Home | Best Seller | FAQ | Contact Us
Browse
Art & Photography
Biographies & Autobiography
Body,Mind & Health
Business & Economics
Children's Book
Computers & Internet
Cooking
Crafts,Hobbies & Gardening
Entertainment
Family & Parenting
History
Horror
Literature & Fiction
Mystery & Detective
Nonfiction
Professional & Technology
Reference
Religion
Romance
Science
Science Fiction & Fantasy
Sports & Outdoors
Travel & Geography
   Book Info

enlarge picture

Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography  
Author: Simon Singh
ISBN: 0385495323
Format: Handover
Publish Date: June, 2005
 
     
     
   Book Review



People love secrets. Ever since the first word was written, humans have sent coded messages to each other. In The Code Book, Simon Singh, author of the bestselling Fermat's Enigma, offers a peek into the world of cryptography and codes, from ancient texts through computer encryption. Singh's compelling history is woven through with stories of how codes and ciphers have played a vital role in warfare, politics, and royal intrigue. The major theme of The Code Book is what Singh calls "the ongoing evolutionary battle between codemakers and codebreakers," never more clear than in the chapters devoted to World War II. Cryptography came of age during that conflict, as secret communications became critical to both sides' success.

Confronted with the prospect of defeat, the Allied cryptanalysts had worked night and day to penetrate German ciphers. It would appear that fear was the main driving force, and that adversity is one of the foundations of successful codebreaking.

In the information age, the fear that drives cryptographic improvements is both capitalistic and libertarian--corporations need encryption to ensure that their secrets don't fall into the hands of competitors and regulators, and ordinary people need encryption to keep their everyday communications private in a free society. Similarly, the battles for greater decryption power come from said competitors and governments wary of insurrection.

The Code Book is an excellent primer for those wishing to understand how the human need for privacy has manifested itself through cryptography. Singh's accessible style and clear explanations of complex algorithms cut through the arcane mathematical details without oversimplifying. --Therese Littleton


From Publishers Weekly
In an enthralling tour de force of popular explication, Singh, author of the bestselling Fermat's Enigma, explores the impact of cryptographyAthe creation and cracking of coded messagesAon history and society. Some of his examples are familiar, notably the Allies' decryption of the Nazis' Enigma machine during WWII; less well-known is the crucial role of Queen Elizabeth's code breakers in deciphering Mary, Queen of Scots' incriminating missives to her fellow conspirators plotting to assassinate Elizabeth, which led to Mary's beheading in 1587. Singh celebrates a group of unsung heroes of WWII, the Navajo "code talkers," Native American Marine radio operators who, using a coded version of their native language, played a vital role in defeating the Japanese in the Pacific. He also elucidates the intimate links between codes or ciphers and the development of the telegraph, radio, computers and the Internet. As he ranges from Julius Caesar's secret military writing to coded diplomatic messages in feuding Renaissance Italy city-states, from the decipherment of the Rosetta Stone to the ingenuity of modern security experts battling cyber-criminals and cyber-terrorists, Singh clarifies the techniques and tricks of code makers and code breakers alike. He lightens the sometimes technical load with photos, political cartoons, charts, code grids and reproductions of historic documents. He closes with a fascinating look at cryptanalysts' planned and futuristic tools, including the "one-time pad," a seemingly unbreakable form of encryption. In Singh's expert hands, cryptography decodes as an awe-inspiring and mind-expanding story of scientific breakthrough and high drama. Agent, Patrick Walsh. (Oct.) FYI: The book includes a "Cipher Challenge," offering a $15,000 reward to the first person to crack that code. Copyright 1999 Reed Business Information, Inc.


From Library Journal
Singh, Cambridge-educated physicist, has written a provocative study of code, the way in which humans hide the inherent meanings of messages by substituting words and or characters in a text. Author of the popular Fermat's Enigma, he broadly portrays the evolution of cryptography throughout the centuries. In essence, efforts of those wishing for secrecy and others who attempt to break it is a story of intrigue of the highest form. Employing a smooth narrative style, Singh tells of secrecy, fascinating events, and people, starting with Mary Queen of Scots and ending with recent attempts by quantum theorists to construct an unbreakable code. This is the history of technology at its best and serves as an excellent addition to David Kahn's mammoth work on cryptography, The Codebreakers (Scribner, 1996). Highly recommended for all public and academic libraries.-ADayne Sherman, Southeastern Louisiana Univ., Hammond Copyright 1999 Reed Business Information, Inc.


From The Industry Standard
During the late 19th century, private citizens and businesses began to rely less on the dependable but slow postal system, and more on a new method of transmitting and receiving messages, news and financial data. The breakthrough technology was the telegraph, and almost as soon as people started using it, they began to think of ways to safeguard private communications from prying eyes.One writer in England's Quarterly Review described the problem in 1853: "The clerks of the English Telegraph Company are sworn to secrecy, but we often write things that would be intolerable to see strangers read before our eyes. This is a grievous fault in the telegraph, and it must be remedied by some means or other."A simple solution to snooping telegraph operators was to encrypt messages before handing them over to transmit, a practice that became common for individuals and companies alike. A hundred years later, we are in the midst of another telecommunications transformation, and concern over privacy is more intense than ever. As our private e-mail messages and credit card numbers ricochet around the world at dizzying speed, encryption remains the cornerstone of our security.Of course, as author Simon Singh explains in The Code Book, our methods of encryption have evolved along with our communications technologies. In a sweeping overview, Singh traces the evolution of secret writing from the time of Herodotus to the present day. Along the way, he tells tales of the treasonous, though simply coded communications of Mary, Queen of Scots; Louis XIV's Great Cipher, which went unsolved for two centuries; and Charles Babbage's 1850s deciphering of the supposedly uncrackable polyalphabetic Vigenere Cipher. He also details the World War II-era work of Navajo code-talkers and the cracking of the German Enigma machine, as well as the United States' and England's nearly simultaneous discovery of public-key cryptography in the 1970s.Author of the 1997 bestseller Fermat's Enigma, Singh casts the relationship between codemaking and codebreaking in evolutionary terms: Like strains of infectious bacteria, ciphers grow stronger because, as the weak are deciphered, necessity demands that more difficult-to-crack codes take their place.Although Singh fashions a compelling history, as well as a skillful explanation of the analytical underpinnings of cryptographs, the most dramatic moments in the book come in the last three chapters. As the book draws to a close, the author walks readers through such events of the past 20 years as the invention of public-key cryptography and recent experiments to employ quantum mechanics in the quest for the unbreakable code.The public-key method - the first cryptographic system in history that doesn't require both parties in a transaction to share a secret key - is considered the most important advance in codemaking within the past 2,000 years. Public-key encryption makes possible familiar computer transactions like secure e-mail and e-commerce, without which using a credit card on the Web would be no more secure than leaving a wallet on the bus.Public-key cryptography also helped revive a debate over encryption that pits citizen privacy against government security. As Singh commented at a recent book reading in San Francisco, "I could send you a message encrypted through free software on the Net, and the combined forces of the GCHQ, the NSA, the CIA and the FBI wouldn't be able to crack that code. And if they did manage to," he added, "I could just re-encrypt with Version 2.0."Singh understands an essential truth about secrets: You can crack a code if you ask the right questions, but sometimes the answers evolve themselves out of existence. -- Maria De La O


The New York Times Book Review, Robert Osserman
His exposition is especially effective at putting the reader in the code breaker's shoes...


From Scientific American
The ancient battle between people who want to preserve secrets and people who want to discover them proceeds as a form of evolution. Codemakers devise a better means of encryption; codebreakers solve it, forcing the encoders to find another improvement. Singh, trained in physics but now an author of works on science, spins an absorbing tale of codemaking and codebreaking over the centuries. Does the simple monoalphabetic substitution cipher, which replaces each letter of a message with a letter from a cipher alphabet, no longer suffice? Replace it with a code using two or more cipher alphabets. When that no longer outwits the cryptanalysts, encode with a Vigenère square, in which a plaintext alphabet is followed by 26 cipher alphabets. And so on through one-time pad ciphers, cryptographic machines and public-key cryptography. Singh explains them all deftly. Looking to the future, he sees "one idea in particular that might enable cryptanalysts to break all today's ciphers." It is the quantum computer. If it can be built, "it would be able to perform calculations with such enormous speed that it would make a modern supercomputer look like a broken abacus." Or perhaps the cryptographers will triumph with quantum cryptography. "If quantum cryptography systems can be engineered to operate over long distances, the evolution of ciphers will stop. The quest for privacy will have come to an end."


The New York Times, Richard Bernstein
It would be harder to imagine a clearer or more fascinating presentation of cryptology and decryptology than nonspecialists will get in this book.


From Booklist
For millennia, secret writing was the domain of spies, diplomats, and generals; with the advent of the Internet, it has become the concern of the public and businesses. One cyber-libertarian responded with the freeware encryption program Pretty Good Privacy (PGP), and Singh similarly meets a sharpening public curiosity about how codes work. His first popular foray into a mathematical topic, Fermat's Last Theorem (1997), nicely balanced technical detail with vibrant storytelling, a quality happily present again here. Although the quantum-mechanical encryption with which Singh culminates his narrative is challengingly arcane to most except for the math spooks at the National Security Agency, Singh successfully conveys its essential principles, as he does those of all major ciphering schemes. Beginning with such simple ideas as monoalphabetic substitution, which can protect the communications of a boy's treehouse club but not much more, Singh underscores with stories how codemakers and codebreakers have battled each other throughout history. A tool called frequency analysis easily defeats the monoalphabetic cipher, and encryptors over time have added the Vigenere square, cipher disks, one-time pads, and public-key cryptography that underlies PGP. But each security strategy, Singh explains, contains some vulnerability that the clever code cracker can exploit, an opaque process the author splendidly illuminates. Instances of successful decipherment, as of Egyptian hieroglyphics or the German Enigma cipher system in World War II, combine with Singh's sketches of the mathematicians who have advanced the art of secrecy, from Julius Caesar to Alan Turing to contemporary mathematicians, resulting in a wonderfully understandable survey. Gilbert Taylor


Review
"It would be hard to imagine a clearer or more fascinating presentation. . . . Mr. Singh gives cryptography not only its historical dimension but its human one." --The New York Times

"Entertaining and satisfying. . . . Offers a fascinating glimpse into the mostly secret competition between codemakers and codebreakers."        --USA Today
  
"A good read that, bless it, makes the reader feel a bit smarter when it's done. Singh's an elegant writer and well-suited to the task of leading the mathematically perplexed through areas designed to be tricky."        --Seattle Weekly
  
"An absorbing tale of codemaking and codebreaking over the centuries." --Scientific American

"Singh spins tales of cryptic intrigue in every chapter." --The Wall Street Journal

"Brings together...the geniuses who have secured communications, saved lives, and influenced the fate of nations. A pleasure to read." --Chicago Tribune

"Enthralling...commendably lucid...[Singh's] book provides a timely and entertaining summary of the subject." --The Economist


Review
"It would be hard to imagine a clearer or more fascinating presentation. . . . Mr. Singh gives cryptography not only its historical dimension but its human one." --The New York Times

"Entertaining and satisfying. . . . Offers a fascinating glimpse into the mostly secret competition between codemakers and codebreakers."        --USA Today
  
"A good read that, bless it, makes the reader feel a bit smarter when it's done. Singh's an elegant writer and well-suited to the task of leading the mathematically perplexed through areas designed to be tricky."        --Seattle Weekly
  
"An absorbing tale of codemaking and codebreaking over the centuries." --Scientific American

"Singh spins tales of cryptic intrigue in every chapter." --The Wall Street Journal

"Brings together...the geniuses who have secured communications, saved lives, and influenced the fate of nations. A pleasure to read." --Chicago Tribune

"Enthralling...commendably lucid...[Singh's] book provides a timely and entertaining summary of the subject." --The Economist


Book Description
In his first book since the bestselling Fermat's Enigma, Simon Singh offers the first sweeping history of encryption, tracing its evolution and revealing the dramatic effects codes have had on wars, nations, and individual lives. From Mary, Queen of Scots, trapped by her own code, to the Navajo Code Talkers who helped the Allies win World War II, to the incredible (and incredibly simple) logisitical breakthrough that made Internet commerce secure, The Code Book tells the story of the most powerful intellectual weapon ever known: secrecy.

Throughout the text are clear technological and mathematical explanations, and portrayals of the remarkable personalities who wrote and broke the world's most difficult codes. Accessible, compelling, and remarkably far-reaching, this book will forever alter your view of history, what drives it, and how private that e-mail you just sent really is.



Book Info
Offers a peek into the world of cryptography and codes, from ancient texts through computer encryption. Singh calls the ongoing evolutionary battle between codemakers and codebreakers,never more clear than in the chapters devoted to World War II. DLC: Cryptography-History.


From the Inside Flap
In his first book since the bestselling Fermat's Enigma, Simon Singh offers the first sweeping history of encryption, tracing its evolution and revealing the dramatic effects codes have had on wars, nations, and individual lives. From Mary, Queen of Scots, trapped by her own code, to the Navajo Code Talkers who helped the Allies win World War II, to the incredible (and incredibly simple) logisitical breakthrough that made Internet commerce secure, The Code Book tells the story of the most powerful intellectual weapon ever known: secrecy.

Throughout the text are clear technical and mathematical explanations, and portraits of the remarkable personalities who wrote and broke the world's most difficult codes. Accessible, compelling, and remarkably far-reaching, this book will forever alter your view of history and what drives it.  It will also make yo wonder how private that e-mail you just sent really is.


From the Back Cover
"It would be hard to imagine a clearer or more fascinating presentation. . . . Mr. Singh gives cryptography not only its historical dimension but its human one." --The New York Times

"Entertaining and satisfying. . . . Offers a fascinating glimpse into the mostly secret competition between codemakers and codebreakers."        --USA Today

"A good read that, bless it, makes the reader feel a bit smarter when it's done. Singh's an elegant writer and well-suited to the task of leading the mathematically perplexed through areas designed to be tricky."        --Seattle Weekly

"An absorbing tale of codemaking and codebreaking over the centuries." --Scientific American

"Singh spins tales of cryptic intrigue in every chapter." --The Wall Street Journal

"Brings together...the geniuses who have secured communications, saved lives, and influenced the fate of nations. A pleasure to read." --Chicago Tribune

"Enthralling...commendably lucid...[Singh's] book provides a timely and entertaining summary of the subject." --The Economist



About the Author
Simon Singh received his Ph.D. in physics from Cambridge University. A former BBC producer, he directed and co-produced an award-winning documentary film on Fermat's Last Theorem that aired on PBS's Nova series and formed the basis of his bestselling book, Fermat's Enigma. He lives in London.


Excerpt. © Reprinted by permission. All rights reserved.
On the morning of Wednesday, 15 October 1586, Queen Mary entered the crowded courtroom at Fotheringhay Castle. Years of imprisonment and the onset of rheumatism had taken their toll, yet she remained dignified, composed and indisputably regal. Assisted by her physician, she made her way past the judges, officials and spectators, and approached the throne that stood halfway along the long, narrow chamber. Mary had assumed that the throne was a gesture of respect towards her, but she was mistaken. The throne symbolised the absent Queen Elizabeth, Mary's enemy and prosecutor. Mary was gently guided away from the throne and towards the opposite side of the room, to the defendant's seat, a crimson velvet chair.

Mary Queen of Scots was on trial for treason. She had been accused of plotting to assassinate Queen Elizabeth in order to take the English crown for herself. Sir Francis Walsingham, Elizabeth's Principal Secretary, had already arrested the other conspirators, extracted confessions, and executed them. Now he planned to prove that Mary was at the heart of the plot, and was therefore equally culpable and equally deserving of death.

Walsingham knew that before he could have Mary executed, he would have to convince Queen Elizabeth of her guilt. Although Elizabeth despised Mary, she had several reasons for being reluctant to see her put to death. First, Mary was a Scottish queen, and many questioned whether an English court had the authority to execute a foreign head of state. Second, executing Mary might establish an awkward precedent -- if the state is allowed to kill one queen, then perhaps rebels might have fewer reservations about killing another, namely Elizabeth. Third, Elizabeth and Mary were cousins, and their blood tie made Elizabeth all the more squeamish about ordering her execution. In short, Elizabeth would sanction Mary's execution only if Walsingham could prove beyond any hint of doubt that she had been part of the assassination plot.

The conspirators were a group of young English Catholic noblemen intent on removing Elizabeth, a Protestant, and replacing her with Mary, a fellow Catholic. It was apparent to the court that Mary was a figurehead for the conspirators, but it was not clear that she had actually given her blessing to the conspiracy. In fact, Mary had authorised the plot. The challenge for Walsingham was to demonstrate a palpable link between Mary and the plotters.

On the morning of her trial, Mary sat alone in the dock, dressed in sorrowful black velvet. In cases of treason, the accused was forbidden counsel and was not permitted to call witnesses. Mary was not even allowed secretaries to help her prepare her case. However, her plight was not hopeless because she had been careful to ensure that all her correspondence with the conspirators had been written in cipher. The cipher turned her words into a meaningless series of symbols, and Mary believed that even if Walsingham had captured the letters, then he could have no idea of the meaning of the words within them. If their contents were a mystery, then the letters could not be used as evidence against her. However, this all depended on the assumption that her cipher had not been broken.

Unfortunately for Mary, Walsingham was not merely Principal Secretary, he was also England's spymaster. He had intercepted Mary's letters to the plotters, and he knew exactly who might be capable of deciphering them. Thomas Phelippes was the nation's foremost expert on breaking codes, and for years he had been deciphering the messages of those who plotted against Queen Elizabeth, thereby providing the evidence needed to condemn them. If he could decipher the incriminating letters between Mary and the conspirators, then her death would be inevitable. On the other hand, if Mary's cipher was strong enough to conceal her secrets, then there was a chance that she might survive. Not for the first time, a life hung on the strength of a cipher.

The Evolution of Secret Writing

Some of the earliest accounts of secret writing date back to Herodotus, 'the father of history' according to the Roman philosopher and statesman Cicero. In The Histories, Herodotus chronicled the conflicts between Greece and Persia in the fifth century bc, which he viewed as a confrontation between freedom and slavery, between the independent Greek states and the oppressive Persians. According to Herodotus, it was the art of secret writing that saved Greece from being conquered by Xerxes, King of Kings, the despotic leader of the Persians.

The long-running feud between Greece and Persia reached a crisis soon after Xerxes began constructing a city at Persepolis, the new capital for his kingdom. Tributes and gifts arrived from all over the empire and neighbouring states, with the notable exceptions of Athens and Sparta. Determined to avenge this insolence, Xerxes began mobilising a force, declaring that 'we shall extend the empire of Persia such that its boundaries will be God's own sky, so the sun will not look down upon any land beyond the boundaries of what is our own'. He spent the next five years secretly assembling the greatest fighting force in history, and then, in 480 bc, he was ready to launch a surprise attack.

However, the Persian military build-up had been witnessed by Demaratus, a Greek who had been expelled from his homeland and who lived in the Persian city of Susa. Despite being exiled he still felt some loyalty to Greece, so he decided to send a message to warn the Spartans of Xerxes' invasion plan. The challenge was how to dispatch the message without it being intercepted by the Persian guards. Herodotus wrote:

As the danger of discovery was great, there was only one way in which he could contrive to get the message through: this was by scraping the wax off a pair of wooden folding tablets, writing on the wood underneath what Xerxes intended to do, and then covering the message over with wax again. In this way the tablets, being apparently blank, would cause no trouble with the guards along the road. When the message reached its destination, no one was able to guess the secret, until, as I understand, Cleomenes' daughter Gorgo, who was the wife of Leonides, divined and told the others that if they scraped the wax off, they would find something written on the wood underneath. This was done; the message was revealed and read, and afterwards passed on to the other Greeks.
As a result of this warning, the hitherto defenceless Greeks began to arm themselves. Profits from the state-owned silver mines, which were usually shared among the citizens, were instead diverted to the navy for the construction of two hundred warships.

Xerxes had lost the vital element of surprise and, on 23 September 480 bc, when the Persian fleet approached the Bay of Salamis near Athens, the Greeks were prepared. Although Xerxes believed he had trapped the Greek navy, the Greeks were deliberately enticing the Persian ships to enter the bay. The Greeks knew that their ships, smaller and fewer in number, would have been destroyed in the open sea, but they realised that within the confines of the bay they might outmanoeuvre the Persians. As the wind changed direction the Persians found themselves being blown into the bay, forced into an engagement on Greek terms. The Persian princess Artemisia became surrounded on three sides and attempted to head back out to sea, only to ram one of her own ships. Panic ensued, more Persian ships collided and the Greeks launched a full-blooded onslaught. Within a day, the formidable forces of Persia had been humbled.

Demaratus' strategy for secret communication relied on simply hiding the message. Herodotus also recounted another incident in which concealment was sufficient to secure the safe passage of a message. He chronicled the story of Histaiaeus, who wanted to encourage Aristagoras of Miletus to revolt against the Persian king. To convey his instructions securely, Histaiaeus shaved the head of his messenger, wrote the message on his scalp, and then waited for the hair to regrow. This was clearly a period of history that tolerated a certain lack of urgency. The messenger, apparently carrying nothing contentious, could travel without being harassed. Upon arriving at his destination he then shaved his head and pointed it at the intended recipient.

Secret communication achieved by hiding the existence of a message is known as steganography, derived from the Greek words steganos, meaning 'covered', and graphein, meaning 'to write'. In the two thousand years since Herodotus, various forms of steganography have been used throughout the world. For example, the ancient Chinese wrote messages on fine silk, which was then scrunched into a tiny ball and covered in wax. The messenger would then swallow the ball of wax. In the fifteenth century, the Italian scientist Giovanni Porta described how to conceal a message within a hard-boiled egg by making an ink from a mixture of one ounce of alum and a pint of vinegar, and then using it to write on the shell. The solution penetrates the porous shell, and leaves a message on the surface of the hardened egg albumen, which can be read only when the shell is removed. Steganography also includes the practice of writing in invisible ink. As far back as the first century ad, Pliny the Elder explained how the 'milk' of the thithymallus plant could be used as an invisible ink. Although transparent after drying, gentle heating chars the ink and turns it brown. Many organic fluids behave in a similar way, because they are rich in carbon and therefore char easily. Indeed, it is not unknown for modern spies who have run out of standard-issue invisible ink to improvise by using their own urine.

The longevity of steganography illustrates that it certainly offers a modicum of security, but it suffers from a fundamental weakness. If the messenger is searched and the message is discovered, then the contents of the secret communication are revealed at once. Interception of the message immediately compromises all security. A thorough guard might routinely search any person crossing a border, scraping any wax tablets, heating blank sheets of paper, shelling boiled eggs, shaving people's heads, and so on, and inevitably there will be occasions when the message is uncovered.

Hence, in parallel with the development of steganography, there was the evolution of cryptography, derived from the Greek word kryptos, meaning 'hidden'. The aim of cryptography is not to hide the existence of a message, but rather to hide its meaning, a process known as encryption. To render a message unintelligible, it is scrambled according to a particular protocol which is agreed beforehand between the sender and the intended recipient. Thus the recipient can reverse the scrambling protocol and make the message comprehensible. The advantage of cryptography is that if the enemy intercepts an encrypted message, then the message is unreadable. Without knowing the scrambling protocol, the enemy should find it difficult, if not impossible, to recreate the original message from the encrypted text.

Although cryptography and steganography are independent, it is possible to both scramble and hide a message to maximise security. For example, the microdot is a form of steganography that became popular during the Second World War. German agents in Latin America would photographically shrink a page of text down to a dot less than 1 millimetre in diameter, and then hide this microdot on top of a full stop in an apparently innocuous letter. The first microdot to be spotted by the FBI was in 1941, following a tip-off that the Americans should look for a tiny gleam from the surface of a letter, indicative of smooth film. Thereafter, the Americans could read the contents of most intercepted microdots, except when the German agents had taken the extra precaution of scrambling their message before reducing it. In such cases of cryptography combined with steganography, the Americans were sometimes able to intercept and block communications, but they were prevented from gaining any new information about German spying activity. Of the two branches of secret communication, cryptography is the more powerful because of this ability to prevent information from falling into enemy hands.

In turn, cryptography itself can be divided into two branches, known as transposition and substitution. In transposition, the letters of the message are simply rearranged, effectively generating an anagram. For very short messages, such as a single word, this method is relatively insecure because there are only a limited number of ways of rearranging a handful of letters. For example, three letters can be arranged in only six different ways, e.g. cow, cwo, ocw, owc, wco, woc. However, as the number of letters gradually increases, the number of possible arrangements rapidly explodes, making it impossible to get back to the original message unless the exact scrambling process is known. For example, consider this short sentence. It contains just 35 letters, and yet there are more than 50,000,000,000,000,000,000,000,000,000,000 distinct arrangements of them. If one person could check one arrangement per second, and if all the people in the world worked night and day, it would still take more than a thousand times the lifetime of the universe to check all the arrangements.




Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography

FROM THE PUBLISHER

In his first book since the bestselling Fermat's Enigma, Simon Singh offers the first sweeping history of encryption, tracing its evolution and revealing the dramatic effects codes have had on wars, nations, and individual lives. From Mary, Queen of Scots, trapped by her own code, to the Navajo Code Talkers who helped the Allies win World War II, to the incredible (and incredibly simple) logisitical breakthrough that made Internet commerce secure, The Code Book tells the story of the most powerful intellectual weapon ever known: secrecy.

Throughout the text are clear technical and mathematical explanations, and portraits of the remarkable personalities who wrote and broke the world's most difficult codes. Accessible, compelling, and remarkably far-reaching, this book will forever alter your view of history and what drives it. It will also make yo wonder how private that e-mail you just sent really is.

SYNOPSIS

In his first book since the bestselling Fermat's Enigma, Simon Singh offers the first sweeping history of encryption, tracing its evolution and revealing the dramatic effects codes have had on wars, nations, and individual lives. From Mary, Queen of Scots, trapped by her own code, to the Navajo Code Talkers who helped the Allies win World War II, to the incredible (and incredibly simple) logisitical breakthrough that made Internet commerce secure, The Code Book tells the story of the most powerful intellectual weapon ever known: secrecy.

Throughout the text are clear technological and mathematical explanations, and portrayals of the remarkable personalities who wrote and broke the world's most difficult codes. Accessible, compelling, and remarkably far-reaching, this book will forever alter your view of history, what drives it, and how private that e-mail you just sent really is.

     



Home | Private Policy | Contact Us
@copyright 2001-2005 ReadingBee.com