ABSTRACT

The first edition of this award-winning book attracted a wide audience. This second edition is both a joy to read and a useful classroom tool. Unlike traditional textbooks, it requires no mathematical prerequisites and can be read around the mathematics presented. If used as a textbook, the mathematics can be prioritized, with a book both students and instructors will enjoy reading.

Secret History: The Story of Cryptology, Second Edition incorporates new material concerning various eras in the long history of cryptology. Much has happened concerning the political aspects of cryptology since the first edition appeared. The still unfolding story is updated here.

The first edition of this book contained chapters devoted to the cracking of German and Japanese systems during World War II. Now the other side of this cipher war is also told, that is, how the United States was able to come up with systems that were never broken.

The text is in two parts. Part I presents classic cryptology from ancient times through World War II. Part II examines modern computer cryptology. With numerous real-world examples and extensive references, the author skillfully balances the history with mathematical details, providing readers with a sound foundation in this dynamic field.

FEATURES

  • Presents a chronological development of key concepts
  • Includes the Vigenère cipher, the one-time pad, transposition ciphers, Jefferson’s wheel cipher, Playfair cipher, ADFGX, matrix encryption, Enigma, Purple, and other classic methods
  • Looks at the work of Claude Shannon, the origin of the National Security Agency, elliptic curve cryptography, the Data Encryption Standard, the Advanced Encryption Standard, public-key cryptography, and many other topics
  • New chapters detail SIGABA and SIGSALY, successful systems used during World War II for text and speech, respectively
  • Includes quantum cryptography and the impact of quantum computers

part I|324 pages

Classical Cryptology

chapter Chapter 2|48 pages

Simple Progression to an Unbreakable Cipher

chapter Chapter 3|22 pages

Transposition Ciphers

chapter Chapter 4|34 pages

Shakespeare, Jefferson, and JFK

chapter Chapter 5|36 pages

World War I and Herbert O. Yardley

chapter Chapter 6|18 pages

Matrix Encryption

chapter Chapter 7|44 pages

World War II: 
The Enigma of Germany

chapter Chapter 8|30 pages

Cryptologic War against Japan

chapter Chapter 9|18 pages

SIGABA: 
World War II Defense

chapter Chapter 10|16 pages

Enciphering Speech 1

part II|264 pages

Modern Cryptology

chapter Chapter 11|18 pages

Claude Shannon

chapter 12|34 pages

National Security Agency

chapter Chapter 13|34 pages

The Data Encryption Standard

chapter Chapter 14|22 pages

The Birth of Public Key Cryptography

chapter Chapter 15|30 pages

Attacking RSA

chapter Chapter 16|28 pages

Primality Testing and Complexity Theory

chapter Chapter 17|16 pages

Authenticity

chapter Chapter 18|24 pages

Pretty Good Privacy and Bad Politics

chapter Chapter 19|12 pages

Stream Ciphers

chapter Chapter 20|24 pages

Suite B All-Stars

chapter Chapter 21|20 pages

Toward Tomorrow