Home :: Books :: Computers & Internet  

Arts & Photography
Audio CDs
Audiocassettes
Biographies & Memoirs
Business & Investing
Children's Books
Christianity
Comics & Graphic Novels
Computers & Internet

Cooking, Food & Wine
Entertainment
Gay & Lesbian
Health, Mind & Body
History
Home & Garden
Horror
Literature & Fiction
Mystery & Thrillers
Nonfiction
Outdoors & Nature
Parenting & Families
Professional & Technical
Reference
Religion & Spirituality
Romance
Science
Science Fiction & Fantasy
Sports
Teens
Travel
Women's Fiction
The Code Book : The Evolution Of Secrecy From Mary, To Queen Of Scots To Quantum Crytography

The Code Book : The Evolution Of Secrecy From Mary, To Queen Of Scots To Quantum Crytography

List Price: $24.95
Your Price: $17.47
Product Info Reviews

<< 1 2 3 4 .. 21 >>

Rating: 4 stars
Summary: Terrific History of Cryptography!
Review: I found The Code Book an extremely interesting and informative read. I think Singh did a phenomenal job at bringing together the numerous length of history and presenting it to the common reader in a easy, readable fashion. I am impressed once again at Singhs' ability to create such a organized and clear work like he accomplished in Fermats' Enigma. I knew nothing of cryptography before reading The Code Book, but now I know not only the history, but many techniques of encoding and decrypting as well. The figures behind the process were equally fascinating and I found out about many people that I previously knew nothing about. I found the explanations behind Mary Queen of Scots, the Enigma, the Navajo code, Bletchly Park, RSA, and quantum cryptography to be both intriguing and educational. I would highly recommend this book.

Rating: 5 stars
Summary: A great read and a little more than just codes
Review: Mr. Singh traces the history of cryptography from its recorded inception in roman times up through current applications. While all of the chapters held my interest it was Mr. Singh's work in chapters 4 through 6 that I feel deserve particular note.

Chapter 4 deals with the war effort at Bletchley Park and the work on the Engima machine. Here Mr.Singh adds an additional dimension by providing some insight into the work of Alan Turning, the development of Colossus, the first (now reported) electronic programmable computer and the unrecognized cryptanalysts who broke Ultra and the other codes of WWII. Chapter 6 brings us up to present day cryptographic issues from RSA and PGP to philosophical issues of personal privacy in modern society with web centric commerce and online book reviews. At each step in the process Singh successfully combines the elements of a technical treatise with a human values and features. For those wanting to go a little further under the hood and look at the processes and algorithms in some of the codes mentioned in the text, several appendices at the end of the book should fill that yearning. I found the book informative and enjoyable to read.

Rating: 5 stars
Summary: GREG GOEBEL WAS RIGHT!
Review: I was looking at this book based on the subject; but, Greg Goebel's review made me want to buy it. I've since read it. I could comment on all of the details of how great this book is but, Goebel said it first and correctly. If you're not sure you want to splurge the extra money, read his review and know it's the truth.

Rating: 5 stars
Summary: Outstanding Introduction To Cryptology
Review: * Simon Singh's THE CODE BOOK is an introduction to the science
of cryptology -- ciphers, codes, and codebreaking -- for the
intelligent layperson. It begins by defining elementary concepts
in the field; outlines the history of the field up to the World
War I; and then goes on to focus on specific important topics
in the field, including the breaking of the German ENIGMA cipher
machine in World War II; the cracking of Egyptian hieroglyphics
and Cretan Linear B; public-key cryptography; the controversy
over the Pretty Good Privacy encryption software package; and,
finally, quantum cryptology.

This may sound like a collection of stories, but actually the
result is a nice smooth narrative that takes the reader through
the mainstream evolution of cryptology. While it is clearly
not intended for a cryptology professional, it still has plenty
of substance, while being outstandingly readable. This is not
to say that the reader doesn't have to think things over

painfully at times, but that's the nature of the thing.

I think some Yank crypto hobbyists might be offended that the
book largely ignores US cryptology efforts during WW II, but THE
CODE BOOK does not seem to have any strong "Union Jack" bias
(Mr. Singh is a Londoner), and I think he just chose to ignore
that topic because it is so well discussed in the classic
popular book on cryptology, David Kahn's THE CODEBREAKERS. For
example, Mr. Singh does talk about the American use of the
Navaho "code-talkers" during WW II.

Incidentally, for those readers familiar with THE CODEBREAKERS,
THE CODE BOOK compares favorably. THE CODE BOOK is shorter and
much less detailed, but while Mr. Kahn is a generally competent
writer, Mr. Singh is an outstanding one, and his handle on
technology much better than Mr. Kahn's.

The only technical issue I might take with Mr. Singh is that
his explanation of why the one-time-pad cipher cannot be
cracked analytically is, if not actually wrong as such,
confuses an effect for a cause. However, this is not much more
than a minor difference of opinion and certainly no fatal flaw,
and if it's the worst complaint I have, then I have to admit
I have very little to complain about.

I have written up and assembled notes on this book and a few
other works in cryptology. Those curious about learning more
before investing in a book might drop me a line.

Rating: 5 stars
Summary: Excellent account of history of encryption
Review: I read this book few months back. Truly amazed at this book. Infact, I have bought his other book on Fermat's Last Theorem and currently reading it.

Getting to the Code Book, I find it amazing to believe that the author has performed a thorough research on history of encryption before writing this book.

It was surprising for me to learn that Kama-Sutra has references to encryption!

It was equally surprising to learn that Arabs were inventors of a technique called frequency analysis to deciphers text messages.

The flow of the book is logical and provoking. And it provides fundamental information, needed for good knowledge on the subject. Certainly modern day CTO's need to go through this book.

The author has touched on all aspects of encryption - its progression from the Egyptian civilization many thousand years ago to current breakthrough's in Quantum computing. His account of competition between code-makers and code-breakers is interesting and informative.

Now, I am beginning to be skeptical about RSA's encryption. One just do not know which agency has broken it.

It will be indeed interesting to watch the competition between code-makers and code-breakers when quantum computing makes it possible for powerful encryption as well as breaking techniques.

Rating: 4 stars
Summary: History and Geek stuff blended
Review: Fasinating. I've lent this book to several dubious reader and they have never stopped thanking me for this fasinating account. I've referred back to it several times. The chapters are mostly independent although the codes do build upon on another at times.

Among my history buff friend< I can often dazzle them with stories from this book.

Read it.

Rating: 5 stars
Summary: OUTSTANDING INTRODUCTION TO CODES AND BREAKING THEM
Review: Simon Singh has written an outstanding introduction into cryptology (the science of codes, ciphers and decoding and decyphering). This is a book aimed at the layperson who has some interest in mathematics and linguistics. He mixes the science behind codes and cyphers with a stronhg dose of history, which puts the amazing achievements in this science in the context of changing human history.

The history in the book ranges from Roman codes through the middle ages and finally arriving to the 2nd world war and the Enigma machine. Not only is the history told in great detail, but also with some attention the reader understands exactly the process that was taken to arrive at the cyphers and their breaking. An addition portion of history told is that of the decyphering of hieroglyphics and Linear B, ancient forms of writing on which some of the tools of cryptology (especially mathematics and linguistics) were used.

Simon Singh uses a formula similar to the one he uses in Fermat's Enigma (another outstanding book for amateur mathematicians): he tells a story on a subject that is tremendously complex, but makes it simple enough so that someone who is dedicated to understanding it can at least grasp the main concepts.

This is a great book for amateur mathematicians, statisticians and linguists. It is also a great portion of our history that is seldom heard of. I highly recommend it as one of the best page turners I have read in a while.

Rating: 5 stars
Summary: Stellar book, even for the non-technical sort
Review: This book had me captured from the very first pages dealing with the crytographic intrigues during the trial of Mary Queen of Scots. From Egypt to Mary Queen of Scots to present day public key cryptography to future quantum concepts, Simon Singh offers a typewritten drama unparalleled by many novels. The historical aspects of cryptography set together with the technical details offer the charm of a story and the depth of a dissertation. Singh has a terrific historical voice, and his explanations of even technical crytographic concepts strike home in remarkably resonant ways. This is hands-down the best explanation of cryptography I've even come close to seeing - it's just that good.

Rating: 5 stars
Summary: Mathematical knowledge can be critical for survival
Review: Cryptography does not involve large numbers of men hacking each other to pieces with swords and spears or blowing each other to bits with powder and shot. Furthermore, the most significant achievements in cryptography are often covered in layers of government secrecy that take decades to be removed. Therefore, very few know how great a role it has played in the resolution of armed conflict. Singh lays out the history of cryptography, explaining the basics of the various codes while listing where they were used.
Without question, the expertise of small numbers of code breakers has dramatically altered the course of history. The famous Zimmerman note from a German diplomat to the leadership of Mexico during World War I offered German support for Mexico reclaiming the American southwest if Mexico would declare war on the United States. The anger that it engendered in the U. S. swept away the last isolationist sentiment and precipitated U. S. entry into World War I. It was encrypted before being sent, but the code was cracked by the British, who then made the contents public.
The incredible expertise of the British code breakers in cracking German codes in World War II may have been the difference in keeping Britain fighting during those dark days when she stood essentially alone against the mighty German military. In fact, many technical historians argue that the person most responsible for Britain surviving the German onslaught was not Winston Churchill, but the chief code breaker, Alan Turing. Turing's group was able to break the German military codes, thought to be unbreakable by the Germans, and the British were then able to concentrate their forces where the threats were greatest. So accurate was the British intelligence that one of their greatest problems was deciding when not to use it so that the Germans would not learn that they were reading the messages.
In one of the most interesting stories in the book, Ian Fleming, the creator of the fictional super-spy James Bond, devised a scheme whereby the British would crash a German plane near a German ship. The British crew of the plane would then bail out and capture the German ship, capturing all the code books. The plan was ultimately scrapped, to the disappointment of Turing and his group.
The cast of characters who have been significant in the advancement of cryptography contains some very unusual people. This is best summed up by the comment Winston Churchill made to the head of the Secret Intelligence Service when he visited the code breakers at Bletchley, "I told you to leave no stone unturned, but I didn't expect you to take me so literally." Some of the pictures in the book also reinforce this view. Nevertheless, they were brilliant people, and you learn how they were able to literally conquer incredible odds. Most started with situations where the number of possibilities was astronomical, and yet with ingenuity, persistence, luck and occasionally dirt tricks, they were able to reduce the numbers down to a level where it was possible to find a solution.
This is a superb popular history of cryptography, written at a level that everyone can understand and shows a history of human conflict that is often deeply hidden from view. It also demonstrates how critical mathematical knowledge can be in the life of a nation.

Published in the recreational mathematics e-mail newsletter, reprinted with permission.

Rating: 4 stars
Summary: Very Entertaining and Informative
Review: This is the only book on cryptography I have read so I haven't much to compare it to. It was written in a rather light style (maybe too light at certain times) but maintained a steady pace. I was particularly interested in Singh's chapter on modern public key cryptography and the discovery that assymetrical functions could be used as encryption/decryption keys. A good book that's easy to understand throughout.


<< 1 2 3 4 .. 21 >>

© 2004, ReviewFocus or its affiliates