skip to main content
Skip header Section
The Code Book: The Evolution of Secrecy from Mary, Queen of Scots, to Quantum CryptographySeptember 1999
Publisher:
  • Doubleday
  • Div. of Bantam Doubleday Dell Publishing1540 Broadway New York, NY
  • United States
ISBN:978-0-385-49531-8
Published:01 September 1999
Pages:
416
Skip Bibliometrics Section
Bibliometrics
Skip Abstract Section
Abstract

From the Publisher: Codes have decided the fates of empires, countries, and monarchies throughout recorded history. Mary, Queen of Scots was put to death by her cousin, Queen Elizabeth, for the high crime of treason after spymaster Sir Francis Walsingham cracked the secret code she used to communicate with her conspirators. And thus the course of British history was altered by a few sheets of cryptic prose. This is just one link in humankinds evolutionary chain of secret communication, and just one of the fascinating incidents recounted in The Code Book, written by bestselling author Simon Singh. Combining a superb storytellers sense of drama and a scientists appreciation for technical perfection, Singh traces the evolution of secret writing from ancient Greek military espionage to the frontiers of computer science. The result is an epic tale of human ingenuity, with examples that range from the poignant to the peculiar to the world-historical. There is the case of the Beale ciphers, which involves Wild West escapades, a cowboy who amassed a vast fortune, a buried treasure worth $20 million, and a mysterious set of encrypted papers describing its whereabouts—papers that have baffled generations of cryptanalysts and captivated hundreds of treasure hunters. A speedier end to a bloody war was the only reward that could be promised to the Allied code breakers of World Wars I and II, whose selfless contributions altered the course of history; but few of them lived to receive any credit for their top-secret accomplishments. Among the most moving of these stories is that of the World War II British code breaker Alan Turing, who gave up a brilliant career in mathematics todevote himself to the Allied cause, only to end his years punished by the state for his homosexuality, while his heroism was ignored. No less heroic were the Navajo code talkers, who volunteered without hesitation to risk their lives for the Allied forces in the Japanese theater, where they were routinely mistaken for the enemy. Interspersed with these gripping stories are clear mathematical, linguistic, and technological demonstrations of codes, as well as illustrations of the remarkable personalities—many courageous, some villainous, and all obsessive—who wrote and broke them. All roads lead to the present day, in which the possibility of a truly unbreakable code looms large. Singh explores this possibility, and the ramifications of our increasing need for privacy, even as it begins to chafe against the stated mission of the powerful and deeply secretive National Security Agency. Entertaining, compelling, and remarkably far-reaching, this is a book that will forever alter your view of history, what drives it, and how private that e-mail you just sent really is. Included in the book is a worldwide Cipher Challenge—a $15,000 award will be given by the author to the first reader who cracks the code successfully. Progress toward the solution will be tracked on The Code Book website.

Cited By

  1. ACM
    Halpin H SoK Proceedings of the 15th International Conference on Availability, Reliability and Security, (1-6)
  2. Ayub N, Raja M, Saleh S and Ilyas M (2017). MuGKeG, Wireless Personal Communications: An International Journal, 96:3, (4799-4818), Online publication date: 1-Oct-2017.
  3. Brassard G Cryptography in a Quantum World Proceedings of the 42nd International Conference on SOFSEM 2016: Theory and Practice of Computer Science - Volume 9587, (3-16)
  4. ACM
    Mekhaznia T Nature inspired heuristics for attack of simplified DES algorithm Proceedings of the 6th International Conference on Security of Information and Networks, (311-315)
  5. ACM
    van Ditmarsch H, Ghosh S, Verbrugge R and Wang Y Hidden protocols Proceedings of the 13th Conference on Theoretical Aspects of Rationality and Knowledge, (65-74)
  6. ACM
    Naber B Cautionary tales from real world failures for managing security in the cyber world 2010 Information Security Curriculum Development Conference, (117-125)
  7. Schweitzer D and Boleng J (2009). Designing web labs for teaching security concepts, Journal of Computing Sciences in Colleges, 25:2, (39-45), Online publication date: 1-Dec-2009.
  8. Cowan M (2008). Breaking Short Playfair Ciphers with the Simulated Annealing Algorithm, Cryptologia, 32:1, (71-83), Online publication date: 1-Jan-2008.
  9. ACM
    Snyder R Security programming using Python Proceedings of the 4th annual conference on Information security curriculum development, (1-6)
  10. Cantrell G and Dampier D Experiments in hiding data inside the file structure of common office documents Proceedings of the 2004 international symposium on Information and communication technologies, (146-151)
  11. Kleist V (2004). A Transaction Cost Model of Electronic Trust, Electronic Commerce Research, 4:1-2, (41-57), Online publication date: 1-Jan-2004.
  12. Gaj K and Orłowski A Facts and Myths of Enigma Proceedings of the 22nd international conference on Theory and applications of cryptographic techniques, (106-122)
  13. ACM
    Borisov N, Goldberg I and Wagner D Intercepting mobile communications Proceedings of the 7th annual international conference on Mobile computing and networking, (180-189)
Contributors

Recommendations