The pagination of this electronic edition does not match the edition from which it was created. To locate a specific passage, please use the search feature of your e-book reader.
Adleman, Leonard 203–5
Advanced Research Projects Agency (ARPA) 188
Agony columns 74–75
Alberti, Leon Battista 51–53, 103–5
Algorithm, definition of 15
Alice, Bob, Eve 192
al-Kindī 22–24
American Escrowed Encryption Standard 235
Ancient texts 162–63
Arab cryptanalysis 19–22
Arab cryptography 20
Archaeology 162–63
ARPANet 188
Asymmetric ciphers 195–96, 205–6
Babbage, Charles 58–63, 73–74
breaking of Vigenère cipher 73–74
Babington, Anthony 42–43, 46–49
Beale ciphers 77–82, 86–88, 90–94
historical evidence for and against
validity of 92–94
keytexts for 87, 92
text of 83–85
Bennett, Charles 239–41
Bible Code, The (Drosnin) 248
Biuro Szyfrów 121, 126–27, 134–36, 141
Bletchley Park 140–46, 149–51, 181, 211
See also Government Code and
Cypher School; Government
Communication Headquarters
Bombes 135, 145–48, 180–81
Book ciphers 86–87
Caesar, Julius 14
Caesar shift cipher 14–18
Capstone encryption 234–35
Cartouches 170–72
Champollion, Jean-François 173–79
Ciezki, Maksymilian 121
Cipher, definition of 34
Cipher alphabet 14, 52
Cipher disc 103–5
Clipper encryption 234–35
Cocks, Clifford 215–18, 219–20
Codebooks 35
Codes
definition of 33, 34
failings of 34–35
Codewords 33
Colossus (codebreaking device) 180–82
Computers
and codemaking 181–85
See also Encryption of online
information; PGP; Zimmermann,
Phil
Coptic language 164–65, 176–78
Cribs 145–47
Cryptanalysis
in Arab countries 21–22
in Renaissance Europe 31–32
Cryptographic machines 103–5
drawbacks of 153
See also Enigma; Computers
Cryptography
definition of 10–11
in Arab countries 21–22
in literature 76–77
in Renaissance Europe 31–32
de Grey, Nigel 100
Demotic 164
Diffie, Whitfield 187–91, 194–95
Diffie-Hellman-Merkle key exchange 217
Doyle, Arthur Conan 76
Echelon system 231
Ellis, James 212–15, 219–20
email 221
privacy issues and 224
Encryption, definition of 10
Encryption of online information 222
arguments for and against 223, 229–34
government regulation of 227–29
See also Echelon system; PGP;
Quantum cryptography;
Zimmermann, Phil
Enigma (cryptographic machine)
breaking code of 126–35, 143–49
day key 124–26
level of security of 112–17
mechanism of 105–12, 115, 118–19, 136
message key 125–26
need to decipher code of 145
operation of 111–14, 123–25, 142–43
role of England in breaking code of
140, 143–45
role of France in acquiring samples of 123
role of Poland in breaking code of 120–23, 134
use by Germany during interwar and
war years, 121, 134, 136, 140
weakness 142–43
Flowers, Tommy 181
Frequency analysis 23–31, 246–47
Gardner, Martin 209–11
Gifford, Gilbert 41–45
Government Code and Cypher School (GC&CS) 140
See also Bletchley Park
Government Communication
Headquarters (GCHQ) 211–12, 218–19
independent development of RSA at 215
independent development of solution
to key distribution problem at 217–18
Hammer, Carl 91
Hellman, Martin 189–91
Herodotus 7–8
Hieratic 164
Hieroglyphs 163–64
early efforts at deciphering 165–66
fundamental principles of 178
phonetic spelling and 175–79
rebuses and 177–78
Rosetta stone and 166–68, 171
successful attempt to decipher 171–79
History of secret writing 7–11
IDEA cipher 227
Invisible ink 10
Japanese ciphers during World War II 152
Johnston, Philip 153–54
Kāma-Sūtra 13
Kasiski, Friedrich Wilhelm 73–74
Key distribution problem 186–87, 188–89, 191–94
independent development of solution
to by GCHQ 217–18
solution to 193–98, 214
Key escrow 234–36
Keyphrase 18
Keys 15, 16, 17
day 123–26
message 125–26
public 196
private 196
Keyword 18
Kruh, Louis 93
Lorenz cipher 180–81
Marconi, Guglielmo 95–96
Mary Queen of Scots 5–7, 36–50
Mathematical functions
encryption as 197
one-way 198–202
two-way 197–98
See also Modular arithmetic
Merkle, Ralph 190–91
Message keys 125–26
Modular arithmetic 198–201
Monoalphabetic substitution cipher 20
first successful breaking of 21–22
how to decipher 25–31
National Security Agency (NSA) 92, 230–31
Navajo code talkers 154–62
Navajo language 159–60
Newman, Max 181
Noise in communications 213
Nomenclators 35–36
Nulls 33, 36
Perec, Georges 24, 245
PGP (Pretty Good Privacy) 226–29, 237–38
Phelippes, Thomas 45–47
Pigpen cipher 249
Pinprick encryption 75
Plain alphabet 14
Poe, Edgar Allan 76–77
Privacy
See email; Encryption of online
information; PGP
Private keys 196
Public-key cryptography 208, 211, 215
and encryption of online information 222
Public keys 196
Quantum cryptography 239–42
Radio 96–98
and need for encryption 98
Rail fence transposition 11–12
Rebuses 177–78
Rejewski, Marian 127–37, 139
Rivest, Ron 203–7
Room 40 (Admiralty’s cipher bureau) 99–100, 120
Rosetta stone 166–68, 171
RSA (Rivest-Shamir-Adleman) cipher 205
commercialization of 226
encryption of online information with 222
independent development of, at GCHQ 215
mathematics of 250–52
operation of 206–7
and PGP 226
security of 209
Scherbius, Arthur 105–6, 108, 111–20
Schmidt, Hans-Thilo 121–23, 135–37
Scytale, 12–13
Secret writing, early history of 7–10
Semagrams 177–78
Shamir, Adi 203–5
Soro, Giovanni 32
Steganography 9–10
Substitution cipher 13–14, 17, 18
See also Monoalphabetic substitution
cipher
Symmetric ciphers 195–96
Transposition cipher 11–12
rail fence transposition 11–12
scytale 12–13
Turing, Alan 143–46, 151
Ultra 147–49
Verne, Jules 76
Vigenère, Blaise de 53
Vigenère cipher 53–58
advantages of 56–58
breaking of 73–74
keyword in 54
use of Vigenère square in 54–57, 62
weaknesses of 63–64
Vigenère square 54–57, 62
Walsingham, Sir Francis 5–7, 44–49
Williamson, Malcolm 217–18, 220
Wilson, Woodrow 100–2
World War I
and cryptography 97
See also Zimmermann telegram
World War II 152
See also Bletchley Park; Enigma;
Navajo code talkers; Ultra
Young, Thomas 169–73
Zimmermann, Phil 222–29, 237–38
Zimmermann telegram 98–102