[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

A Crypto Biblio



    number 006            CLACKER'S DIGEST           December 6, 1992. 
           philosophy and applications for analytical engines    
    ------------------------------------------------------------------
    (46 lines)  A Cryptography Bibliography by [email protected]
    
    (Technically, cryptography is MAKING codes while cryptanalysis is 
    BREAKING them.  Both are subsumed under cryptology.  A CIPHER is 
    a regular transposition such as A=Z, B=Y, etc., while a CODE is a 
    table of arbitrary symbols.)
    Kahn, David, THE CODEBREAKERS, MacMillan, 1967.  The MOST 
      complete history with specific examples.  Written before public 
      keys, RSA, etc., but still THE place to start. 
    Marotta, Michael, THE CODE BOOK, Loompanics, 1987, Overview of 
      history and post-1967 developments. 
    Sinkov, Abraham, ELEMENTARY CRYPTANALYSIS: A MATHEMATICAL 
      APPROACH, Random House, 1968.  Sinkov worked for Friedman on the 
      breaking of Purple.  First rate. 
    Gaines, Helen Fouche, CRYPTANALYSIS, Dover, 1956. A classic 
      work.  The first step to breaking codes and ciphers. 
    Lysing, Henry, SECRET WRITING, Dover, 1974.  Another reprint of 
      another classic. 
    Smith, Laurence Dwight, CRYPTOGRAPHY, Dover, 1955.  Ditto. 
    Konheim, Alan G., CRYPTOGRAPHY: A PRIMER, John Wiley, 1981.
      Textbook for mathematicians from IBM's Watson Center. Includes 
      public keys, digital signatures. 
    Meyer, Carl H., and Matyas Stephen M., CRYPTOGRAPHY, John Wiley, 
      1982. From IBM Cryptography Competency Center.  For computers,
      includes public keys, digital signatures. 
    Weber, Ralph E., UNITED STATES DIPLOMATIC CODES AND CIPHERS 1775-
      1938, Precedent, 1979.  Not just a history!  The appendix 
      contains the all the keys!! 
    Chadwick, THE DECIPHERMENT OF LINEAR B, Vintage, 1958. Worked with 
      Michael Ventris on unraveling Minoan script.
    Yardley, Herbert O., THE AMERICAN BLACK CHAMBER, Ballantine 1981, 
    Random House, 1931.  Yardley broke German ciphers in WWI and then 
    Japanese ciphers of 1920, and was fired in 1931 because "Gentlemen 
    don't read each other's mail." 
    (anonymous), THE DATA ENCRYPTION STANDARD,  National Bureau of 
      Standards, January 1977, NTIS NBS-FIPS PUB 46. 
    (anonymous), DATA SECURITY AND THE DATA ENCRYPTION STANDARD, 
    National Bureau of Standards, 1978, Pub 500-27; CODEN: XNBSAV. 
    Rivest, Ronald L., Shamir, A., and Adleman, L., "A Method for 
      Obtaining Digital Signatures and Public-key Cryptosystems," 
      COMMUNICATIONS OF THE ACM, February, 1979.  The last word. 
    -------------------------- 30 ------------------------------------