Mason, Simon. Secret Signals: The Euronumbers Mystery. Lake Geneva, WI: Tiare Publications, 1992.
Surveillant 2.4: "[M]ystery stations sending out coded numbers night and day, all over the shortwave radio bands."
McGinnis, George P. The Collective Works of Captain George P. McGinnis. Pensacola, FL: Naval Cryptologic Veterans Association, 2007.
Christensen, Cryptologia 32.1 (Jan. 2008), notes that much of what is here originally appeared in CRYPTOLOG. It "consists of 105 articles and 102 book reviews." These are mostly stories about people, not about operational matters.
Mendelson, Kenneth A., Stephen T. Walker, and Joan D. Winston. "The Evolution of Recent Cryptographic Policy in the United States." Cryptologia 22, no. 3 (Jul. 1998): 193-210.
Miller, David W. "Cryptanalysis Reexplored." International Journal of Intelligence and Counterintelligence 1, no. 2 (1986): 136-144.
Mollin, Richard A. Codes: The Guide to Secrecy from Ancient to Modern Times. Boca Raton, FL: Chapan & Hall/CRC, 2005.
Kruh, Cryptologia 30.1 (Jan. 2006), calls this "an excellent book with unique features."
Moore, Dan T., and Martha Waller. Cloak and Cipher. Indianapolis, IN: Bobbs-Merrill, 1962. London: Harrap, 1965.
Constantinides: This is an "introduction to cryptography and cryptanalysis," but also includes material on secret writing and other concealment forms. The authors give "historical examples and anecdotes that illustrate uses, misuses, successes, and failures of cryptology." The book suffers from being pre-Ultra.
Mrayati, Mohamad, Yahya Meer Alam, and H. Hassan at-Tayyan, eds. Al-Kindi's Treatise on Cryptanalysis. Volume One of Series, Arabic Origins of Cryptology. Riyadh, Saudi Arabia: King Faisal Center for Research and Islamic Studies, 2003.
Kruh, Cryptologia 28.1, says that this work presents "the text of the oldest known manuscript in the world on cryptanalysis and offers a commentary by the editors on it." This is a "breakthrough discovery, excellent translation and invaluable contribution to the history of cryptology."
Murphy, Ann, and David Murphy. "The Role of Cryptography in Security for Electronic Commerce." ITB Journal 3 (May 2001): 21-50.
"This paper explores the major security concerns of businesses and users and describes the cryptographic techniques used to reduce such risks."
Norman, Bruce. Secret Warfare: The Battle of Codes and Ciphers. Newton Abbot, UK: David & Charles, 1973. Washington, DC: Acropolis Books, 1974. New York: Sterling, 1989.
According to Constantinides, this book recounts a number of "fairly well-known cases and events.... Norman's enthusiasm for the subject ... was not matched by an equal depth of treatment. There are also errors ... or missing facts on cases dealt with."
Pendergass, J.T. "Cryptanalytic Use of High-Speed Digital Computing Machines." Cryptologia 17, no. 2 (Apr. 1993): 124-147.
See Collin Burke, "An Introduction to an Historic Computer Document: The 1946 Pendergass Report Cryptanalysis and the Digital Computer," Cryptologia 17, no. 2 (Apr. 1993): 113-123.
Pratt, Fletcher. Secret and Urgent: The Story of Codes and Ciphers. Indianapolis, IN: Bobbs-Merrill, 1939. London: Robert Hale, 1939. GardenCity, NY: Blue Ribbon Books, 1942.
This work is beyond datedness, and there is little reason for anyone to read it today. Nevertheless, it was the first serious attempt at a book-length treatment of the history of cryptology until Kahn's The Codebreakers.
Pröse, Michael. Chiffiermaschinen und Entzifferungsgerate im Zweiten Weltkrieg: Technikgeschichte und informatikhistorische Aspekte. [Cipher Machines and Cryptanalytic Apparatuses in the Second World War: Technical History and Informational-Historical Aspects] Munich: Martin Meidenbauer-Verlagsbuchhandlung, 2006.
Kahn, I&NS 23.2 (Apr. 2008), says that this "book will be especially useful to those threading their way through the complexities of wartime encipherments and solutions."
Reynard, Robert. Secret Code Breaker III: A Cryptanalyst's Handbook. Jacksonville Beach, FL: Smith & Daniels Marketing, 1999. [Includes diskette with computer programs for deciphering secret messages.]
According to Kruh, Cryptologia 24.2, "[t]his useful book contains brief highlights of United States cryptologic history, its secret agents and the codes and ciphers they used."
Rubin, Samuel. The Secret Science of Covert Inks. Port Townsend, WA: Loompanics Unlimited, 1987. [Petersen]
Schmeh, Klaus. Die Welt der gehemein Zeichen: Die faszinierende Geschichte de Verschlüsselung. [The World of Secret Signs: The Fascinating History of Enciphering] Herdecke: W3L-Verlag, 2004.
Kahn, I&NS 23.2 (Apr. 2008), comments that this book is "well-illustrated.... Using little mathematics, he rehearses the solution of of the Japanese PURPLE machine, Enigma, and other well known stories, but also talks about 'the underestimated German cryptanalysts.'"
Schneier, Bruce. Applied Cryptography. New York: John Wiley, 1994.
McGinnis, Cryptolog, Spring 1995: "There are two major parts to the book: a layman's view of cryptography explained in such a manner that just about anyone can understand it; and Protocols, Algorithms, and Source Code in the C language. The second part is definitely NOT for the uninitiated.... The book is must reading for every cryptographic center of the world."
Singh, Simon. "A Brief History of Cryptography from Caesar to Bletchley Park." In Colossus: The Secret of Bletchley Park's Codebreaking Computers, eds. B. Jack Copeland, et al., 9-17. Oxford & New York: Oxford University Press, 2006.
Singh, Simon. The Code Book : The Evolution of Secrecy from Mary, Queen of Scots to Quantum Cryptography. New York: Doubleday, 1999. London: Fourth Estate, 1999.
Steury, I&NS 15.4, says that this is "a truly remarkable history of the development of ciphers." The author "introduces some little-known incidents in the history of intelligence and does so in a fresh and interesting way." Unfortunately, "[t]he book is full of errors of fact, each of which is comparatively small, but which, taken together, call into question its general veracity.... [However,] none of the numerous errors it contains amount to a serious distortion of the history of ciphers."
Although he is bothered by the absence of footnotes, Kruh, Cryptologia 24.2, notes that the author combines "a storyteller's sense of drama with a scientist's ... appreciation for clear mathematical descriptions.... Singh offers an interesting, illustrated and up-to-date history of cryptology." Booklist, 1 Sep. 1999, finds that the author mixes "nicely balanced technical detail with vibrant storytelling." For Cohen, FA 78.6 (Nov.-Dec. 1999), the author "has done an excellent (and blessedly concise) job of retelling the history of code writing.... [H]e should be particularly commended for the book's graphics, which help explain ideas otherwise too abstruse for the lay reader."
1. Elementary Cryptanalysis. New York: Singer, 1968.
This is regarded as a classic work in the field of cryptology.
2. Elementary Cryptanalysis: A Mathematical Approach. 2d ed. Rev. and updated, Todd Feil. Washington, DC: Mathematical Association of America, 2009.
Christensen, Cryptologia 34.3 (Jul. 2010), finds that "[l]ittle harm" has been done to the original work, "but the added material -- two chapters at the end -- is not truly an update, and an update was not needed."
Smart, Nigel. Cryptography: An Introduction. Maidenhead, UK: McGraw-Hill, 2003.
Kruh, Cryptologia 28.1, calls this "a remarkable book that provides the rigorous detail required for advanced cryptography studies, but approaches the subject matter in an accessible style.... [T]his book is a complete introduction to cryptography."
Smith, Francis O.J. The Secret Corresponding Vocabulary; Adapted for Use to Morse's Electro-Magnetic Telegraph: and Also in Conducting Written Correspondence, Transmitted by the Mails, or Otherwise. Portland, ME: Thurston Ilsley, 1845. [Petersen]
Smith, Laurence D. Cryptography: The Science of Secret Writing. New York: Dover Books, 1955. [Petersen]
Stern, Jacques. La Science du secret. [The Science of Secrecy] Paris: Editions Odile Jacob, 1998.
Kahn, I&NS 23.2 (Apr. 2008), praises this work as "an original, well-organized survey of secret communication.... The work is clear; it is to the point; and it requires only a modicum of mathematical knowledge."
Return to Cryptography Table of Contents