - Sir Arthur Conan Doyle – The Dancing Men. Holmes becomes involved in a case which features messages left lying around. They are written in a substitution cypher, which Holmes promptly discerns. Solving the cypher leads to solving the case.
- Ken FollettKen FollettKen Follett is a Welsh author of thrillers and historical novels. He has sold more than 100 million copies of his works. Four of his books have reached the number 1 ranking on the New York Times best-seller list: The Key to Rebecca, Lie Down with Lions, Triple, and World Without End.-Early...
– The Key to Rebecca (1980), World War II spy novel whose plot revolves around the heroes' efforts to cryptanalyze a book cipherBook cipherA book cipher is a cipher in which the key is some aspect of a book or other piece of text; books being common and widely available in modern times, users of book ciphers take the position that the details of the key is sufficiently well hidden from attackers in practice. This is in some ways an...
with time running out. - Clifford B. HicksClifford B. HicksClifford B. Hicks was an American writer and magazine editor, best known for his children's books chronicling the adventures of Alvin Fernald.-Biography:...
– Alvin's Secret Code (1963), a children's novel which introduces some basics of cryptography and cryptanalysis. - Robert HarrisRobert Harris (novelist)Robert Dennis Harris is an English novelist. He is a former journalist and BBC television reporter.-Early life:Born in Nottingham, Harris spent his childhood in a small rented house on a Nottingham council estate. His ambition to become a writer arose at an early age, from visits to the local...
– EnigmaEnigma (novel)Enigma is a novel by Robert Harris about Tom Jericho, a young mathematician trying to break the Germans' "Enigma" ciphers during World War II. It was adapted to film in 2001...
(1995) (ISBN 0-09-999200-0) Novel partly set in Britain's World War IIWorld War IIWorld War II, or the Second World War , was a global conflict lasting from 1939 to 1945, involving most of the world's nations—including all of the great powers—eventually forming two opposing military alliances: the Allies and the Axis...
codebreaking centre at Bletchley ParkBletchley ParkBletchley Park is an estate located in the town of Bletchley, in Buckinghamshire, England, which currently houses the National Museum of Computing...
. - Ari Juels – Tetraktys (2009) (ISBN 0-9822837-0-9) Pits a classicist turned cryptographer against an ancient Pythagorean cult. Written by RSA Labs chief scientist.
External links
- Listing and reviews for a large number of books in cryptography
- List of where cryptography features in literature — list is presented in GermanGerman languageGerman is a West Germanic language, related to and classified alongside English and Dutch. With an estimated 90 – 98 million native speakers, German is one of the world's major languages and is the most widely-spoken first language in the European Union....
. - GCHQ: Britain's Most Secret Intelligence Agency