Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×
Encryption Books Media Security Book Reviews

Code Breaking 8

Code Breaking: A History and Exploration has joined Simon Singh's The Code Book on my bookshelf, and it's hard to read either of these books without comparing it to the other. If you've read the Singh book, though, you'll certainly find that the material covered overlaps heavily. Read on to find out if you'd enjoy checking out Kippenhahn's work.

Code Breaking: A History and Exploration
author Rudolf Kippenhahn
pages 283
publisher The Overlook Press
rating 8.5
reviewer timothy
ISBN 1-58567-089-8
summary A readable, lucid introduction to encryption with an emphasis on WWII applications, but with a range from Caesar to PGP.

*

The Big Picture

Lucidly, and in the way of great teachers who neither baffle nor condescend, Kippenhahn tells the story of how encryption and cryptanalysis has evolved through the ages, and sprinkles examples and reader exercises throughout. Unlike Singh's book, though, which starts its historical wanderings with Mary, Queen of Scots, Kippenhahn's draws the largest chunk of its examples from World War II. Given the scope and innovation in encryption that occurred in WWII, this can hardly be seen as a limitation. In fairness, that's not to say that many of his examples don't come from other times before or since World War II. Some of the hard to overlook techniques of encryption, as well several of the famous coded messages on which some of the turns of modern history have hinged are represented here. For instance, the Zimmerman telegram, probably one the most-pivotal, least-talked-about-in-school transmissions of the century, draws several pages explaining how the American and British espionage services ended up cracking the message which could have led to war between Mexico and the U.S.

As the book progresses, examples from newer and older times (and contexts from literature to lovers' secret messages) are presented with enough panache to make you forget that this is a book about a topic which is often rendered dry as dust.

In taking this broad-sighted approach, Kippenhahn has opened his book to a wider audience than likely browse the computer-books section in the local Barnes & Noble.

Revisiting the two big wars of this century provides an excellent backdrop, but modern developments in secret writing are not neglected; the latter parts of the book include a description of several modern encryption schemes (usually using DES as the example), and a comprehensible explanation of public-key encryption.

Points to Consider

Everything is not perfect, though: Kippenhahn, for example, does not touch on some of the newest developments in encryption and cryptanalysis. The book was first published in English only in 1998, though, and it's hard to fault him for not attempting to delve into the possibilities of quantum computers for either side of the secrecy game.

Interestingly, this work in a translation of a German text (Kippenhahn collaborated in Ewald Osers' translation), but as Kippenhahn points out in his introduction, it's more than a simple translation; the examples in many cases have been transformed from the original to work well with English words and frequency tables rather than German.

This book is definitely not aimed at experts who wish to pick up subtle points or learn the latest developments in encryption; instead, it's a historical overview which happens to teach the classic techniques of encryption and decryption through examples. If you want Applied Cryptography, buy that instead. (Or in addition -- no reason not to be well-rounded!)

The Upshot:

Back to the inevitable comparison to The Code Book: If you've read Singh's book, and enjoyed it, you won't regret reading Code Breaking, but it might be wise to browse it before buying, to make sure that similarities won't leave you with too bad a sense of deja vu. If you've read neither one, Kippenhahn's work is no less stimulating.

  1. Secret Writing in War and Peace
  2. Hidden Messages and Codebooks
  3. Codebooks in World War I
  4. He Came, He Saw, He Encoded
  5. How a Monalphabetic Code is Cracked
  6. Caesars in Rank and File
  7. Keywords Without End
  8. Shuffled Texts
  9. From Coding Disk To Enigma
  10. Enigma's Secret is Revealed
  11. The Arrival of the Computer
  12. Encryption Quite Publicly
  13. Smart Cards, One-way Functions, and Mousetraps
  • Appendix A: A homemade encrypting machine
  • Appendix B: Your computer as Enigma
  • Appendix C: How the three magic keys are determined
  • Appendix D: PGP, the encryption program from the Internet


You can purchase this book at ThinkGeek.

This discussion has been archived. No new comments can be posted.

Code Breaking

Comments Filter:
  • by Mordred ( 104619 ) on Tuesday February 06, 2001 @05:28AM (#452866) Homepage
    I haven't read the book, but this description makes it sound interesting and I think I'll check it out. Personally I don't think the majority of the book focusing on WWII is any kind of limitation at all. After all that was when most of the major advancements in the field started to take place. I suppose that some might prefer earlier historical examples, but to me they don't sound all that interesting. Sure people have been using substitution cyphers for over a thousand years, but once you've read about one, you've read about them all.

    As this was originally a German book I'm wondering if it might not shed a different light on the Nazi code breaking techniques used during WWII. Seems to me that the perspective shown here might be somewhat different than those that crop up in American texts.

    Mordred

  • by JohnnyX ( 11429 ) on Tuesday February 06, 2001 @05:32AM (#452867) Homepage Journal
    David Kahn's The Code Breakers is longer (1181 pp), better researched (with 153 pages of endnotes), and more detailed about the actual history of cryptography, though probably not as lurid. That, and it was written about 30 years earlier, though an updated version was released in 1996.

    Yours truly,
    Mr. X

    ...better book...
  • The number of grammatical mistakes, missing words, and general incoherencies make me wonder if this review hasn't been pass through babblefish at least once.

    "For instance, the Zimmerman telegram, for instance,..." (enough "for instance"'s?)

    "the examples in many cases have been transformed from to work well ..." (transformed from what?)

    The number of "though"'s is troubling to say the least.

    Please. Learn how to proof read!
  • by Anonymous Coward
    UID 2706 and you haven't noticed yet how mindlessly illiterate the Slash-duh e-duh-tors are. Where have you been all these years?
  • David Kahn's The Code Breakers is longer (1181 pp), better researched (with 153 pages of endnotes), and more detailed about the actual history of cryptography, though probably not as lurid. That, and it was written about 30 years earlier, though an updated version was released in 1996.
    Books about cryptography probably aren't lurid as a rule, although that might help their sales.
  • by Gis_Sat_Hack ( 101484 ) on Tuesday February 06, 2001 @06:06AM (#452871) Homepage
    Andrew Hodges "Alan Turing: The Enigma of Intelligence" has some good bits of crypto history too.
    Despite being a biography and published by Counterpoint, it also fails the 'lurid' test.
    However the inclusion of material on halting, incompleteness & the possible source of the Apple logo, more than make up for the lack of goat links.
  • I'm currently engrosed in reading my on a winding path through Applied Cryptography. It's not exactly a history of encryption, but I think it covers a lot of the bases that you mention from the point of view of teaching you how to DO crypto, not just LOOKING at it.

    Sounds like most your time would be well served checking out Applied Cryptography first and settling on the more historical books if you find that A.P.'s not your bag of tea (and it won't be most people's).

    That said, everyone who programs should read the first couple of chapters, the section on politics and the afterward of A.P. Skimming the protocols is also a good idea even if you just have to touch a high-level protocol (like SSL) from a distance.

    A.P. is already getting me excited about some new projects. I started trying to write a pure-Perl implimentation of Diffie-Helman, and found myself side-tracked on trying to do efficient prime-generation. I've no decided to fork off into creating a repository of example perl programs of which my "mkprime" will be the first. Perl is a vastly under-used teaching language with the best features of C++ (for hiding some of the more complex details like arbitrary-precision math), LISP (for abstraction and algorithmic clarity) and C (for access to low-level details).

    Any suggestions on how to publicize such a site?

  • Timothy briefly mentions Applied Cryptography [counterpane.com], but it really deserves more than just a mention. From a review in Sunworld [sunworld.com]: "This 700-plus-page magnum opus is one of the finest technical books I have ever read, easily satisfying my requirements of readability, accessibility, and depth."

    Really, it's that good. Even the often-critical Slashdot reviews [slashdot.org] found it to be "Outstanding". If you have even a passing interest in cryptography, I'd highly recommend picking up this book [bestwebbuys.com]. Just don't buy it from Amazon [noamazon.com], please :).

    Alex Bischoff
    ---

The truth of a proposition has nothing to do with its credibility. And vice versa.

Working...