Rating: Summary: A great read! Review: Simon Singh has put out another masterpiece. The Code Book.This is a must read for everyone, from a casual reader, to one who digs mystery novels. Singh puts the entire science of codes into one book. He covers the ancient start of codes and travels into the future, where quatum computers will make and break codes. Simon has a way of writing that makes you want to read on, even if it covers a subject that might seem a little dull. To read this, a background in math or cryptology isn't needed. All you need to know is english. And since you are reading this review, you must know it, so you can read this book! So go onward...click buy...and enjoy!
Rating: Summary: Excellent Primer on Code, Cipher & the Future of Privacy Review: This book was far better than I imagined it would be. Singh (the author) discusses the use/importance of code and cipher throught the ages by using historical events to illustrate the importance of secure communication. In several of his examples, security breaches affected the course of history (e.g. outcome of WWII; fate of Mary, Queen of Scots). I'm not what you would call a "math person." Regardless, I was still able to enjoy this book. Singh is wonderful at explaining complex processes in steps and illustrations we all can understand. For example, instead of launching into a discussion about the algorithms associated with authentication and encryption schemes, Singh first tells you to picture a metal box affixed with several locks. I found each of his examples are relevant, clever, and helpful. For those in the security trade, this is an invaluable book, as it explains the "why" behind the "how" with regard to information security. (Ever wonder what RSA stands for? Thought about how our national standards for bit encryption came about? This book will explain.) Highly recommended to security-saavy persons, puzzle lovers, or anyone interested in history. Excellent!
Rating: Summary: The code book Review: This in an excellent book that shows how messages were written, sent and intercepted through different ages, what were the implications of being/not being able to decipher them and what is the latest in security. It is fascinating and you can't put it down. The only thing to be aware of is that for the last third of the book you must at least like computers.
Rating: Summary: The Future of Our Privacy Review: We now live in the Age of Information. The protection of information transmission from interception and use by unintended recipients might be the most important issue during our lifetimes. This book tells us where we were, where we are, and where we are going with the protection of information. The history of encryption of information has been the history of code makers and code breakers fighting to get the upper hand. We explore the Caesar shift and the Vigenère square to RSA encryption and quantum cryptography. Monoalphabetic substitution ciphers are rather easily deciphered using frequency analysis of the most often used letters of the plaintext language. Polyalphabetic ciphers such as the Vigenère square require longer text to break, but eventually the keyword is discernable and the rest of the message is decipherable. Although the onetime pad cipher is absolutely secure, it suffers from a practical and logistical problem of random key generation and key distribution. The German Enigma machine of WWII provides an example of mechanized machine encryption. This inspired the Allies to construct the first programmable computer in 1943, named Colossus. It is interesting to note that the very machine that would be the first computer of the Information Age was itself created to decrypt information. Presently, our data transactions can be protected with a system of asymmetric cryptography, known as RSA, also known as a form of public key cryptography. With a sufficiently large number derived from the factor of two prime numbers, RSA is presently impregnable. Thanks to Phil Zimmermann, in 1991 his program incorporating RSA and called Pretty Good Privacy, or PGP, was posted on the internet as freeware. We can now encrypt messages and send digital signatures using certification authorities with a high degree of security. The greatest threat to our privacy seems to be from our own government restricting or weakening the use of encryption. This is where policy questions and politics becomes an issue. Do we side with privacy of individuals? Or do we side with law enforcement? According to the author, whatever the decision today, it can be changed tomorrow to accommodate changing circumstances. Personally, I prefer not to give up any privacy rights at any time. Restoring rights to citizens once those rights are surrendered is probably as difficult a task as repealing the income tax laws. If I am not mistaken, the U.S. federal income tax was proposed as a temporary measure for generating government revenue in 1918. The holy grail of cryptography is quantum cryptography. Although quantum computers and quantum cryptography are only theoretical ideas, if quantum cryptography becomes a reality, then a truly unbreakable system of encryption would exist.
Rating: Summary: My favorite book in the last 10 years Review: I really can't remember enjoying a book more than this one, if I have, it's been years. I have seen Simon Singh's production of "Fermat's Last Theorem" on PBS as well. I'm convinced that Mr. Singh is a genius at conveying difficult information to the masses. May his writing career be a long one. I look forward to anything else he writes, whether it be a book or a television show. Simon Singh has a special gift, the gift of being able to explain what could easily be a dry and boring subject. Some of the cryptography in the book is technical and complicated, but he always manages to simplify it to a reasonable level without losing what is special about it. You end up completely understanding the methods used to break each of the progressively more difficult codes. I loved the inclusion of people's notes, original paintings and photographs too. There are photos of the original Linear B tablets and tables of different characters, the Rosetta stone, the original Enigma machine and the designer and all of the code breakers. While reading it, you think of the photos as an aside, I realized near the end that it is a spectacular collection (and selection) of photos. I promise you, if you have even the remotest interest in the subject of codes and code breaking, you'll love this book.
Rating: Summary: FUN AND READABLE BUT A LITTLE ANNOYING Review: So OK, I'm one of those people that has to read the book all the way through. I can't stop reading something once I've started because then it would be like some kind of defeat or something. And with this book I had gotten into a big discussion with my brother about whether I would really read it or if I was just clicking away on Amazon at things that I might like but wasn't really, really interested in. So I had something to prove. The upshot is that I wanted to stop reading this book but I couldn't, so it started to annoy me. I liked the subject a lot and I think the author's style was very accessible, his writing was "readable", as they say. What annoyed me unfortunately was his enthusiasm. At times he would strive to point out what geniuses these guys were and how their contribution changed the course of history and how cryptography is this great unheralded scientific and cultural discipline. Alright already, I get it. It's all so amazing. Got it. I can see that the men and women that made great strides in cryptography had minds that worked in "special" ways. I enjoyed hearing the stories. It just got old in the end and the world of cryptography started to seem less like spies and covert-Op's and more like a Trekkie convention.
Rating: Summary: History and Theory of Code-making and Breaking Review: Mr. Singh has managed again to tell an enthralling tale not just of the history of codes, but of the evolution of code theory and how they have grown together over the past thousand years. This is an extremely well-written text that focuses not just on the history of code making or the theory behind it, but tells both stories at once in a lively and engrossing manner. This book is a true page turner, not just because it is so interesting, but also because it is so educational. The book is laid out in four basic sections, codes before machines, codes with machines before computers, the breaking of "language" codes, and encryption with computers. The first part talks about the earliest basic codes, used by the Romans and Renaissance courts which were conquered with basic frequency analysis and other slightly more elaborate methods. The discussion of mechanized encryption focuses on the cracking of the German Enigma machine in WWII and the situations that led up to it. As always, Mr. Singh tells the essentials of the story in a fast-paced manner while not losing sight of the fundamental analysis and theory behind the work that was done. The third section regarding the cracking of language codes is introduced through WWII Navajo code-talkers, and Mr. Singh then walks us through the decipherment of Egyptian hieroglyphics and the Linear B scripts of ancient Greece. The fourth section discussing encryption in the age of computers is absolutely fascinating. The description of the solving of "key distribution" problems was amazing, and I am happy to now finally understand the importance of large prime numbers with regards to modern data encryption. There is also a brief fifth section, in which the author discusses quantum encryption theory and discusses some of the significant advances that have occurred in this field. There are some astounding themes which resonate throughout this book (1) the amazing co-development that occurred between private and public sector encryption agencies, and the tremendous silence of government agencies as their "secrets" became public knowledge, (2) the methods in which these encryption problems were attacked in an organized fashion, especially during war times, bringing together analytical minds of many different backgrounds, and finally (3) the way in which this teamwork was ultimately trumped through the breakthrough of a single individual who merely saw things differently and digested the problem in a few simple steps. There are many solid lessons about problem solving in this book. Mr. Singh's first book, "Fermat's Enigma" was outstanding. It is amazing to see that he has replicated his success. "The Code Book" is very much worth reading.
Rating: Summary: Thorough and highly readable! Review: This book is a fascinating introduction to the history of cryptography. It is very easy to read, yet still provides sufficient depth for readers to gain a real feel for some of the cryptographic techniques discussed. This book turned my mild interest into true fascination for the subject. I would definitely recommend this to anyone interested in history and/or cryptography.
Rating: Summary: Brilliant ! Review: Absolutely a top class review of history of cryptography, fascinating, very well structured and written. Precise references with clearly described explanations and captivating descriptions of most important ciphers and cryptoanalysts. The pleasure I had from it, push me to strongly suggest this book to anyone like me, who likes numbers, history and cryptography.
Rating: Summary: Not Just About Codes Review: I bought "The Code Book" because of my long fascination with codes and ciphers. While it does have a marvelous treatment of modern 20th century cryptography- including the best description of the German Enigma machine and WWII Bletchly Park decoding activities I've yet read- what really makes this book shine is all the marvelous historical material. Most books on codes and ciphers begin with something like ancient Roman transpotion ciphers. Singh takes a different track. For him, what's most interesting is not the encoding- which is often a trivial process- but the attempts to break encrypted texts. To this end, Singh tells the story of the decypherment of Linear B, an ancient script that was for decades in the 19th century perhaps the greatest puzzle confronting scholars. The tale of the decipherment of Linear B is not only a gripping and fascinating tale in and of itself, but also the perfect story to introduce the reader to the methodology of codebreaking. From Linear B to quantum encryptation, Singh explains it clearly and fully; he's both skilled mathematician and gifted teacher. This is a marvelously entertaining and illiminating read, not only for those interested in the nuts and bolts of cryptography but for those curious about the historical context as well.
|