Whether you
want to create a cipher for yourself to hide a trade secret or
romantic appointment, you are trying to read an encrypted message
that “fell” into your hands, or you just want to study the
history of cryptography you are going to need some good books.
Two of the earliest
books dealing with cryptography are The Art of War1
by Sun Tzu and the Kama Sutra2
by Vatsyayana. The Art of War dates to the 6th
century BC. No exact date is known for the Kama Sutra, but it is
believed to be from around the 2nd
century AD.
In The Art of War,
Sun Tzu says “The art
of war teaches us to rely not on the likelihood of the enemy's not
coming, but on our own readiness to receive him; not on the chance of
his not attacking, but rather on the fact that we have made our
position unassailable”.
To that end, he adds: “So
if you do not know the plans of your competitors, you cannot make
informed alliances”.
In other words, hide your plans and discover theirs. Encryption and
cryptanalysis.
The Kama Sutra lists
64 arts that a woman should study. #45 is “The
art of understanding writing in cipher, and the writing of words in a
peculiar way“.
Both books are
widely available in various forms from
any number
of outlets.
Galileo is said to
have hidden important information in anagrams to protect his
discoveries; specifically that Venus had moon-like phases 3.
The writings of Nostradamus4 fall into the category of steganography because he hid his prophecies in cryptic writings called quatrains.
The writings of Nostradamus4 fall into the category of steganography because he hid his prophecies in cryptic writings called quatrains.
With all the comments and questions I regularly receive about secret codes and the attention paid to the subject in the news lately (see my posting from earlier this month), I decided that it was time
to present a list of worthwhile books on cryptography. While this list is by no
means comprehensive, it will provide a lot of important
information needed to understand the pitfalls in the use of ciphers
and codes, a history of secret writing of all kinds and a rudimentary
education in cryptanalysis. Most of these are in my personal library
and I highly recommend them. Your local public library or Amazon.com
should be able to supply all of the titles.
Also, for some
entertaining but fictional accounts of cryptography, The
Gold Bug by Edgar Allan
Poe and Sherlock Holmes story of The
Dancing Men are
practically required reading.
The
Code-Breakers
Author:
David Kahn
Publisher:
Scribner
Language:
English
ISBN-10:
0-684-83130-9
ISBN-13:
978-0140244328
Probably
the gold standard of cryptography books from the 20th
century. Almost every other book that I have ever read on the subject
cites and/or quotes The
Code Breakers.
It's kind of pricey (about $50.00 USD) but well worth the cost. I
figured that if all my other books were quoting it, I should probably
own it.
Code
Breaking
Author:
Rudolf
Kippenhahn
Publisher:
The Overlook Press
Language:
English-translated from German by Ewald Osers
ISBN:
1-58567-089-8
Focuses
primarily on cryptanalysis, with one of the best descriptions of
frequency analysis I've read, using bi-graphs and tri-graphs as well
as letter frequencies in different languages. Also has an excellent
discussion of the inner workings of the Enigma.
Code
Breakers: The Inside Story of Bletchley Park
Authors:
F. H.
Hinsley & Alan Stripp
Publisher:
Oxford University Press
Language:
English
ISBN:
0-19-280132-5
First-hand
accounts from many of the people who worked in Bletchly Park during
WWII. It's what I'm reading right now- for the 3rd
time. Gives a personal insight to the victories and frustrations
encountered during 7 years of cryptanalysis in war-time.
Philip
Johnston and the Navajo Code Talkers
Author: Syble Lagerquist
Publisher: Council for Indian Education
Language: English
ISBN-10: 0899921396
ISBN-13: 978-0899921396
I reviewed this excellent work back in November of 2007. These guys were real heroes. Nicholas Cage starred in a movie about them called Windtalkers. Highly fictionalised but worth seeing. Also visit:
http://en.wikipedia.org/wiki/Philip_Johnston_%28code_talker%29 and
http://history1900s.about.com/od/worldwarii/a/navajacode.htm
Author: Syble Lagerquist
Publisher: Council for Indian Education
Language: English
ISBN-10: 0899921396
ISBN-13: 978-0899921396
I reviewed this excellent work back in November of 2007. These guys were real heroes. Nicholas Cage starred in a movie about them called Windtalkers. Highly fictionalised but worth seeing. Also visit:
http://en.wikipedia.org/wiki/Philip_Johnston_%28code_talker%29 and
http://history1900s.about.com/od/worldwarii/a/navajacode.htm
Crypto:
How the Code Rebels Beat the Government Saving Privacy in the Digital
Age
Author:
Steven Levy
Publisher:
Penguin (Non-Classics); 1st edition (January 15, 2002)
Language:
English
ISBN-10: 0140244328
ISBN-13:
978-0140244328
This is an in-depth
history of public-key cryptography and the development of PGP.
Introduces you to Ron Rivist, Adi Shamir and Leonard Adleman: the
inventors of RSA encryption algorithm; Whitfield Diffie and Martin
Hellman who developed the Diffie-Hellman key exchange and Phil
Zimmerman: the author of PGP (Pretty Good Privacy). Good reading.
The
Code Book
Author:
Simon Singh
Publisher:
Fourth Estate Limited
Language:
English
ISBN:
0-00763-574-5
Sub-titled
The
Secret History of Codes and Code-breaking, this
is the history lesson I mentioned. Along with Kahn's The
Code-Breakers, it
is the most complete history of cryptography that I have found. It
also covers related topics like Egyptian hieroglyphics and Linear B.
I've almost worn out my copy re-reading it.
Free-ware
Encryption
Author:
Michael
Chesbro
Publisher:
Paladin Press
Language:
English
ISBN:
1-58160-270-7
A
great resource for computer encryption. Contains a brief discussion
of the legal implications of encryption and a plethora of websites to
download various encryption programs. My favorite is VGP if I'm
working in Windoze.
Written
in 2001, some of the sites may be out of date, but the general
information is timeless.
The
Man Who Saw Tomorrow – The Prophecies of Nostradamus
Author:
Michel
Nostradamus (born Michel de Nostredame)
Translated by: Erika
Cheetham
Publisher:
Berkley Books
Language:
English
ISBN:
0-0425-08757-3
Not
actually a book that has much to do with cryptography, but
probably the best example in history of hiding meanings within other
writings (steganography).
Other Recommended books
Codes and Secret Writing
Author:
Herbert
Spencer Zim
Publisher:
Scholastic (January 1978)
ISBN-10:
0590025856
ISBN-13:
978-0590025850
Although I no
longer own this book, it was the beginning of my infatuation with
cryptography. Phil Zimmerman, Whitfield Diffie and a lot of other
pioneers in modern cryptography first read this book and peaked their
interest. While it is primarily a children's' book, it's still a valuable
resource.
Handbook of Applied Cryptography
Authors: Alfred J. Menezes, Paul C. van Oorschot & Scott A. Vanstone
Publisher:
CRC
Press
ISBN: 0-8493-8523-7
ISBN: 0-8493-8523-7
I
have never read this, but understand that it is the definitive source
for computer cryptography. It is available in print from any one of
these on-line book-stores:
Prices as of April 15, 2010
- Amazon Books (amazon.com) US $75.22.
- Amazon.ca (for Canadian orders) Cdn $65.02.
- Google EBooks US $80.96. It is also available for free download at: http://www.cacr.math.uwaterloo.ca/hac/
I
understand that: The Puzzle
Palace: Inside the National Security Agency, America's Most Secret
Intelligence Organization
by
James Bamford will give you a fair concept of the guys in America's
black chamber; the ones that are trying to undo everything that you
do to protect your information. It is next on my “Have To Get It”
list. High on my “Ongoing Conspiracy” list, too.
WORTHWHILE
FICTION
TITLES
The Cambridge Quintet
by John L. Casti
Cryptonomicon
by Neal Stephenson
The Da Vinci Code and Digital Fortress
both by Dan Brown
The Eleventh Hour
by Graeme Base (children's book)
Simple Simon
by Ryne Douglas Pearson (see films)
PopCo
by Scarlett Thomas
Secrets of the Alchemist Dar
by Michael Stadther
SOME GOOD MOVIES
Good story and very fact-based. You get to see an original Enigma machine in use. It was loaned to the production company by none other than Mick Jagger, who also helped finance the production and even makes a cameo appearance. The convoy battle and convoy numbers (HX 229/SC 1225), several names(Fasson and Grazier6) and many other parts are right out of the history books. There has been criticism regarding some license taken, but; hey! Yes it's based on true events but it's FICTION people.
Sneakers
One of my all-time favorites. Starring a young Robert Redford and a whole contingent of A-list actors.
Mercury Rising (based on Pearsons' Simple Simon)
Stars Bruce Willis
The Net
Starring Sandra Bullock. If you watch this movie, and substitute Microsoft for Gregg Microsystems, you'll have an accurate concept of my view regarding Microcrap Corp., Windoze operating System and Bill Let's-Take-Over-The-World Gates.
Citations
1 http://classics.mit.edu/Tzu/artwar.html , http://www.chinapage.com/sunzi-e.html , http://suntzusaid.com/
2
http://www.simonsingh.net/The_Black_Chamber/kamasutra.html
, http://www.civilwarsignals.org/cipher/kamasutra.html
,
http://www.bibliomania.com/2/1/76/123/frameset.html
Additional Information
While
doing some research for another posting, I came across this website.
Free
Encryption / Cryptographic Software, Free On the Fly Encryption, Free
Disk Encryption Tools, Steganography, Free Public Key Encryption
Software
Here
you will find more resources for computer encryption as well as some good
advice like "Be
careful when you use cryptographic / encryption software that do not
tell you which algorithm they use. Claims like "strong
encryption", "military encryption" and "secure
encryption" do not tell you very much — after all, anyone can
simply convert the letters on (say) this page to numbers (where a=1,
b=2, etc) and still claim it is strong encryption / cryptography."
With
the exception of GPG and PGP, I have not used and cannot personally
endorse any of the software or information this site offers, so use with care.
GPG
(GNU Privacy Guard) works well with Linux; my os of choice. I also
use KGPG; the graphic front end for GPG. I use both frequently and
highly recommend them.
No comments:
Post a Comment