Date: Sun, 6 Dec 92 07:47 EST
>From: "Michael E. Marotta" <[email protected]>
Subject: File 9--Bibliography on codes and ciphers

 number 006            CLACKER'S DIGEST           December 6, 1992.
         philosophy and applications for analytical engines
+++++++++++++++++++++++++
        A Cryptography Bibliography by [email protected]

(Technically, cryptography is MAKING codes while cryptanalysis is
BREAKING them.  Both are subsumed under cryptology.  A CIPHER is a
regular transposition such as A=Z, B=Y, etc., while a CODE is a table
of arbitrary symbols.)

Kahn, David, THE CODEBREAKERS, MacMillan, 1967.  The MOST complete
  history with specific examples.  Written before public keys, RSA,
  etc., but still THE place to start.

Marotta, Michael, THE CODE BOOK, Loompanics, 1987, Overview of history
  and post-1967 developments.

Sinkov, Abraham, ELEMENTARY CRYPTANALYSIS: A MATHEMATICAL APPROACH,
  Random House, 1968.  Sinkov worked for Friedman on the breaking of
  Purple.  First rate.

Gaines, Helen Fouche, CRYPTANALYSIS, Dover, 1956. A classic work.  The
  first step to breaking codes and ciphers.

Lysing, Henry, SECRET WRITING, Dover, 1974.  Another reprint of
  another classic.

Smith, Laurence Dwight, CRYPTOGRAPHY, Dover, 1955.  Ditto.

Konheim, Alan G., CRYPTOGRAPHY: A PRIMER, John Wiley, 1981.  Textbook
  for mathematicians from IBM's Watson Center. Includes public keys,
  digital signatures.

Meyer, Carl H., and Matyas Stephen M., CRYPTOGRAPHY, John Wiley, 1982.
  From IBM Cryptography Competency Center.  For computers, includes
  public keys, digital signatures.

Weber, Ralph E., UNITED STATES DIPLOMATIC CODES AND CIPHERS 1775-1938,
  Precedent, 1979.  Not just a history!  The appendix contains the
  all the keys!!

Chadwick, THE DECIPHERMENT OF LINEAR B, Vintage, 1958. Worked with
  Michael Ventris on unraveling Minoan script.

Yardley, Herbert O., THE AMERICAN BLACK CHAMBER, Ballantine 1981,
  Random House, 1931.  Yardley broke German ciphers in WWI and then
  Japanese ciphers of 1920, and was fired in 1931 because "Gentlemen
  don't read each other's mail."

(anonymous), THE DATA ENCRYPTION STANDARD,  National Bureau of
  Standards, January 1977, NTIS NBS-FIPS PUB 46.

(anonymous), DATA SECURITY AND THE DATA ENCRYPTION STANDARD,

National Bureau of Standards, 1978, Pub 500-27; CODEN: XNBSAV.

Rivest, Ronald L., Shamir, A., and Adleman, L., "A Method for
  Obtaining Digital Signatures and Public-key Cryptosystems,"
  COMMUNICATIONS OF THE ACM, February, 1979.  The last word.

------------------------------


Downloaded From P-80 International Information Systems 304-744-2253