The Code Book 47
The Code Book: the Evolution of Secrecy from Mary, Queen of Sco | |
author | Simon Singh |
pages | 402 |
publisher | Doubleday |
rating | 8/10 |
reviewer | Ellen Knowlton Wilson |
ISBN | 0-385-49531-5 |
summary | Singh chronicles the development of codes and ciphers as well as their roles in human events, and discusses the relevance of cryptography in the modern age. |
In The Code Book: the Evolution of Secrecy from Mary, Queen of Scots to Quantum Cryptography, Simon Singh begins with the courtroom drama of the trial of Mary, Queen of Scots, and ends discussing current debate over the export of strong cryptography tools. In between, he touches on the identity of the Man in the Iron Mask, buried treasure, the Enigma machine, Navajo code-talkers and quantum money, in a manner accessible to laypeople.
Singh approaches the story of cryptography from the perspective of both scientist and science writer. He received his doctorate in physics from Cambridge and produced a documentary about Fermat's Last Theorem which aired on both the BBC and PBS. He is also the author of Fermat's Enigma, which tells the story of Fermat's Last Theorem. Singh's background has prepared him well for this subject; he has the scientist's eye for detail and the writer's ability to communicate concepts in a non-patronizing manner. "Turning to purists," he writes in the introduction, "I should apologise for the title of this book. The Code Book is about more than just codes... Ciphers play an integral role in cryptography, and so this book should really have been called The Code and Cipher Book. I have, however, forsaken accuracy for snappiness."
Indeed, this book is not intended for the diehard cryptography buff, but rather for the general reader. Should the reader become captivated by the subject, Singh has included a section of suggested further readings. The book also contains a contest for $15,000 -- The Cipher Challenge (http://www.4thestate.co.uk/cipherchallenge).
Singh states in his introduction that the objectives of this book as twofold: first, to chart the evolution of codes and chronicle their impact on history; and second, to demonstrate the importance of cryptography in the modern age. Singh clearly succeeds with his first objective, but I found the case for the second to be slightly weaker.
The types of codes and ciphers are illustrated with stories of historical intrigue, such as the treason trial of Mary, Queen of Scots, who was executed when the cipher alphabet and code words used by her co-conspirators was cracked, revealing her involvement in a plot unfamiliar to most modern readers. The development of frequency analysis and polyalphabetic substitution ciphers is interwoven with the story of the buried treasure in the American west. The mechanization of codes and ciphers is covered in the sections about the first and second World Wars, and the relation of language and cryptography is illustrated by the use of Navajo code-talkers during the Pacific campaign of World War II. Concepts of cryptography are presented in an accessible and enjoyable manner throughout the book, although readers already familiar with the subject may not gain any new knowledge.
The final three chapters of the book cover public-key encryption and quantum cryptography. I found the explanation of the concepts behind PGP to be clear, and was fascinated by the brief explanation of the legal struggles surrounding encryption. Singh makes some good points about the importance of privacy in the current age, but does not delve too far into the subject. Admittedly, the question of information ownership is such a large one that it merits its own book. The final chapter covers quantum cryptography, which is illustrated by the idea of quantum money. Quantum money would contain polarized photons, known only to the bank, rendering counterfeiting impossible. While still purely theoretical, the idea is fascinating, and indicates the changes sure to evolve as technology changes.
Summary:
The Code Book is an enjoyable and readable introduction to codes and ciphers for the layperson. Examples of the principles of cryptography are illustrated with examples from history, showcasing their importance of the history, and Singh attempts to make the case for the increasing importance of privacy as technology develops.
Purchase this book at ThinkGeek.
Table of contents:
- Introduction
- The Cipher of Mary Queen of Scots
- Le Chiffre Indchiffrable
- The Mechanism of Secrecy
- Cracking the Enigma
- The Language Barrier
- Alice and Bob Go Public
- Pretty Good Privacy
- A Quantum Leap into the Future
- The Cipher Challenge
- Appendices
- Glossary
- Acknowledgements
- Further Reading
- Picture Credits
- Index
Re:Slashdot poll suggestion (Score:1)
We already have beowulf clusters of these things, they are called libararies.
Lets just hope the Us Government doesn't decide that they are too powerful for public use and ban them..
Great Book! Loved the stuff on Linear B (Score:1)
The stuff on the Navajo Code Talkers was fascinating. I also really enjoyed his digression into the decipherment of Linear B...not strictly cryptography of course, but a fascinating case nonetheless.
Another interesting tidbit was the revelation that the British has in fact come up with the idea of asymmetric ciphers and the RSA scheme a few years ahead of the researchers in the US...but were unable to publish their findings. The book is littered with such stories of British discoveries that had to be kept secret for years.....
I say go get this book! You will not be disappointed.
Re:question and a half: (print books ok to export) (Score:2)
It is only digital media that has had a problem, since the argument is that source code on disk is a tool, not an expressive essay. Apparently the assumption is that OCR software doesn't exist outside the US either
Hence Applied Cryptography with detailed descriptions of strong algorithms can be exported by US booksellers, since there is no companion CD with it. The CD is sold only directly from the author (in MN), and only to US and Canadian buyers with check or money order drawn from a US bank. The CD is restricted from export, but the book is not. See http://www.counterpane.com/scode.html for more detail.
It is a strange country we live in where what format a book is in has great impact on where you can sell it.
One of the first binary systems (Score:2)
Beefs w/the book (was Re:Friggin Netscape) (Score:2)
I do agree with your point about the "unbreakable" nature of Quantum Crypto. If there is any historical lesson to be learned here, it's that cryptography is a neverending arms race between the maker and the breaker. It just gets more interesting and has higher stakes as it goes on!
See also: (Score:1)
You know when ThinkGeek adds another OLD book.. (Score:1)
In other words, it's just another ThinkGeek marketing plug.
Not bad, but certainly not great (Score:1)
Great Review, Great Book (Score:1)
The stories are all interesting, but I think what will interest
__________________________
Wow (Score:1)
Wazzzzzup!!!
Second Slashdot review... (Score:5)
http://slashdot.org/books/99/10/07/1121201.shtm
andy
Did you read The Cryptonomicon? (Score:1)
Anyhow, one of the tenets of that book is that very good crypto will allow online virtual banking that no government will be able to trace.
Kind of like an offshore bank, but quicker and easier to implement.
The first geek/bankers to do this stand to become very rich.
Income tax may disappear, being replaced with real estate taxes, etc. Society may change drastically.
Get ready,
George
Re:One of the important concepts of modern life? (Score:3)
I must disagree. To start with, cryptography is the rock upon which our banking and currency systems rest. If you use an ATM, or get your paychecks directly deposited, you've directly relied on cryptography. Even you keep your money in a mattress, the whole reserve banking system (upon which, for good or ill, the economy is based) needs it to function. Every day between one and two trillion dollars worth of interbank transfers [miami.edu] are processed by Fedwire and the Clearing House Interbank Payment System; all these transations use cryptography.
And cryptography is essential for modern military operations. Whether you're a hawk or a dove, you can't help but admit that military operation have an important impact on the lives of people around the globe, and that impact would (for good or ill) be much lessened in the absence of secure communication. Cryptography is also important in the diplomacy that holds tensions short of a state of war - the old "Red Telephone" line between Moscow and Washington was protected with, IIRC, a one time pad.
Cryptography is used by people around the globe working for human rights; groups like Human Rights Watch and Amnesty International [aaas.org] use cryptography to secure their communication.
So, if you want to engage in commerce, protect or attack a nation, or are concerned about human rights, cryptography is fundamental. There are good reasons why it gives certain government agencies extreme heartburn to think of cryptography in the hands of the rest of us...
Re:One of the important concepts of modern life? (Score:4)
It's a Fun Read... (Score:1)
I took the time to solve six out of the ten contest codes. One more is about half solved. The two fun ones were cracking the 3-rotor Enigma machine (done by a hill-climbing search) and cracking a Playfair cipher by simulated annealing.
Anyway, highly recommended.
Re:The contest... (Score:1)
Yes, I saw the acknowledgement on the bottom of the page myself (about April 10), but supposedly this pertains to whomever can identify the source of the ciphertext, as opposed to deciphering it.
Hmmm....
The contest... (Score:3)
According to the leader board, 8 out of 10 of the codes have already been broken, so get going if you wanted to participate in the last two!
On an unrelated note, was anybody able to break the code on http://www.eruditorum.org [eruditorum.org]?
It has been taken down.
An excellent book on the subject! (Score:4)
It was great. I even got my (non-crypto-geek) wife to read it, and she thoroughly enjoyed it. It's a little lighter on theory, but richer in descriptive narrative. If you've read Kahn, you'll find many of the same episodes related in The Code Book, but Singh does a better job of describing some of the historical contexts (specifically, the activities of Queen Elizabeth and Sir Francis Walsingham).
I was also glad to read some decent coverage of the much-under-appreciated Navajo Code Talkers of WWII, which barely rates a paragraph in Kahn. (By the way, The History Channel just ran an entire hour on the Code Talkers on their "Histories Mysteries" series - highly recommended)
I liked The Code Book so much, I went back and picked up his earlier book, _Fermat's Enigma_ and was enthralled by the 350 year quest to solve the Theorem.
Buy and enjoy. It deserves a place on the bookshelf next to Kahn and Schneier.
JQ
...And it makes a great gift! (Score:1)
Fermat's Enigma (also by Simon Singh) so much. On Christmas Eve the book
was presented to me. 48hrs later, I had read it through.
If it hadn't been for familial obligations, I would likely have devoured
it whole, at one sitting. Damn, DAMN good book.
Re:Odd place to start (Score:1)
Because she's a great example of the dangers of poor cryptography. If using a 40-bit browser were likely to get you beheaded, you'd be more concerned about the quality of your crypto, wouldn't you?
Re:I disagree with geek boy (Score:1)
Even if you try an avoid the Internet, and never plan to do business on it, if you want your private information kept private then you need to be concerned with encryption.
More and more states are keeping tons of information about you accessible to a hacker on some server somewhere - and if the info is kept encrypted it adds a little bit of safety (now if they don't have a trusted 3rd party and they keep their secret decryption key on the same computer as the data, well, I don't consider that to be a good use of encryption).
Do you have a driver's license? Is your state dumb enough to use your SSN as your drivers license number (several do)? Register a gun? Get a speeding ticket? Want everyone to know everything?
Crypto isn't just for political speech (you decide if your society is free or not) and dissident movements anymore.
If you trust your work to keep your information secure, have you ever taken the time to think how secure?
You should always remember Satires, VI, line 347
Juvenal, C. 100 C.E.
Sed quis custodiet ipsos custodes?
(translated: Who will guard the guards?)
You need to take things into your own hands sometimes, just stepping away from the computer won't make it all go away.
Re:calm down turbo... (Score:1)
Nice ability to count there, and you do bring up an interesting other point I was talking about - I live in PA and there is a growing amount of Amish who take credit cards for various businesses they have, so even the Amish should think about how securely they send info or their customers could have their information stolen.
question and a half: (Score:3)
--
Re:Odd place to start (Score:1)
Why? (Score:2)
Online transactions can be encrypted all day long, and still be compromised by some 1337 srk1p7 k1dd13 who makes his way into a poorly secured database server. We need more awareness of the perils of e-commerce (on the side of those offering it), rather than stronger cryptography. Demand more secure online stores, not codes that take h@x0rz an extra day to crack.
(If you disagree, reply instead of modding me down).
quick read (Score:1)
well-written review (Score:1)
Seth
Re:Publications are exempt (Score:1)
Yes, but! (Score:1)
Excellent - another coffee table primer! (Score:1)
Thank you, /. [slashdot.org], for providing us with Hemos' review.
Information wants to be free
Re:The contest... (Score:1)
Buy this book. Now. (Score:1)
Odd place to start (Score:1)
I'm sure Julias Caesar used a simple substitution code based on a->d, b->e etc.
Re:Friggin Netscape crashed on me the 1st attempt (Score:2)
Quantum crypto, on the other hand, uses nature itself to help privacy. Listening in on my PGP email is simply impractical (and would be very dull - believe me). But to listen in on a quantum conversation without being detected would require breaking physical laws.
The worry, of course, is that quantum mechanics isn't the whole truth. But that is another story.
One of the important concepts of modern life? (Score:1)
Sure, they want their banking information to be secure - but beyond that they don't have direct exposure to it on an everyday basis.
Re:One of the important concepts of modern life? (Score:1)
Cryptography is a means to encode data to make it difficult for other people to decode. The Von Neumann architecture enabled the information revolution. You can't compare the two! You might as well say that "call waiting" is one of the most important concepts of modern life, and compare it to the invention of the telephone.
Actually, I think GTE do this already
(Ooh, by the way, it's nice to see impartial moderators at work. At least I know I can raise my karma by just agreeing with everything the editors say.)
Re:Excellent - another coffee table primer! (Score:1)
Now there's a book I enjoyed reading. Applied Cryptology was much better then the Code book IMHO. I'm thinking about buying Applied Cryptology... During college I guess I'm being spoiled by spending my time here in Penn State's Computer Lab...
Maybe I should learn something important, like grammar while I'm here. :)
Allright... (Score:2)
I think a very strong interest in crypto is neccessary to really enjoy this book... I'm not big into crypto but I do think it's an intersting subject.
Anyone interested in crypto I'd say buy or borrow this book and give it a try yourself. It's not bad...
Quantum Money (Score:1)
The problem with checking quantum money (this is explained in the book) is that by checking it you destroy the value. (Subject to Heisenberg's uncertainty principle, etc.) The only good thing about quantum money [keithlynch.net] (IMHO) is that quantum cryptography evolved from it.
--
Friggin Netscape crashed on me the 1st attempt (Score:2)
IMHO Singh really does a fascinating job of writing this book. There are only two downsides to this otherwise-excellent book:
--
Its Interesting! (Score:1)
Publications are exempt (Score:2)
This led to the strange operation by which the international version of PGP used to be created. The current US version's code listing was printed out on paper and this was legally exported. It was then OCRed back into electronic form and then manually examined to correct any OCR mistakes. This could then be compiled to create the non-US version.
Only in Printed Form (Score:2)
This is why Applied Cryptography's source CD is not shipped with the book as it would be illegal to export the CD without a license (but not the book containing the same information printed out).
Cryptography (Score:1)
Re:The contest... (Score:1)
I think it would still be worthwhile to participate. As I recall, the first 4 or 5 codes were somewhat trivial. Also, each code is something like an order of magnitude harder to break than the one previous to it. It may be years before the last two codes are broken. If all ten codes are not broken by October, the contest will strech to the year 2010.
An Excellent Book (Score:1)
Re:The contest... (Score:1)