Books On Cryptography
   HOME

TheInfoList



OR:

Books on
cryptography Cryptography, or cryptology (from grc, , translit=kryptós "hidden, secret"; and ''graphein'', "to write", or ''-logia'', "study", respectively), is the practice and study of techniques for secure communication in the presence of adver ...
have been published sporadically and with highly variable quality for a long time. This is despite the tempting, though superficial,
paradox A paradox is a logically self-contradictory statement or a statement that runs contrary to one's expectation. It is a statement that, despite apparently valid reasoning from true premises, leads to a seemingly self-contradictory or a logically u ...
that secrecy is of the essence in sending confidential messages — see
Kerckhoffs' principle Kerckhoffs's principle (also called Kerckhoffs's desideratum, assumption, axiom, doctrine or law) of cryptography was stated by Dutch-born cryptographer Auguste Kerckhoffs in the 19th century. The principle holds that a cryptosystem should be se ...
. In contrast, the revolutions in
cryptography Cryptography, or cryptology (from grc, , translit=kryptós "hidden, secret"; and ''graphein'', "to write", or ''-logia'', "study", respectively), is the practice and study of techniques for secure communication in the presence of adver ...
and secure
communications Communication (from la, communicare, meaning "to share" or "to be in relation with") is usually defined as the transmission of information. The term may also refer to the message communicated through such transmissions or the field of inquir ...
since the 1970s are well covered in the available literature.


Early history

An early example of a book about cryptography was a Roman work, now lost and known only by references. Many early cryptographic works were esoteric, mystical, and/or reputation-promoting; cryptography being mysterious, there was much opportunity for such things. At least one work by
Trithemius Johannes Trithemius (; 1 February 1462 – 13 December 1516), born Johann Heidenberg, was a German Benedictine abbot and a polymath who was active in the German Renaissance as a lexicographer, chronicler, cryptographer, and occultist. He is consi ...
was banned by the Catholic Church and put on the Index Librorum Prohibitorum as being about black magic or witchcraft. Many writers claimed to have invented unbreakable ciphers. None were, though it sometimes took a long while to establish this. In the 19th century, the general standard improved somewhat (e.g., works by Auguste Kerckhoffs,
Friedrich Kasiski Major Friedrich Wilhelm Kasiski (29 November 1805 – 22 May 1881) was a German infantry officer, cryptographer and archeologist. Kasiski was born in Schlochau, Kingdom of Prussia (now Człuchów, Poland). Military service Kasiski enlisted in ...
, and
Étienne Bazeries Étienne Bazeries (21 August 1846, in Port Vendres – 7 November 1931, in Noyon) was a French military cryptanalyst active between 1890 and the First World War. He is best known for developing the " Bazeries Cylinder", an improved version of T ...
). Colonel Parker Hitt and
William Friedman William Frederick Friedman (September 24, 1891 – November 12, 1969) was a US Army cryptographer who ran the research division of the Army's Signal Intelligence Service (SIS) in the 1930s, and parts of its follow-on services into the 1950s. I ...
in the early 20th century also wrote books on cryptography. These authors, and others, mostly abandoned any mystical or magical tone.


Open literature versus classified literature

With the invention of radio, much of military communications went wireless, allowing the possibility of enemy interception much more readily than tapping into a landline. This increased the need to protect communications. By the end of
World War I World War I (28 July 1914 11 November 1918), often abbreviated as WWI, was one of the deadliest global conflicts in history. Belligerents included much of Europe, the Russian Empire, the United States, and the Ottoman Empire, with fightin ...
, cryptography and its literature began to be officially limited. One exception was the 1931 book '' The American Black Chamber'' by Herbert Yardley, which gave some insight into American cryptologic success stories, including the Zimmermann telegram and the breaking of Japanese codes during the
Washington Naval Conference The Washington Naval Conference was a disarmament conference called by the United States and held in Washington, DC from November 12, 1921 to February 6, 1922. It was conducted outside the auspices of the League of Nations. It was attended by nine ...
.


List


Overview of cryptography

* Bertram, Linda A. / Dooble, Gunther van / et al. (Eds.): Nomenclatura: Encyclopedia of modern Cryptography and Internet Security - From AutoCrypt and Exponential Encryption to Zero-Knowledge-Proof Keys, 2019, . * Piper, Fred and Sean Murphy, ''Cryptography : A Very Short Introduction'' This book outlines the major goals, uses, methods, and developments in cryptography.


Significant books

Significant books on cryptography include: * Aumasson, Jean-Philippe (2017), ''Serious Cryptography: A Practical Introduction to Modern Encryption''. No Starch Press, 2017,

Presents modern cryptography in a readable way, suitable for practitioners, software engineers, and others who want to learn practice-oriented cryptography. Each chapter includes a discussion of common implementation mistakes using real-world examples and details what could go wrong and how to avoid these pitfalls. * Aumasson, Jean-Philippe (2021), ''Crypto Dictionary: 500 Tasty Tidbits for the Curious Cryptographer''. No Starch Press, 2021,

Ultimate desktop dictionary with hundreds of definitions organized alphabetically for all things cryptographic. The book also includes discussions of the threat that quantum computing is posing to current cryptosystems and a nod to post-quantum algorithms, such as lattice-based cryptographic schemes. * Bertram, Linda A. / Dooble, Gunther van: Transformation of Cryptography - Fundamental concepts of Encryption, Milestones, Mega-Trends and sustainable Change in regard to Secret Communications and its Nomenclatura, 2019, . * Rosario Candela, Candela, Rosario (1938). ''The Military Cipher of Commandant Bazeries''. New York: Cardanus Press, This book detailed the cracking of a famous code from 1898 created by Commandant Bazeries, a brilliant French Army Cryptanalyst. * Falconer, John (1685). '' Cryptomenysis Patefacta, or Art of Secret Information Disclosed Without a Key''. One of the earliest English texts on cryptography. * Ferguson, Niels, and Schneier, Bruce (2003). ''Practical Cryptography'', Wiley, . A cryptosystem design consideration primer. Covers both algorithms and protocols. This is an in-depth consideration of one cryptographic problem, including paths not taken and some reasons why. At the time of its publication, most of the material was not otherwise available in a single source. Some was not otherwise available at all. According to the authors, it is (in some sense) a follow-up to ''Applied Cryptography''. * Gaines, Helen Fouché (1939). ''Cryptanalysis'', Dover, . Considered one of the classic books on the subject, and includes many sample ciphertext for practice. It reflects public amateur practice as of the inter-War period. The book was compiled as one of the first projects of the
American Cryptogram Association The American Cryptogram Association (ACA) is an American non-profit organization devoted to the hobby of cryptography, with an emphasis on types of codes, ciphers, and cryptograms that can be solved either with pencil and paper, or with computers, ...
. * Goldreich, Oded (2001 and 2004). ''Foundations of Cryptography''. Cambridge University Press. Presents the theoretical foundations of cryptography in a detailed and comprehensive manner. A must-read for anyone interested in the theory of cryptography. * Katz, Jonathan and Lindell, Yehuda (2007 and 2014). ''Introduction to Modern Cryptography'', CRC Press. Presents modern cryptography at a level appropriate for undergraduates, graduate students, or practitioners. Assumes mathematical maturity but presents all the necessary mathematical and computer science background. * Konheim, Alan G. (1981). ''Cryptography: A Primer'', John Wiley & Sons, . Written by one of the IBM team who developed DES. * Mao, Wenbo (2004). ''Modern Cryptography Theory and Practice'' . An up-to-date book on cryptography. Touches on provable security, and written with students and practitioners in mind. * Mel, H.X., and Baker, Doris (2001). ''Cryptography Decrypted'', Addison Wesley . This technical overview of basic cryptographic components (including extensive diagrams and graphics) explains the evolution of cryptography from the simplest concepts to some modern concepts. It details the basics of symmetric key, and asymmetric key ciphers, MACs, SSL, secure mail and IPsec. No math background is required, though there's some coverage of the mathematics underlying public key/private key crypto in the appendix. * A. J.
Menezes Menezes, sometimes Meneses, was originally a Portuguese toponymic surname which originated in Montes Torozos, a region in Tierra de Campos, northeast of Valladolid and southeast of Palencia. The ancestor of the Meneses lineage was Tello Pérez de ...
, P. C. van Oorschot, and S. A. Vanstone (1996) ''Handbook of Applied Cryptography'' . Equivalent to ''Applied Cryptography'' in many ways, but somewhat more mathematical. For the technically inclined. Covers few meta-cryptographic topics, such as
crypto system In cryptography, a cryptosystem is a suite of cryptographic algorithms needed to implement a particular security service, such as confidentiality (encryption). Typically, a cryptosystem consists of three algorithms: one for key generation, one f ...
design. This is currently (2004) regarded as the standard reference work in technical cryptography. * Paar, Christof and Jan Pelzl (2009). ''Understanding Cryptography: A Textbook for Students and Practitioners'', Springer, . Very accessible introduction to applied cryptography which covers most schemes of practical relevance. The focus is on being a textbook, i.e., it has pedagogical approach, many problems and further reading sections. The main target audience are readers without a background in pure mathematics. * Patterson, Wayne (1987). ''Mathematical Cryptology for Computer Scientists and Mathematicians'', Rowman & Littlefield, * Rosulek, Mike (2018). ''The Joy of Cryptography'' Presents modern cryptography at a level appropriate for undergraduates. * Schneier, Bruce (1996). ''Applied Cryptography'', 2 ed, Wiley, (). Survey of mostly obsolete cryptography with some commentary on 1990s legal environment. Aimed at engineers without mathematical background, including source code for obsolete ciphers. Lacks guidance for choosing cryptographic components and combining them into protocols and engineered systems. Contemporaneously influential on a generation of engineers, hackers, and cryptographers. Supplanted by ''Cryptography Engineering''. * Smart, Nigel (2004). ''Cryptography: An introduction'' . Similar in intent to ''Applied Cryptography'' but less comprehensive. Covers more modern material and is aimed at undergraduates covering topics such as
number theory Number theory (or arithmetic or higher arithmetic in older usage) is a branch of pure mathematics devoted primarily to the study of the integers and integer-valued functions. German mathematician Carl Friedrich Gauss (1777–1855) said, "Mat ...
and
group theory In abstract algebra, group theory studies the algebraic structures known as group (mathematics), groups. The concept of a group is central to abstract algebra: other well-known algebraic structures, such as ring (mathematics), rings, field ...
not generally covered in cryptography books. * Stinson, Douglas (2005). ''Cryptography: Theory and Practice'' . Covers topics in a textbook style but with more mathematical detail than is usual. * Tenzer, Theo (2021): ''SUPER SECRETO – The Third Epoch of Cryptography: Multiple, exponential, quantum-secure and above all, simple and practical Encryption for Everyone'', Norderstedt, . * Young, Adam L. and
Moti Yung Mordechai M. "Moti" Yung is a cryptographer and computer scientist known for his work on cryptovirology and kleptography. Career Yung earned his PhD from Columbia University in 1988 under the supervision of Zvi Galil. In the past, he worked at th ...
(2004). ''Malicious Cryptography: Exposing Cryptovirology,'' , , John Wiley & Sons. Covers topics regarding use of cryptography as an attack tool in systems as was introduced in the 1990s:
Kleptography Kleptography is the study of stealing information securely and subliminally. The term was introduced by Adam Young and Moti Yung in the Proceedings of Advances in Cryptology—Crypto '96.A. Young, M. Yung, "The Dark Side of Black-Box Cryptography ...
which deals with hidden subversion of cryptosystems, and, more generally,
Cryptovirology Cryptovirology refers to the use of cryptography to devise particularly powerful malware, such as ransomware and asymmetric backdoors. Traditionally, cryptography and its applications are defensive in nature, and provide privacy, authentication, ...
which predicted Ransomware in which cryptography is used as a tool to disable computing systems, in a way that is reversible only by the attacker, generally requiring ransom payment(s). * Washington, Lawrence C. (2003). ''Elliptic Curves: Number Theory and Cryptography'' . A book focusing on
elliptic curves In mathematics, an elliptic curve is a smooth, projective, algebraic curve of genus one, on which there is a specified point . An elliptic curve is defined over a field and describes points in , the Cartesian product of with itself. If t ...
, beginning at an undergraduate level (at least for those who have had a course on
abstract algebra In mathematics, more specifically algebra, abstract algebra or modern algebra is the study of algebraic structures. Algebraic structures include group (mathematics), groups, ring (mathematics), rings, field (mathematics), fields, module (mathe ...
), and progressing into much more advanced topics, even at the end touching on
Andrew Wiles Sir Andrew John Wiles (born 11 April 1953) is an English mathematician and a Royal Society Research Professor at the University of Oxford, specializing in number theory. He is best known for proving Fermat's Last Theorem, for which he was awa ...
' proof of the Taniyama–Shimura conjecture which led to the proof of
Fermat's Last Theorem In number theory, Fermat's Last Theorem (sometimes called Fermat's conjecture, especially in older texts) states that no three positive integers , , and satisfy the equation for any integer value of greater than 2. The cases and have been ...
. * Welsh, Dominic (1988). ''Codes and Cryptography'', Oxford University Press, A brief textbook intended for undergraduates. Some coverage of fundamental information theory. Requires some mathematical maturity; is well written, and otherwise accessible.


''The Codebreakers''

From the end of World War II until the early 1980s most aspects of modern cryptography were regarded as the special concern of governments and the military and were protected by custom and, in some cases, by statute. The most significant work to be published on cryptography in this period is undoubtedly David Kahn's ''
The Codebreakers ''The Codebreakers – The Story of Secret Writing'' () is a book by David Kahn, published in 1967, comprehensively chronicling the history of cryptography from ancient Egypt to the time of its writing. The United States government attempted to h ...
'', which was published at a time (mid-1960s) when virtually no information on the modern practice of cryptography was available. Kahn has said that over ninety percent of its content was previously unpublished. The book caused serious concern at the
NSA The National Security Agency (NSA) is a national-level intelligence agency of the United States Department of Defense, under the authority of the Director of National Intelligence (DNI). The NSA is responsible for global monitoring, collecti ...
despite its lack of coverage of specific modern cryptographic practice, so much so that after failing to prevent the book being published, NSA staff were informed to not even acknowledge the existence of the book if asked. In the US military, mere possession of a copy by cryptographic personnel was grounds for some considerable suspicion. Perhaps the single greatest importance of the book was the impact it had on the next generation of cryptographers.
Whitfield Diffie Bailey Whitfield 'Whit' Diffie (born June 5, 1944), ForMemRS, is an American cryptographer and mathematician and one of the pioneers of public-key cryptography along with Martin Hellman and Ralph Merkle. Diffie and Hellman's 1976 paper ''New Dir ...
has made comments in interviews about the effect it had on him.


Cryptographic environment/context or security

* Schneier, Bruce – ''Secrets and Lies'', Wiley, , a discussion of the context within which cryptography and cryptosystems work. ''Practical Cryptography'' also includes some contextual material in the discussion of
crypto system In cryptography, a cryptosystem is a suite of cryptographic algorithms needed to implement a particular security service, such as confidentiality (encryption). Typically, a cryptosystem consists of three algorithms: one for key generation, one f ...
design. * Schneier, Bruce – '' Beyond Fear: Thinking Sensibly About Security in an Uncertain World'', Wiley, * Anderson, Ross – ''Security Engineering'', Wiley,
online version
, advanced coverage of computer security issues, including cryptography. Covers much more than merely cryptography. Brief on most topics due to the breadth of coverage. Well written, especially compared to the usual standard. * Edney, Jon and Arbaugh, William A – ''Real 802.11 Security: Wi-Fi Protected Access and 802.11i'', Addison-Wesley, , covers the use of cryptography in
Wi-Fi Wi-Fi () is a family of wireless network protocols, based on the IEEE 802.11 family of standards, which are commonly used for local area networking of devices and Internet access, allowing nearby digital devices to exchange data by radio wav ...
networks. Includes details on
Wi-Fi Protected Access Wi-Fi Protected Access (WPA), Wi-Fi Protected Access II (WPA2), and Wi-Fi Protected Access 3 (WPA3) are the three security and security certification programs developed after 2000 by the Wi-Fi Alliance to secure wireless computer networks. The All ...
(which is based on the IEEE
802.11i IEEE 802.11i-2004, or 802.11i for short, is an amendment to the original IEEE 802.11, implemented as Wi-Fi Protected Access II (WPA2). The draft standard was ratified on 24 June 2004. This standard specifies security mechanisms for wireless netw ...
specification). The book is slightly out of date as it was written before IEEE 802.11i was finalized but much of the content is still useful for those who want to find out how encryption and authentication is done in a Wi-Fi network.


Declassified works

*Boak, David G.
A History of U.S. Communications Security (Volumes I and II); the David G. Boak Lectures
'' National Security Agency (NSA), 1973, A frank, detailed, and often humorous series of lectures delivered to new NSA hires by a long time insider, largely declassified as of 2015. * Callimahos, Lambros D. and Friedman, William F. Military Cryptanalytics. A (partly) declassified text intended as a training manual for
NSA The National Security Agency (NSA) is a national-level intelligence agency of the United States Department of Defense, under the authority of the Director of National Intelligence (DNI). The NSA is responsible for global monitoring, collecti ...
cryptanalysts. * Friedman, William F.
Six Lectures on Cryptology
National Cryptology School, U.S. National Security Agency, 1965, declassified 1977, 1984 * (How the Japanese Purple cipher was broken, declassified 2001)


History of cryptography

* Bamford, James, ''
The Puzzle Palace ''The Puzzle Palace'' is a book written by James Bamford and published in 1982. It is the first major, popular work devoted entirely to the history and workings of the National Security Agency (NSA), a United States intelligence organization. The ...
: A Report on America's Most Secret Agency'' (1982)(), and the more recent '' Body of Secrets: Anatomy of the Ultra-Secret National Security Agency'' (2001). The first is one of a very few books about the US Government's NSA. The second is also about NSA but concentrates more on its history. There is some very interesting material in ''Body of Secrets'' about US attempts (the
TICOM TICOM (Target Intelligence Committee) was a secret Allied project formed in World War II to find and seize German intelligence assets, particularly in the field of cryptology and signals intelligence. It operated alongside other Western Allied ...
mission) to investigate German cryptographic efforts immediately as WW II wound down. *
Gustave Bertrand Gustave Bertrand (1896–1976) was a French military intelligence officer who made a vital contribution to the decryption, by Poland's Cipher Bureau, of German Enigma ciphers, beginning in December 1932. This achievement would in turn lead to ...
, ''Enigma ou la plus grande énigme de la guerre 1939–1945'' (Enigma: the Greatest Enigma of the War of 1939–1945), Paris, 1973. The first public disclosure in the West of the breaking of Enigma, by the chief of French military cryptography prior to WW II. The first public disclosure anywhere was made in the first edition of ''Bitwa o tajemnice'' by the late Władysław Kozaczuk. * James Gannon, ''Stealing Secrets, Telling Lies: How Spies and Codebreakers Helped Shape the Twentieth Century'', Washington, D.C., Brassey's, 2001: an overview of major 20th-century episodes in
cryptology Cryptography, or cryptology (from grc, , translit=kryptós "hidden, secret"; and ''graphein'', "to write", or ''-logia'', "study", respectively), is the practice and study of techniques for secure communication in the presence of adver ...
and
espionage Espionage, spying, or intelligence gathering is the act of obtaining secret or confidential information (intelligence) from non-disclosed sources or divulging of the same without the permission of the holder of the information for a tangib ...
, particularly strong regarding the misappropriation of credit for conspicuous achievements. * Kahn, David – ''
The Codebreakers ''The Codebreakers – The Story of Secret Writing'' () is a book by David Kahn, published in 1967, comprehensively chronicling the history of cryptography from ancient Egypt to the time of its writing. The United States government attempted to h ...
'' (1967) () A single-volume source for cryptographic history, at least for events up to the mid-'60s (i.e., to just before DES and the public release of asymmetric key cryptography). The added chapter on more recent developments (in the most recent edition) is quite thin. Kahn has written other books and articles on cryptography, and on cryptographic history. They are very highly regarded. * Kozaczuk, Władysław, ''Enigma: How the German Machine Cipher Was Broken, and How It Was Read by the Allies in World War II'', edited and translated by
Christopher Kasparek Christopher Kasparek (born 1945) is a Scottish-born writer of Polish descent who has translated works by numerous authors, including Ignacy Krasicki, Bolesław Prus, Florian Znaniecki, Władysław Tatarkiewicz, Marian Rejewski, and Władysław ...
, Frederick, MD, 1984: a history of cryptological efforts against Enigma, concentrating on the contributions of Polish mathematicians Marian Rejewski,
Jerzy Różycki Jerzy Witold Różycki (; Vilshana, Ukraine, 24 July 1909 – 9 January 1942, Mediterranean Sea, near the Balearic Islands) was a Polish mathematician and cryptologist who worked at breaking German Enigma-machine ciphers before and during World ...
and
Henryk Zygalski Henryk Zygalski (; 15 July 1908 – 30 August 1978) was a Polish mathematician and cryptologist who worked at breaking German Enigma ciphers before and during World War II. Life Zygalski was born on 15 July 1908 in Posen, German Empire (now Pozn ...
; of particular interest to specialists will be several technical appendices by Rejewski. * Levy, Steven – '' Crypto: How the Code Rebels Beat the Government—Saving Privacy in the Digital Age'' (2001) (): a journalistic overview of the development of public cryptographic techniques and the US regulatory context for cryptography. This is an account of a major policy conflict. *
Singh, Simon Simon Lehna Singh, (born 19 September 1964) is a British popular science author, theoretical and particle physicist. His written works include ''Fermat's Last Theorem'' (in the United States titled ''Fermat's Enigma: The Epic Quest to Solve t ...
, '' The Code Book'' (): an anecdotal introduction to the history of cryptography. Covers more recent material than does even the revised edition of Kahn's ''The Codebreakers''. Clearly written and quite readable. The included cryptanalytic contest has been won and the prize awarded, but the cyphertexts are still worth attempting. * Bauer, F L, ''Decrypted Secrets'', This book is unusual. It is both a history of cryptography, and a discussion of mathematical topics related to cryptography. In his review, David Kahn said he thought it the best book he'd read on the subject. It is essentially two books, in more or less alternating chapters. Originally in German, and the translation shows it in places. Some surprising content, e.g., in the discussion of President Edgar Hoover's Secretary of State, Henry Stimson. * Budiansky, Stephen, ''Battle of Wits'': a one-volume history of cryptography in WW II. It is well written, well researched, and responsible. Technical material (e.g., a description of the cryptanalysis of
Enigma Enigma may refer to: *Riddle, someone or something that is mysterious or puzzling Biology *ENIGMA, a class of gene in the LIM domain Computing and technology * Enigma (company), a New York-based data-technology startup * Enigma machine, a family ...
) is limited, but clearly presented. * Budiansky, Stephen, ''Code Warriors: NSA's Codebreakers and the Secret Intelligence War Against the Soviet Union'' (Knopf, 2016). (): A sweeping, in-depth history of NSA, whose famous “cult of silence” has left the agency shrouded in mystery for decades. * Prados, John – ''Combined Fleet Decoded'', An account of cryptography in the Pacific Theatre of World War II with special emphasis on the Japanese side. Reflects extensive research in Japanese sources and recently available US material. Contains material not previously accessible or unavailable. * Marks, Leo, ''Between Silk and Cyanide: a Codemaker's Story, 1941–1945,'' (HarperCollins, 1998). (). A humorous but informative account of code-making and -breaking in Britain's
WWII World War II or the Second World War, often abbreviated as WWII or WW2, was a world war that lasted from 1939 to 1945. It involved the vast majority of the world's countries—including all of the great powers—forming two opposin ...
Special Operations Executive The Special Operations Executive (SOE) was a secret British World War II organisation. It was officially formed on 22 July 1940 under Minister of Economic Warfare Hugh Dalton, from the amalgamation of three existing secret organisations. Its pu ...
. * Mundy, Liza, ''Code Girls,'' (Hachette Books, 2017) () An account of some of the thousands of women recruited for U.S. cryptologic work before and during World War II, including top analysts such as Elizebeth Smith Friedman and Agnes Meyer Driscoll, lesser known but outstanding contributors like Genevieve Grotjan Feinstein and Ann Zeilinger Caracristi, and many others, and how the women made a strategic difference in the war. * Yardley, Herbert, ''The American Black Chamber'' (), a classic 1931 account of American code-breaking during and after
World War I World War I (28 July 1914 11 November 1918), often abbreviated as WWI, was one of the deadliest global conflicts in history. Belligerents included much of Europe, the Russian Empire, the United States, and the Ottoman Empire, with fightin ...
; and ''Chinese Black Chamber: An Adventure in Espionage'' (), about Yardley's work with the Chinese government in the years just before
World War II World War II or the Second World War, often abbreviated as WWII or WW2, was a world war that lasted from 1939 to 1945. It involved the vast majority of the world's countries—including all of the great powers—forming two opposing ...
. Yardley has an enduring reputation for embellishment, and some of the material in these books is less than reliable. ''The American Black Chamber'' was written after the New York operation Yardley ran was shut down by Secretary of State
Henry L. Stimson Henry Lewis Stimson (September 21, 1867 – October 20, 1950) was an American statesman, lawyer, and Republican Party politician. Over his long career, he emerged as a leading figure in U.S. foreign policy by serving in both Republican and D ...
and the US Army, on the grounds that "gentlemen don't read each other's mail".


Historic works

* Abu Yusuf Yaqub ibn Ishaq al-Sabbah Al-Kindi, (A Manuscript on Deciphering Cryptographic Messages), 9th century included first known explanation of frequency analysis cryptanalysis * Michel de Nostredame, (16th century prophet famed since 1555 for prognostications), known widely for his "''Les Propheties''" sets of quatrains composed from four languages into a ciphertext, deciphered in a series called "''Rise to Consciousness''" (Deschausses, M., Outskirts Press, Denver, CO, Nov 2008). * Roger Bacon (English friar and polymath), ''Epistle on the secret Works of Art and Nullity of Magic'', 13th century, possibly the first European work on cryptography since Classical times, written in Latin and not widely available then or now * Johannes Trithemius, ''Steganographia'' ("Hidden Writing"), written ca. 1499; pub 1606, banned by the Catholic Church 1609 as alleged discussion of
magic Magic or Magick most commonly refers to: * Magic (supernatural), beliefs and actions employed to influence supernatural beings and forces * Ceremonial magic, encompasses a wide variety of rituals of magic * Magical thinking, the belief that unrela ...
, see Polygraphiae (below). * Johannes Trithemius, ''Polygraphiae Libri Sex'' ("Six Books on Polygraphy"), 1518, first printed book on cryptography (thought to really be about magic by some observers at the time) *
Giovan Battista Bellaso Giovan Battista Bellaso (Brescia 1505–...) was an Italian cryptologist. The Vigenère cipher is named after Blaise de Vigenère, although Giovan Battista Bellaso had invented it before Vigenère described his autokey cipher. Biography Bellaso ...
, ''La cifra del. Sig. Giovan Battista Bellaso'', 1553, first pub of the cypher widely misattributed to Vigenère. *
Giambattista della Porta Giambattista della Porta (; 1535 – 4 February 1615), also known as Giovanni Battista Della Porta, was an Italian scholar, polymath and playwright who lived in Naples at the time of the Renaissance, Scientific Revolution and Reformation. Giamb ...
, ''
De Furtivis Literarum Notis ''De Furtivis Literarum Notis'' (''On the Secret Symbols of Letters'') is a 1563 book on cryptography written by Giambattista della Porta. The book includes three sets of cypher discs for coding and decoding messages and a substitution cipher imp ...
'' ("On concealed characters in writing"), 1563. *
Blaise de Vigenère Blaise de Vigenère (5 April 1523 – 19 February 1596) () was a French diplomat, cryptographer, translator and alchemist. Biography Vigenère was born into a respectable family in the village of Saint-Pourçain. His mother, Jean, arrang ...
, ''Traicte de Chiffres'', 1585. *
Gustavus Selenus Gustavus may refer to: *Gustavus, Alaska, a small community located on the edge of Glacier Bay National Park and Preserve *Gustavus Adolphus College, a private liberal arts college in southern Minnesota *Gustavus (name), a given name **Gustavus, the ...
, ''Cryptomenytics'', 1624, (modern era English trans by J W H Walden) *
John Wilkins John Wilkins, (14 February 1614 – 19 November 1672) was an Anglican clergyman, natural philosopher, and author, and was one of the founders of the Royal Society. He was Bishop of Chester from 1668 until his death. Wilkins is one of the f ...
, ''Mercury'', 1647, earliest printed book in English about cryptography *
Johann Ludwig Klüber Johann Ludwig Klüber (10 November 1762, Tann, near Fulda - 16 February 1837, Frankfurt am Main) was a German law professor, author and state official. Biography He was professor of law at the University of Erlangen (1786-1804), privat-referenda ...
, '' Kryptographik Lehrbuch der Geheimschreibekunst'' ("Cryptology: Instruction Book on the Art of Secret Writing"), 1809. *
Friedrich Kasiski Major Friedrich Wilhelm Kasiski (29 November 1805 – 22 May 1881) was a German infantry officer, cryptographer and archeologist. Kasiski was born in Schlochau, Kingdom of Prussia (now Człuchów, Poland). Military service Kasiski enlisted in ...
, ''Die Geheimschriften und die Dechiffrierkunst'' ("Secret writing and the Art of Deciphering"), pub 1863, contained the first public description of a technique for cryptanalyzing polyalphabetic cyphers. * Etienne Bazeries, ''Les Chiffres secrets dévoilés'' ("Secret ciphers unveiled") about 1900. * Émile Victor Théodore Myszkowski, '' Cryptographie indéchiffrable: basée sur de nouvelles combinaisons rationelles'' ("Unbreakable cryptography"), published 1902. *
William F. Friedman William Frederick Friedman (September 24, 1891 – November 12, 1969) was a US Army cryptographer who ran the research division of the Army's Signal Intelligence Service (SIS) in the 1930s, and parts of its follow-on services into the 1950s. ...
and others, the Riverbank Publications, a series of pamphlets written during and after World War I that are considered seminal to modern cryptanalysis, including no. 22 on the
Index of Coincidence In cryptography, coincidence counting is the technique (invented by William F. Friedman) of putting two texts side-by-side and counting the number of times that identical letters appear in the same position in both texts. This count, either as a r ...
.


Fiction

* Neal Stephenson – ''
Cryptonomicon ''Cryptonomicon'' is a 1999 novel by American author Neal Stephenson, set in two different time periods. One group of characters are World War II-era Allied codebreakers and tactical-deception operatives affiliated with the Government Code an ...
'' (1999) () The adventures of some
World War II World War II or the Second World War, often abbreviated as WWII or WW2, was a world war that lasted from 1939 to 1945. It involved the vast majority of the world's countries—including all of the great powers—forming two opposing ...
codebreakers Cryptanalysis (from the Greek language, Greek ''kryptós'', "hidden", and ''analýein'', "to analyze") refers to the process of analyzing information systems in order to understand hidden aspects of the systems. Cryptanalysis is used to breach C ...
and their modern-day progeny. *
Edgar Allan Poe Edgar Allan Poe (; Edgar Poe; January 19, 1809 – October 7, 1849) was an American writer, poet, editor, and literary critic. Poe is best known for his poetry and short stories, particularly his tales of mystery and the macabre. He is wid ...
– "
The Gold-Bug "The Gold-Bug" is a short story by American writer Edgar Allan Poe published in 1843. The plot follows William Legrand, who was bitten by a gold-colored bug. His servant Jupiter fears that Legrand is going insane and goes to Legrand's friend, an ...
" (1843) An eccentric man discovers an ancient parchment which contains a cryptogram which, when solved, leads to the discovery of buried treasure. Includes a lengthy discourse on a method of solving a simple cypher. *
Sir Arthur Conan Doyle Sir Arthur Ignatius Conan Doyle (22 May 1859 – 7 July 1930) was a British writer and physician. He created the character Sherlock Holmes in 1887 for '' A Study in Scarlet'', the first of four novels and fifty-six short stories about Ho ...
– ''The Dancing Men''. Holmes becomes involved in a case which features messages left lying around. They are written in a substitution cypher, which Holmes promptly discerns. Solving the cypher leads to solving the case. *
Ken Follett Kenneth Martin Follett, (born 5 June 1949) is a British author of thrillers and historical novels who has sold more than 160 million copies of his works. Many of his books have achieved high ranking on best seller lists. For example, in the ...
– ''The Key to Rebecca'' (1980), World War II spy novel whose plot revolves around the heroes' efforts to cryptanalyze a
book cipher A book cipher, or Ottendorf cipher, is a cipher in which the key is some aspect of a book or other piece of text. Books, being common and widely available in modern times, are more convenient for this use than objects made specifically for crypto ...
with time running out. *
Clifford B. Hicks Clifford B. Hicks (August 10, 1920 – September 29, 2010) was an American writer and magazine editor, best known for his children's books chronicling the adventures of Alvin Fernald. Biography Hicks was born in Marshalltown, Iowa in 1920."Hicks, ...
– ''Alvin's Secret Code'' (1963), a children's novel which introduces some basics of cryptography and cryptanalysis. * Robert Harris – ''
Enigma Enigma may refer to: *Riddle, someone or something that is mysterious or puzzling Biology *ENIGMA, a class of gene in the LIM domain Computing and technology * Enigma (company), a New York-based data-technology startup * Enigma machine, a family ...
'' (1995) () Novel partly set in Britain's
World War II World War II or the Second World War, often abbreviated as WWII or WW2, was a world war that lasted from 1939 to 1945. It involved the vast majority of the world's countries—including all of the great powers—forming two opposing ...
codebreaking centre at
Bletchley Park Bletchley Park is an English country house and estate in Bletchley, Milton Keynes ( Buckinghamshire) that became the principal centre of Allied code-breaking during the Second World War. The mansion was constructed during the years followin ...
. *Ari Juels – ''Tetraktys'' (2009) () Pits a classicist turned cryptographer against an ancient Pythagorean cult. Written by RSA Labs chief scientist. *
Dan Brown Daniel Gerhard Brown (born June 22, 1964) is an American author best known for his thriller novels, including the Robert Langdon novels ''Angels & Demons'' (2000), '' The Da Vinci Code'' (2003), ''The Lost Symbol'' (2009), '' Inferno'' (2013), ...
- ''
Digital Fortress ''Digital Fortress'' is a techno-thriller novel written by American author Dan Brown and published in 1998 by St. Martin's Press. The book explores the theme of government surveillance of electronically stored information on the private lives of ...
'' (1998), a thriller takes a plunge into the NSA's cryptology wing giving the readers a modern and technology oriented view of the codebreaking in vogue. *Max Hernandez - '' Thieves Emporium'' (2013), a novel that examines how the world will change if cryptography makes fully bi-directional anonymous communications possible. A technically accurate document, it shows the effects of crypto from the citizen's standpoint rather than the NSA. *
Barry Eisler Barry Mark Eisler (born 1964) is a best-selling American novelist. He is the author of two thriller series, the first featuring anti-hero John Rain, a half-Japanese, half-American former soldier turned freelance assassin, and a second featurin ...
, ''
Fault Line In geology, a fault is a planar fracture or discontinuity in a volume of rock across which there has been significant displacement as a result of rock-mass movements. Large faults within Earth's crust result from the action of plate tectonic ...
'' (2009) . A thriller about a race to nab software (of the
cryptovirology Cryptovirology refers to the use of cryptography to devise particularly powerful malware, such as ransomware and asymmetric backdoors. Traditionally, cryptography and its applications are defensive in nature, and provide privacy, authentication, ...
type) which is capable of shutting down cyberspace.


References


External links


Listing and reviews for a large number of books in cryptography


The list is in English. * ttp://www.staff.uni-mainz.de/pommeren/Kryptologie/Klassisch/0_Unterhaltung/Lit/ List of where cryptography features in literature— list is presented in
German German(s) may refer to: * Germany (of or related to) ** Germania (historical use) * Germans, citizens of Germany, people of German ancestry, or native speakers of the German language ** For citizens of Germany, see also German nationality law **Ge ...
. It draws on the English list above. {{DEFAULTSORT:Cryptography Lists of books * Computer security books Cryptography lists and comparisons Communications bibliographies