Index

The pagination of this electronic edition does not match the edition from which it was created. To locate a specific passage, please use the search feature of your e-book reader.

Adleman, Leonard 203–5

Advanced Research Projects Agency (ARPA) 188

Agony columns 74–75

Alberti, Leon Battista 51–53, 103–5

Algorithm, definition of 15

Alice, Bob, Eve 192

al-Kindī 22–24

American Escrowed Encryption Standard 235

Ancient texts 162–63

Arab cryptanalysis 19–22

Arab cryptography 20

Archaeology 162–63

ARPANet 188

Asymmetric ciphers 195–96, 205–6

Babbage, Charles 58–63, 73–74

breaking of Vigenère cipher 73–74

Babington, Anthony 42–43, 46–49

Beale ciphers 77–82, 86–88, 90–94

historical evidence for and against

validity of 92–94

keytexts for 87, 92

text of 83–85

Bennett, Charles 239–41

Bible Code, The (Drosnin) 248

Biuro Szyfrów 121, 126–27, 134–36, 141

Bletchley Park 140–46, 149–51, 181, 211

See also Government Code and

Cypher School; Government

Communication Headquarters

Bombes 135, 145–48, 180–81

Book ciphers 86–87

Caesar, Julius 14

Caesar shift cipher 14–18

Capstone encryption 234–35

Cartouches 170–72

Champollion, Jean-François 173–79

Ciezki, Maksymilian 121

Cipher, definition of 34

Cipher alphabet 14, 52

Cipher disc 103–5

Clipper encryption 234–35

Cocks, Clifford 215–18, 219–20

Codebooks 35

Codes

definition of 33, 34

failings of 34–35

Codewords 33

Colossus (codebreaking device) 180–82

Computers

and codemaking 181–85

See also Encryption of online

information; PGP; Zimmermann,

Phil

Coptic language 164–65, 176–78

Cribs 145–47

Cryptanalysis

in Arab countries 21–22

in Renaissance Europe 31–32

Cryptographic machines 103–5

drawbacks of 153

See also Enigma; Computers

Cryptography

definition of 10–11

in Arab countries 21–22

in literature 76–77

in Renaissance Europe 31–32

Day keys 123–26

de Grey, Nigel 100

Demotic 164

Diffie, Whitfield 187–91, 194–95

Diffie-Hellman-Merkle key exchange 217

Doyle, Arthur Conan 76

Echelon system 231

Ellis, James 212–15, 219–20

email 221

privacy issues and 224

Encryption, definition of 10

Encryption of online information 222

arguments for and against 223, 229–34

government regulation of 227–29

See also Echelon system; PGP;

Quantum cryptography;

Zimmermann, Phil

Enigma (cryptographic machine)

breaking code of 126–35, 143–49

day key 124–26

level of security of 112–17

mechanism of 105–12, 115, 118–19, 136

message key 125–26

need to decipher code of 145

operation of 111–14, 123–25, 142–43

role of England in breaking code of

140, 143–45

role of France in acquiring samples of 123

role of Poland in breaking code of 120–23, 134

use by Germany during interwar and

war years, 121, 134, 136, 140

weakness 142–43

Flowers, Tommy 181

Frequency analysis 23–31, 246–47

Gardner, Martin 209–11

Gifford, Gilbert 41–45

Government Code and Cypher School (GC&CS) 140

See also Bletchley Park

Government Communication

Headquarters (GCHQ) 211–12, 218–19

independent development of RSA at 215

independent development of solution

to key distribution problem at 217–18

Hammer, Carl 91

Hellman, Martin 189–91

Herodotus 7–8

Hieratic 164

Hieroglyphs 163–64

early efforts at deciphering 165–66

fundamental principles of 178

phonetic spelling and 175–79

rebuses and 177–78

Rosetta stone and 166–68, 171

successful attempt to decipher 171–79

History of secret writing 7–11

IDEA cipher 227

Invisible ink 10

Japanese ciphers during World War II 152

Johnston, Philip 153–54

Kāma-Sūtra 13

Kasiski, Friedrich Wilhelm 73–74

Key distribution problem 186–87, 188–89, 191–94

independent development of solution

to by GCHQ 217–18

solution to 193–98, 214

Key escrow 234–36

Keyphrase 18

Keys 15, 16, 17

day 123–26

message 125–26

public 196

private 196

Keyword 18

Kruh, Louis 93

Lorenz cipher 180–81

Marconi, Guglielmo 95–96

Mary Queen of Scots 5–7, 36–50

Mathematical functions

encryption as 197

one-way 198–202

two-way 197–98

See also Modular arithmetic

Merkle, Ralph 190–91

Message keys 125–26

Modular arithmetic 198–201

Monoalphabetic substitution cipher 20

first successful breaking of 21–22

how to decipher 25–31

Montgomery, Reverend 99–100

National Security Agency (NSA) 92, 230–31

Navajo code talkers 154–62

Navajo language 159–60

Newman, Max 181

Noise in communications 213

Nomenclators 35–36

Nulls 33, 36

Perec, Georges 24, 245

PGP (Pretty Good Privacy) 226–29, 237–38

Phelippes, Thomas 45–47

Pigpen cipher 249

Pinprick encryption 75

Plain alphabet 14

Poe, Edgar Allan 76–77

Privacy

See email; Encryption of online

information; PGP

Private keys 196

Public-key cryptography 208, 211, 215

and encryption of online information 222

Public keys 196

Quantum cryptography 239–42

Radio 96–98

and need for encryption 98

Rail fence transposition 11–12

Rebuses 177–78

Rejewski, Marian 127–37, 139

Rivest, Ron 203–7

Room 40 (Admiralty’s cipher bureau) 99–100, 120

Rosetta stone 166–68, 171

RSA (Rivest-Shamir-Adleman) cipher 205

commercialization of 226

encryption of online information with 222

independent development of, at GCHQ 215

mathematics of 250–52

operation of 206–7

and PGP 226

security of 209

Scherbius, Arthur 105–6, 108, 111–20

Schmidt, Hans-Thilo 121–23, 135–37

Scytale, 12–13

Secret writing, early history of 7–10

Semagrams 177–78

Shamir, Adi 203–5

Soro, Giovanni 32

Steganography 9–10

Substitution cipher 13–14, 17, 18

See also Monoalphabetic substitution

cipher

Symmetric ciphers 195–96

Transposition cipher 11–12

rail fence transposition 11–12

scytale 12–13

Turing, Alan 143–46, 151

Ultra 147–49

Verne, Jules 76

Vigenère, Blaise de 53

Vigenère cipher 53–58

advantages of 56–58

breaking of 73–74

keyword in 54

use of Vigenère square in 54–57, 62

weaknesses of 63–64

Vigenère square 54–57, 62

Walsingham, Sir Francis 5–7, 44–49

Williamson, Malcolm 217–18, 220

Wilson, Woodrow 100–2

World War I

and cryptography 97

See also Zimmermann telegram

World War II 152

See also Bletchley Park; Enigma;

Navajo code talkers; Ultra

Young, Thomas 169–73

Zimmermann, Phil 222–29, 237–38

Zimmermann telegram 98–102