Home :: Books :: Reference  

Arts & Photography
Audio CDs
Audiocassettes
Biographies & Memoirs
Business & Investing
Children's Books
Christianity
Comics & Graphic Novels
Computers & Internet
Cooking, Food & Wine
Entertainment
Gay & Lesbian
Health, Mind & Body
History
Home & Garden
Horror
Literature & Fiction
Mystery & Thrillers
Nonfiction
Outdoors & Nature
Parenting & Families
Professional & Technical
Reference

Religion & Spirituality
Romance
Science
Science Fiction & Fantasy
Sports
Teens
Travel
Women's Fiction
Codes and Ciphers : Julius Caesar, the ENIGMA, and the Internet

Codes and Ciphers : Julius Caesar, the ENIGMA, and the Internet

List Price: $23.99
Your Price: $23.99
Product Info Reviews

<< 1 >>

Rating: 4 stars
Summary: You learn how some key encryption machines were made
Review: The ability to convert data into a form that is readable only by a selected group has been a matter of utmost importance for thousands of years. The fate of entire nations has rested on the ability of a nation to keep their messages secure or accurately unravel the messages of opponents. The most celebrated cases involve instances of war, where the messages sent by the Germans and Japanese were intercepted and decrypted by the allies. While not decisive in the outcome of the war, the knowledge gained was of enormous value and did a great deal to assist in the victory. By far, the most well known case is that of the Enigma machine used by the Germans in world war two. The British were able to break the code and the knowledge they obtained made a significant difference in the early years of the war.
Encryption is now a foundation pillar of modern society. Trillions of dollars are now electronically exchanged over the course of a year, and the entire world economy is now dependent on the ability of computers to exchange data in a manner that is accurate and secure from fraud. While security over the Internet is the most widely cited example, most of the data is exchanged over private lines.
The first documented case of encryption being used in war is when Julius Caesar used a simple substitution cipher to send orders to his troops. That and all similar codes is where the book begins. After that, there is a very detailed examination of the Enigma and Hagelin machines, right down to how the wheels interact. This part of the book was by far the most interesting, as well as the descriptions of how it was possible for the allied cryptographers to break the Enigma code. It turns out that the breaking of the codes was not due to a flaw in the machine, but in the way it was used. The remaining part of the book is filled with a description of public key cryptography and the applications for the Internet.
The sections on the substitution ciphers and public key cryptography are good but fairly standard. Problems are given at the end of each chapter and solutions are in the back of the book. What makes this book unique is the mechanical descriptions of the Enigma and Hagelin cipher machines. If you are interested only in the mathematics of encryption, then you will most likely not find them interesting. However, if you are like me and are interested in the mechanical aspects of the machines, then you will like it.

Rating: 5 stars
Summary: well written and for all
Review: This is not a schoolbook, yet it takes from the format some usefull features for such a book : you have some worked out examples and a few exercises to practice. After all, math is not something you read like a novel, but rather something you DO! The author understands that.

But the book also has an easy going feel to it and is very clear. Mixed in with the math, you have tidbits of history and general culture mixed in. If you compare it to a very good book out there (the code book by Singh), you find out more about the codes and the mechanics of them in this book.

good read!


<< 1 >>

© 2004, ReviewFocus or its affiliates