Secret History: The Story of Cryptology (Discrete Mathematics and Its Applications)
H**O
Great synthesis of cryptology history and the mathematical foundations that form its structures.
This book is beautifully bound with clear typography, especially with the numerical tables. Bauer does synthesize the history and mathematics of cryptography all in one place. The history is fascinating, world shaking events have hinged on cryptography, but for me, I also like to understand the tools of the trade and the concepts. Bauer provides you the tools to work through the how-to if you're patient.
G**R
Excellent "survey book"
Comprehensive, resonably technical, well written.
R**R
Five Stars
This is about as good as David Kahn's The Codebreakers.
F**I
Below the bar
This was disappointing. Lacked depth compared to other reads on the subject, I had expected much more detail, historical if not algorithmic.
B**E
Excellent comprehensive and decipherable text on the history of cryptography
Narrating a compelling and interesting story about cryptography is not an easy endeavor. Many authors have tried and failed miserably; attempting to create better anecdotes about the adventures of Alice and Bob. David Kahn did the best job of it when wrote The Codebreakers: The story of secret writing in 1967 and set the gold standard on the information security narrative. Kahn's book was so provocative and groundbreaking that the US Government originally censored many parts of it.A lot has changes since 1967, and while Secret History: The Story of Cryptology is not as groundbreaking, it also has no government censorship. With that, the book is fascinating read that provides a combination of cryptographic history and the underlying mathematics behind it.As a preface; the book has cryptology in its title, which is for the most part synonymous with cryptography. Since cryptography is more commonly used, I'll use it in this review.Kahn himself wrote that he felt this book is by far the clearest and most comprehensive of the books dealing with the modern era of cryptography including classic ciphers and some of the important historical ones such as Enigma and Purple; but also newer systems such as AES and public-key cryptography.The book claims that the mathematics detailed in it are accessible requiring minimal mathematical prerequisites. But the reality is that is does require at least a college level understanding, including algebra, calculus and more.As an aside, nearly every book on encryption and cryptography that claims no advanced mathematical knowledge is needed doesn't meet that claim. With that, Bauer does a good job of separating the two narratives in the book (cryptography and history), so one who is not comfortable with the high-level math can easily parse through those sections.Bauer brings an extensive pedigree to the book, as he is a former scholar-in-residence at the NSA Center for Cryptologic History. While Bauer has a Ph.D. in mathematics, that does not take away from his ability as an excellent story teller. And let's face it; telling the story of cryptography in a compelling and readable manner is not an easy task.The 20 chapters in the book follow a chronological development of encryption and cryptography; from Roman times to current times. Each chapter has a set of exercises. Besides being extremely well-researched, each chapter has numerous items for further reading and research.Chapters 1-9 are focused on classical cryptology, with topics ranging from the Caesar cipher, Biblical cryptology, to a history of the Vigenère cipher, the ciphers of WW1 and WW2 and more.In chapter 8 World War II: The Enigma of Germany, Bauer does a great job of detailing how the Enigma machine worked, including details regarding the cryptanalysis of the device, both in its rotor wirings and how recovering its daily keys ultimately lead to is being broken. The chapter also asked the question: what if Enigma had never been broken, and provides a provocative answer to that.Chapter 8 opens with the famous quote from Ben Franklin that "three may keep a secret if two of them are dead". He notes that the best counterexample to that is of the 10,000 people that were involved in the project to break the Enigma. They all were able to maintain their silence about the project for decades; which clearly shows that large groups can indeed keep a secret. Bauer notes that it is often a reaction to conspiracy theories that large groups of people could never keep a secret for so long.Chapter 9 provides a fascinating account of the Navajo code talkers. These were a group of Navajo Indians who were specially recruited during World War II by the Marines to serve in their communications units. Since the Navajo language was unknown to the Axis powers; it ensured that all communications were kept completely secret.While part 1 is quite interesting; part 2, chapters 10-20 focuses on modern cryptology and is even more fascinating. Bauer does a fantastic job of encapsulating the last 60 years of cryptography, and covers everything from the origins of the NSA, the development of DES and AES, public key cryptography and much more.The book was printed in March 2013 just before the NSA PRISM surveillance program became public knowledge. If there is any significant mistake in the book, it is in chapter 11 where Bauer writes that "everything I've seen and heard at the NSA has convinced me that the respect for the Constitution is a key component of the culture there".Aside from the incorrect observation about how the NSA treats the Constitution, the book does an excellent job of integrating both the history of cryptography and the mathematical element. For those that aren't interested in to the mathematics, there is plenty of narrative in the book to keep them reading.This book is the latest in a long line of cryptography narrative, such as The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography by Simon Singh and The Codebreakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet by David Kahn, and of course the classic cryptography text Applied Cryptography by Bruce Schneier, and Bauer shows himself to be a master author and story teller.For those looking for a comprehensive and decipherable text on the history of cryptography, this is one of the best on the topic in many years.Kahn's book laid the groundwork that made a book like this possible and Secret History: The Story of Cryptology is a worthy follow-up to that legendary text.
M**E
I think he did an excellent job of achieving his goal
In "Secret History: the story of Cryptology," Craig Bauer aims to create a book that melds two approaches to the topic: the historical approach (best exemplified by David Kahn's "The Codebreakers) and the mathematical/computer science approach (exemplified by Bruce Schneier's "Applied Cryptography" and Christopher Swenson's "Modern Cryptanalysis")...without scaring off people whose math background is limited. I think he did an excellent job of achieving his goal. In particular, when he goes over mathematical concepts, his explanations are lucid and clear: I wish the explanation of matrices I got in school had been as good as the description he gives. I predict that this will end up on the bookshelf of anyone with an amateur or professional interest in the subject, joining the three works I mentioned earlier and Helen Fouch Gaines' "Cryptanalysis"......or superseding them.
D**D
A very comprehensive book on a very interesting subject
I bought this book based upon the recommendation from a friend, and I have to say it is a very comprehensive volume. Suffice it to say that if you are interested in secret codes and cryptography, from ancient times to the present, buy this book, you will not be disappointed. Just look at the table of contents; everything related to codes is there.One reviewer complained about the quality of the paper in the book. My copy is fine, it is a well-bound book of the highest quality.In the "Note to the reader," the author gives his email address, so you can contact him with comments or questions. I wish all authors would do that.This book is not inexpensive, but if you are a serious student of cryptography, it is well worth the money.
J**N
30k view, true, but most of the people reading this book are not NSA operatives or Math majors.
Although I would have to agree, if you got your PHD in Cryptography/Cryptology/Math this is probably a little basic. But for just starting out this is a great read! Fairly easy reading (although the Safari version is not good for doing examples.) and the author tries to maintain a linear line of thinking.I am a programmer with little calculus/geometry experience (I was good in my day though). I had little to no "historical" context to cryptology but this book was a rabbit hole for me.Good work!
S**K
Worth reading
Very good book. If you like history, this is a book for you. It will show you the history of cryptology, from ancient to most recent times. If you think that your computer is safe, or that security software that you buy actually protect you, read this book, you may rethink your position. If you love mathematics, read this book, you will understand more than average person.
A**R
This is frankly one of the best books I have EVER read on the subject
This is frankly one of the best books I have EVER read on the subject. The chapters are laid out well, the subject matter is engaging and the language used is accessible to all.
P**R
ein wirklich tolles Buch
Das Buch ist eigentlich zwei Bücher in einem, und so verwendet es der Autor wohl auch in seinen Kursen. Teil 1 beschäftigt sich mit der Geschichte der Kryptographie und enthält das oft gelesene, übliche Material mit einigen Ergänzungen, Teil 2 ist deutlich mathematischer und substanzieller. Beide sind schön zu lesen und sehr verständlich. Mein Lieblingskapitel ist Kap. 14 "Attacking RSA", da werden erst 11 Angriffe vorgestellt, die nicht auf Faktorisierung beruhen, und dann wird die Faktorisierung behandelt. Man bekommt außerdem eine Einführung in Informationstheorie, Komplexitätstheorie und elliptische Kurven. Besonders bemerkenswert finde ich, dass viele kryptoanalytische Beispiele wirklich von vorn bis hinten durchgeführt werden, das kostet Platz, erhöht aber das Verständnis deutlich. In mehreren Einführungen zum Thema habe ich gelesen, RSA sei verwundbar gegen chosen plaintext und ich habe das offen gesagt einfach zur Kenntnis genommen, aber Bauer zeigt, wie das konkret funktioniert, allein dafür hat es sich gelohnt. Wenn man unbedingt etwas kritisieren möchte, dann dass ein wenig der Überblick über die Vielzahl der heute verwendeten Verfahren fehlt, da hilft "Modern Cryptography" von Chuck Easttom weiter, aber das ist Meckern auf hohem Niveau, das ist ein wirklich absolut empfehlenswertes Buch (und mathematisch auch Klassen besser als das Buch von Easttom).
Trustpilot
4 days ago
2 months ago