Index

The pagination of this electronic edition does not match the edition from which it was created. To locate a specific entry, please use your e-book reader’s search tools.

ABFGX cipher 129–30

acrostic codes 48–9

ADFGVX cipher 131

Alberti, Leon Battista 102, 107–8

Alice and Bob 150, 151–2

alphabet, expanding 103–5

American Standard Code for Information Interchange (ASCII) 144, 146, 148, 149

Army of Portugal code 101

Atbash 78–9

Bacon, Francis 145

Baudot, Emile 144, 147

Bazières cylinder 134

bifid cipher 120–1

bilateral cipher 145

binary code 143–6, 147

black chambers 160–5

Blencowe, William 161

Bletchley Park 137, 142, 165

block cipher 149

book code 60

books, codes in 58

Braille 27–9

Caesar shift 72

Cardano grille 50–2

Central Security Service (CSS) 164

Chappe, Claude and René 25

checkerboard ciphers 118–26

Chinese, ancient 39

cipher definition 54

cipher disc 108

ciphers 128–9

    combining 107–8

Cockney rhyming slang 45–6

code chronology 167–70

code definition 54

codes 128–9

Cold War 39

columnar transposition 68–9

common letters 91–3

computer encryption 143–9

cowboy branding 17, 18

cribs 131–3, 174

cuneiform writing 15–16

Data Encryption Standard (DES) cipher 156

date shift ciphers 112

decryption, history of 178

Delastelle, Felix 121

dictionary code 56–9

Diffie–Hellman–Merkle key exchange 152

digital writing, invisible 41–2

digraphs 93–5

dot cipher 61–2

double transposition 70–1

Doyle, Sir Arthur Conan 90

en clair 102

Enigma 135–8, 164

field ciphers 129–31

field codes and ciphers 127–33

films, codes in 70

frequency analysis 89–95, 105, 174–7

    beating 97–106

frequency tables 92, 94

Friedman, William 140–1

Government Communications Headquarters (GCHQ) 165

great Paris cipher 101–2

Greek scytale 63–4

Greek square 81–2, 97–102, 118

Hellman, Martin 151–2

Herodotus 37

hieroglyphs 11–13

Histiaeus 38

hobos, 17

inks, for invisible writing 40–1, 43, 47

international signal flags 22–3

invisible writing 40–3

Jefferson wheel 133–4, 135

Jefferson, Thomas 133

JN-25 141–2

key distribution 149–53

key stream sequence 147

keyword identification 175–7

keywords 108–9

    using 76–78

King Charlemagne cipher 82, 83

‘Kryptos’ 96

leet 34–5

line cipher 62

Marryat, Captain 19

Mary, Queen of Scots 88–9, 161

Mauborgne, Joseph 117

MI-8 164

modular arithmetic 151–2

monoalphabetic cipher 72

Morse code 30–3, 92, 131, 144

music, codes in 158

National Security Agency (NSA), 164

nomenclator 88

null cipher 48, 97

nulls 66

number ciphers 79–80

number keys see word keys

one-time pad 117

Opish 44

optical telegraph 24–5

Painvin, Georges 131

password attacks 155–6

password sniffing 155

passwords 153–6

Personal Identification Number (PIN) 156

Pig Latin 43

pigpen cipher 85–6

Playfair cipher 118–19

Pliny 40

polyalphabetic cipher 72, 98, 112–13

Polybius square 81–2, 118, 122

Porta, Giavanni 38

Pretty Good Privacy (PGP) 152–3

public key enciphering 150

PURPLE code 140–1

quantum cryptography 157

quantum mechanics 157

rail fence cipher 64–6

Romanji 140

Room 40 165

Rosicrucian cipher, 86, 87

running key 116–17

Scovell, George 101

Secure Sockets Layer (SSL) 153

semaphore 19–21

Shepherd’s Monument 124

shift ciphers 71–3

sign language 25–7

Signals Intelligence Service (SIS) 140

slide rule cipher 73

space code 53–5

spoken codes 43–7

St Cyr cipher 72–3

steganography 39, 40

stencil code 50

straddling checkerboard 125–6

stream cipher 147–8

sub rosa codes 56

substitution ciphers 71–89

symbols, using 82–3

Tacitus 39

texting 35–6

The Shadow magazine 74–5

transmission security 39

Transport Layer Security (TLS) 153

transposition ciphers 55, 63–71

transposition with a key 67

transposition, double 70–1

trifid cipher 122–3

Turing, Alan 137

typewriter cipher 77–8

Vernam cipher 117

Vernam, Gilbert 117, 147

Vigenère square 110–16

Wallis, John 161

wax tablets 38–9

Wheatstone, Charles 119

word breaks 112–13

word frequency 95

word keys 68–71

World War I codes 127–33

World War II codes 132, 133–39, 140–2, 164

World War II films and codes 139

XOR operation 147

Zimmerman, Phil 152

Zip’s law 95