Secret History: The Story of Cryptology

Front Cover
CRC Press, Apr 19, 2016 - Computers - 620 pages
0 Reviews

Winner of an Outstanding Academic Title Award from CHOICE Magazine

Most available cryptology books primarily focus on either mathematics or history. Breaking this mold, Secret History: The Story of Cryptology gives a thorough yet accessible treatment of both the mathematics and history of cryptology. Requiring minimal mathematical prerequisites, the book presents the mathematics in sufficient detail and weaves the history throughout the chapters. In addition to the fascinating historical and political sides of cryptology, the author—a former Scholar-in-Residence at the U.S. National Security Agency (NSA) Center for Cryptologic History—includes interesting instances of codes and ciphers in crime, literature, music, and art.

Following a mainly chronological development of concepts, the book focuses on classical cryptology in the first part. It covers Greek and Viking cryptography, the Vigenère cipher, the one-time pad, transposition ciphers, Jefferson’s cipher wheel, the Playfair cipher, ADFGX, matrix encryption, World War II cipher systems (including a detailed examination of Enigma), and many other classical methods introduced before World War II.

The second part of the book examines modern cryptology. The author looks at the work of Claude Shannon and the origin and current status of the NSA, including some of its Suite B algorithms such as elliptic curve cryptography and the Advanced Encryption Standard. He also details the controversy that surrounded the Data Encryption Standard and the early years of public key cryptography. The book not only provides the how-to of the Diffie-Hellman key exchange and RSA algorithm, but also covers many attacks on the latter. Additionally, it discusses Elgamal, digital signatures, PGP, and stream ciphers and explores future directions such as quantum cryptography and DNA computing.

With numerous real-world examples and extensive references, this book skillfully balances the historical aspects of cryptology with its mathematical details. It provides readers with a sound foundation in this dynamic field.

Please visit Dr. Bauer's website, which provides access to exercise sets: http://depts.ycp.edu/~cbauer/

 

What people are saying - Write a review

We haven't found any reviews in the usual places.

Contents

Chapter 1 Ancient Roots
3
Disguises for Messages
11
Chapter 3 Simple Progression to an Unbreakable Cipher
69
Chapter 4 Transposition Ciphers
119
Chapter 5 Shakespeare Jefferson and JFK
145
Chapter 6 World War I and Herbert O Yardley
185
Chapter 7 Matrix Encryption
227
The Enigma of Germany
245
Chapter 12 Data Encryption Standard
369
Chapter 13 Birth of Public Key Cryptography
403
Chapter 14 Attacking RSA
427
Chapter 15 Primality Testing and Complexity Theory
459
Chapter 16 Authenticity
489
Chapter 17 Pretty Good Privacy
503
Chapter 18 Stream Ciphers
519
Chapter 19 Suite B AllStars
533

Chapter 9 Cryptologic War against Japan
293
Chapter 10 Claude Shannon
329
Chapter 11 National Security Agency
341
Chapter 20 Possible Futures
559
Back Cover
575
Copyright

Other editions - View all

Common terms and phrases

About the author (2016)

Craig P. Bauer is an associate professor of mathematics at York College of Pennsylvania and the editor-in-chief of Cryptologia. He was the 2011-2012 Scholar-in-Residence at the National Security Agency (NSA) Center for Cryptologic History, where he wrote several papers for NSA journals, gave a large number of lectures, and made substantial progress on a second book focused on unsolved codes and ciphers. He earned a Ph.D. in mathematics from North Carolina State University.

Bibliographic information