Books on cryptography

Books on cryptography

Books on cryptography have been published sporadically and with highly variable quality for a long time. This is despite the tempting, though superficial, paradox that secrecy is of the essence in sending confidential messages — see Kerckhoffs' principle.

In contrast, the revolution in cryptography and secure communications of the last 25 years is well covered in the available literature.

Early history

An early example of a book about cryptography was a Roman work, now lost and known only by references. Many early cryptographic works were esoteric, mystical, and/or reputation-promoting; cryptography being mysterious, there was much opportunity for such things. At least one work by Trithemius was banned by the Catholic Church and put on the Index Librorum Prohibitorum as being about black magic or witchcraft. Many writers claimed to have invented unbreakable ciphers. None were, though it sometimes took a long while to establish this.

In the 19th century, the general standard improved somewhat (eg, works by Auguste Kerckhoffs, Friedrich Kasiski, and Étienne Bazeries). Colonel Parker Hitt and William Friedman in the early 20th century also wrote books on cryptography. These authors, and others, mostly abandoned any mystical or magical tone.

Open literature versus classified literature

With the invention of radio, much of military communications went wireless, allowing the possibility of enemy interception much more readily than tapping into a landline. This increased the need to protect communications. By the end of World War I, cryptography and its literature began to be officially limited. One exception was "The American Black Chamber" by Herbert Yardley, which gave some insight into American cryptologic success stories, including the Zimmermann telegram and the breaking of Japanese codes during the Washington Naval Conference.

"The Codebreakers"

Until the late twentieth century most aspects of modern cryptography were regarded as the special concern of governments and the military, and were protected by custom and, in some cases, by statute. The most significant work to be published on cryptography in this period is undoubtedly David Kahn's "The Codebreakers", which was published at a time (mid-1960s) when virtually no information on the modern practice of cryptography was available. Kahn has said that over ninety percent of its content was previously unpublished. The book caused serious concern at the NSA despite its lack of coverage of specific modern cryptographic practice, so much so that after failing to prevent the book being published, NSA staff were informed to not even acknowledge the existence of the book if asked. In the US military, mere possession of a copy by cryptographic personnel was grounds for some considerable suspicion. Perhaps the single greatest importance of the book was the impact it had on the next generation of cryptographers. Whitfield Diffie has made comments in interviews about the effect it had on him.

Early 21st-century conditions

Since the flourishing of an academic field of cryptography starting in the mid 1970s, there are many books which have since been published on cryptography. Much information that was top secret a half century ago is now available to the public. Principles and techniques of major parts of contemporary cipher design have also in many cases been published. It is unknown (publicly) if the open literature of modern cryptography has caught up with the knowledge of government agencies.

The list

Significant books on cryptography include:

"Classic" books (that are by now somewhat outdated)

* Gaines, Helen Fouché - "Cryptanalysis", 1939, Dover, ISBN 0-486-20097-3. Considered one of the classic books on the subject, and includes many sample ciphertext for practice. It reflects public amateur practice as of the inter-War period. The book was compiled as one of the first projects of the American Cryptogram Association.
* Dominic Welsh -- "Codes and Cryptography", Oxford University Press, 1988. A brief textbook intended for undergraduates. Some coverage of fundamental information theory. Requires some mathematical maturity; is well written, and otherwise accessible.
* Patterson, Wayne (1987). "Mathematical Cryptology for Computer Scientists and Mathmeticians", Rowman & Littlefield, ISBN 0-8476-7438-X
* Konheim, Alan G. (1981). "Cryptography: A Primer", John Wiley & Sons, ISBN 0-471-08132-9. Written by one of the IBM team who developed DES.

More mathematical

* Oded Goldreich's "Foundations of Cryptography" series [http://www.wisdom.weizmann.ac.il/~oded/foc-book.html] provides a comprehensive formal treatment of the theory underlying modern cryptography. The focus is on mathematical abstractions, rigorous constructions and proof techniques; practical aspects are best sought elsewhere. Requires a computer science background.
** Goldreich, Oded (2001). "Foundations of Cryptography: Volume 1, Basic Tools". Cambridge University Press. ISBN 0-521-79172-3 (fragments available at the [http://www.wisdom.weizmann.ac.il/~oded/frag.html author's web site] ). Discusses the basic constructs: one way functions, pseudorandomness and zero-knowledge proofs.
** Goldreich, Oded (2004). "Foundations of Cryptography: Volume 2, Basic Applications". Cambridge University Press. ISBN 0-521-83084-2 (drafts available at the [http://www.wisdom.weizmann.ac.il/~oded/foc-vol2.html author's web site] ). Using the tools developed in vol. 1, discusses encryption, digital signatures and cryptographic protocols.
* Jonathan Katz and Yehuda Lindell (2007). " [http://www.cs.umd.edu/~jkatz/imc.html Introduction to Modern Cryptography] ". CRC Press. Presents modern cryptography at a level appropriate for undergraduates, graduate students, or practitioners. Assumes mathematical maturity but presents all the necessary mathematical and computer science background.
* Mao, Wenbo (2004)."Modern Cryptography Theory and Practice" ISBN 0-13-066943-1. An up-to-date book on cryptography. Touches on provable security, and written with students and practitioners in mind.
* Douglas Stinson - "Cryptography: Theory and Practice" ISBN 1-58488-508-4. Covers topics in a textbook style but with more mathematical detail then is usual.
* Nigel Smart - "Cryptography: An introduction" ISBN 0-07-709987-7 ( [http://www.cs.bris.ac.uk/~nigel/Crypto_Book/ online version] ). Similar in intent to "Applied Cryptography" but less comprehensive. Covers more modern material and is aimed at undergraduates covering topics such as number theory and group theory not generally covered in cryptography books.
* Lawrence Washington - "Elliptic Curves: Number Theory and Cryptography" ISBN 1-58488-365-0. A book focusing on elliptic curves, beginning at an undergraduate level (at least for those who have had a course on abstract algebra), and progressing into much more advanced topics, even at the end touching on Andrew Wiles' proof of the Taniyama-Shimura conjecture which led to the proof of Fermat's last theorem.

Less mathematical

* A. J. Menezes, P. C. van Oorschot, and S. A. Vanstone - "Handbook of Applied Cryptography" ISBN 0-8493-8523-7 ( [http://www.cacr.math.uwaterloo.ca/hac/ online version] ). Equivalent to "Applied Cryptography" in many ways, but somewhat more mathematical. For the technically inclined. Covers few meta-cryptographic topics, such as crypto system design. This is currently (2004) regarded as the standard reference work in technical cryptography.
* Ferguson, Niels, and Schneier, Bruce - "Practical Cryptography", Wiley, 2003, ISBN 0-471-22357-3. A cryptosystem design consideration primer. Covers both algorithms and protocols. This is an in depth consideration of one cryptographic problem, including paths not taken and some reasons why. At the time of its publication, most of the material was not otherwise available in a single source. Some was not otherwise available at all. According to the authors, it is (in some sense) a follow-up to "Applied Cryptography".
* Schneier, Bruce - "Applied Cryptography", 2 ed, Wiley, 1996, (ISBN 0-471-11709-9). The most accessible single volume available covering modern cryptographic practice, and approachable by the non mathematically oriented. Incredibly, not exhaustive. Extensive bibliography which can serve as an entry into the modern literature. Less immediately mathematical than some others, eg Menezes et al "Handbook of Applied Cryptography". Note however, that the lack of extensive proofs and notation does not imply that the mathematical concepts are optional. Modern cryptography is fundamentally based on mathematics and Schneier covers it here, just not formally.
* Mel, H.X., and Baker, Doris -- "Cryptography Decrypted", Addison Wesley 2001, ISBN 0-201-61647-5. This technical overview of basic cryptographic components (including extensive diagrams and graphics) explains the evolution of cryptography from the simplest concepts to some modern concepts. It details the basics of symmetric key, and asymmetric key ciphers, MACs, SSL, secure mail and IPsec. No math background is required, though there's some public key mathematics in the appendix.

Cryptographic environment/context -- 'security'

* Schneier, Bruce - "Secrets and Lies", Wiley, ISBN 0-471-25311-1, a discussion of the context within which cryptography and cryptosystems work. "Practical Cryptography" also includes some contextual material in the discussion of crypto system design.
* Schneier, Bruce -- "Beyond Fear", Wiley, ISBN 0-387-02620-7
* Ross Anderson -- "Security Engineering", Wiley, ISBN 0-471-38922-6 ( [http://www.cl.cam.ac.uk/%7Erja14/book.html online version] ), advanced coverage of computer security issues, including cryptography. Covers much more than merely cryptography. Brief on most topics due to the breadth of coverage. Well written, especially compared to the usual standard.
* Edney, Jon and Arbaugh, William A -- "Real 802.11 Security: Wi-Fi Protected Access and 802.11i", Addison-Wesley, ISBN 0-321-13620-9, covers the use of cryptography in Wi-Fi networks. Includes details on Wi-Fi Protected Access (which is based on the IEEE 802.11i specification). The book is slightly out of date as it was written before IEEE 802.11i was finalized but much of the content is still useful for those who want to find out how encryption and authentication is done in a Wi-Fi network.

Declassified works

*Callimahos, Lambros D. and Friedman, William F. Military Cryptanalytics. A (partly) declassified text intended as a training manual for NSA cryptanalysts.

History of cryptography

* Bamford, James, "" (ISBN 0-14-006748-5), and the more recent . The first is one of a very few books about the US Government's NSA. The second is also about NSA but concentrates more on its history. There is some very interesting material in "Body of Secrets" about US attempts (the TICOM mission) to investigate German cryptographic efforts immediately as WW II wound down.
* Gustave Bertrand, "Enigma ou la plus grande énigme de la guerre 1939–1945" (Enigma: the Greatest Enigma of the War of 1939-1945), Paris, 1973. The first public disclosure in the West of the breaking of Enigma, by the chief of French military cryptography prior to WW II. The first public disclosure anywhere was made in the first edition of "Bitwa o tajemnice" by the late Władysław Kozaczuk.
* James Gannon, "Stealing Secrets, Telling Lies: How Spies and Codebreakers Helped Shape the Twentieth Century", Washington, D.C., Brassey's, 2001: an overview of major 20th-century episodes in cryptology and espionage, particularly strong regarding the misappropriation of credit for conspicuous achievements.
* Kahn, David - "The Codebreakers" (ISBN 0-684-83130-9) A single-volume source for cryptographic history, at least for events up to the mid-'60s (ie, to just before DES and the public release of asymmetric key cryptography). The added chapter on more recent developments (in the most recent edition) is quite thin. Kahn has written other books and articles on cryptography, and on cryptographic history. They are very highly regarded.
* Kozaczuk, Władysław, "Enigma: How the German Machine Cipher Was Broken, and How It Was Read by the Allies in World War II", edited and translated by Christopher Kasparek, Frederick, MD, 1984: a history of cryptological efforts against Enigma, concentrating on the contributions of Polish mathematicians Marian Rejewski, Jerzy Różycki and Henryk Zygalski; of particular interest to specialists will be several technical appendices by Rejewski.
* Levy, Steven - "" (ISBN 0-14-024432-8): a journalistic overview of the development of public cryptographic techniques and the US regulatory context for cryptography. This is an account of a major policy conflict.
* Singh, Simon, "The Code Book" (ISBN 1-85702-889-9): an anecdotal introduction to the history of cryptography. Covers more recent material than does even the revised edition of Kahn's "The Codebreakers". Clearly written and quite readable. The included cryptanalytic contest has been won and the prize awarded, but the cyphertexts are still worth attempting.
* Bauer, F L, "Decrypted Secrets", This book is unusual. It is both a history of cryptography, and a discussion of mathematical topics related to cryptography. In his review, David Kahn said he thought it the best book he'd read on the subject. It is essentially two books, in more or less alternating chapters. Originally in German, and the translation shows it in places. Some surprising content, eg, in the discussion of President Edgar Hoover's Secretary of State, Henry Stimson.
* Budiansky, Stephen, "Battle of Wits": a one-volume history of cryptography in WW II. It is well written, well researched, and responsible. Technical material (eg, a description of the cryptanalysis of Enigma) is limited, but clearly presented.
* Prados, John -- "Combined Fleet Decoded", An account of cryptography in the Pacific Theatre of World War II with special emphasis on the Japanese side. Reflects extensive research in Japanese sources and recently available US material. Contains material not previously accessible or unvailable.
* Marks, Leo, "Between Silk and Cyanide: a Codemaker's Story, 1941-1945," (HarperCollins, 1998). (ISBN 0-684-86780-X). A humorous but informative account of code-making and -breaking in Britain's WWII Special Operations Executive.
*Yardley, Herbert, "The American Black Chamber" (ISBN 0-345-29867-5), a classic 1931 account of American code-breaking during and after World War I; and "Chinese Black Chamber: An Adventure in Espionage" (ISBN 0-395-34648-7), about Yardley's work with the Chinese government in the years just before World War II. Yardley has an enduring reputation for embellishment, and some of the material in these books is less than reliable. "The American Black Chamber" was written after the New York operation Yardley ran was shut down by Secretary of State Henry L. Stimson and the US Army, on the grounds that "gentlemen don't read each other's mail".

Historic works

* Abu Yusuf Yaqub ibn Ishaq al-Sabbah Al-Kindi, (A Manuscript on Deciphering Cryptographic Messages), 9th century included first known explanation of frequency analysis cryptanalysis
* Roger Bacon (English friar and polymath), "Epistle on the secret Works of Art and Nobility of Magic", 13th century, possibly the first European work on cryptography since Classical times, written in Latin and not widely available then or now
* Johannes Trithemius, "Steganographia" ("Hidden Writing"), written ca. 1499; pub 1606, banned by the Catholic Church 1609 as alleged discussion of magic, see Polygraphiae (below).
* Johannes Trithemius, "Polygraphiae Libri Sex" ("Six Books on Polygraphy"), 1518, first printed book on cryptography (thought to really be about magic by some observers at the time)
* Giovan Battista Bellaso, "La cifra del. Sig. Giovan Battista Bellaso", 1553, first pub of the cypher widely misattributed to Vigenère.
* Giambattista della Porta, "De Furtivis Literarum Notis" ("On concealed characters in writing"), 1563.
* Blaise de Vigenère, "Traicte de Chiffres", 1585.
* Gustavus Selenus, "Cryptomenytics", 1624, (modern era English trans by J W H Walden)
* John Wilkins, "Mercury", 1647, earliest printed book in English about cryptography
* Friedrich Kasiski, "Die Geheimschriften und die Dechiffrierkunst" ("Secret writing and the Art of Deciphering"), pub 1863, contained the first public description of a technique for cryptanalyzing polyalphabetic cyphers.
* Etienne Bazeries, "Les Chiffres secrets dévoilés" ("Secret ciphers unveiled") about 1900.
* Émile Victor Théodore Myszkowski, "Cryptographie indéchiffrable: basée sur de nouvelles combinaisons rationelles" ("Unbreakable cryptography"), published 1902.

Overview of cryptography

* Piper, Fred and Sean Murphy, "Cryptography : A Very Short Introduction" ISBN 0-19-280315-8 This book outlines the major goals, uses, methods, and developments in cryptography.

Miscellaneous

* Candela, Rosario, "The Military Cipher of Commandant Bazeries". New York: Cardanus Press, 1938. This book detailed cracking of a famous code from 1898 created by Commandant Bazeries, a brilliant French Army Cryptanalyst.

Fiction

* Neal Stephenson - "Cryptonomicon" (ISBN 0-06-051280-6) The adventures of some World War II codebreakers and their modern day progeny.
* Edgar Allan Poe - "The Gold-Bug" (1843) An eccentric man discovers an ancient parchment which contains a cryptogram which, when solved, leads to the discovery of buried treasure. Includes a lengthy discourse on a method of solving a simple cypher.
* Sir Arthur Conan Doyle - "The Dancing Men". Holmes becomes involved in a case which features messages left lying around. They are written in a substitution cypher, which Holmes promptly discerns. Solving the cypher leads to solving the case.
*Ken Follett - "The Key to Rebecca" (1980), WW2 spy novel whose plot revolves around the heroes' efforts to cryptanalyze a book cipher with time running out.
*Clifford B. Hicks - "Alvin's Secret Code" (1963), a children's novel which introduces some basics of cryptography and cryptanalysis.
*Robert Harris - "Enigma" (1995) (ISBN 0-09-999200-0) Novel partly set in Britain's World War II codebreaking centre at Bletchley Park.
* Dan Brown - "Digital Fortress" (1998)
* Dan Brown - "The Da Vinci Code" (2003)

External links

* [http://www.youdzone.com/cryptobooks.html Listing and reviews for a large number of books in cryptography]
* [http://www.staff.uni-mainz.de/pommeren/Kryptologie/Klassisch/0_Unterhaltung/Lit/ List of where cryptography features in literature] — list is presented in German.


Wikimedia Foundation. 2010.

Игры ⚽ Поможем написать реферат

Look at other dictionaries:

  • Cryptography — Secret code redirects here. For the Aya Kamiki album, see Secret Code. Symmetric key cryptography, where the same key is used both for encryption and decryption …   Wikipedia

  • Cryptography in Japan — There is not much cryptological history in Japan prior to the twentieth century, only a few simple codes were used and there seems to have been no practice of cryptanalysis at all.There seems to be almost no cryptology in Japan before the Warring …   Wikipedia

  • Topics in cryptography — This article is intended to be an analytic glossary , or alternatively, an organized collection of annotated pointers.Classical ciphers*Autokey cipher *Permutation cipher*Polyalphabetic substitution **Vigenère cipher*Polygraphic substitution… …   Wikipedia

  • Public-key cryptography — In an asymmetric key encryption scheme, anyone can encrypt messages using the public key, but only the holder of the paired private key can decrypt. Security depends on the secrecy of that private key …   Wikipedia

  • Outline of cryptography — See also: Index of cryptography articles The following outline is provided as an overview of and topical guide to cryptography: Cryptography (or cryptology) – practice and study of hiding information. Modern cryptography intersects the… …   Wikipedia

  • 2005 in books — Books and publishing in 2005.Books published in 2005* 100 People Who Are Screwing Up America (and Al Franken is #37), Bernard Goldberg, current events, ISBN 978 0 06 076128 8 * 100 Minute Bible, Michael Hinton, religion, ISBN 978 09551324 0 7 * …   Wikipedia

  • Magic (cryptography) — Magic was an Allied cryptanalysis project during World War II. It involved the United States Army s Signals Intelligence Section (SIS) and the United States Navy s Communication Special Unit. [1] Contents 1 Codebreaking 1.1 RED …   Wikipedia

  • Cthulhu Mythos miscellaneous books — The following is a list of miscellaneous books both real and fictitious appearing in the Cthulhu Mythos. Contents 1 Overview 2 Table a (A–D) 3 Table b (G–P) 4 Table c (R–Z) …   Wikipedia

  • Java Cryptography Extension — Die Java Cryptography Extension (JCE) ist eine Schnittstelle der Programmiersprache Java und Framework für kryptographische Aufgaben wie Verschlüsselung, Kommunikations Authentifizierung und Schlüsselverwaltung. Seit dem JDK 1.4 ist sie Teil der… …   Deutsch Wikipedia

  • Fish (cryptography) — For the (Fibonacci Shrinking) stream cipher published in 1993, see FISH (cipher). Fish (sometimes FISH) was the Allied codename for any of several German teleprinter stream ciphers used during World War II [Wolfgang W. Mache, Geheimschreiber (… …   Wikipedia

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”