From: Michael Edward Marotta <mercury@well.sf.ca.us>
To: cypherpunks@toad.com
Message Hash: dd68d6823695842d5a1c24a3c4c3e78e3ede1fbae6efba657c210197ef9716b7
Message ID: <199401061036.CAA17662@well.sf.ca.us>
Reply To: N/A
UTC Datetime: 1994-01-06 10:39:51 UTC
Raw Date: Thu, 6 Jan 94 02:39:51 PST
From: Michael Edward Marotta <mercury@well.sf.ca.us>
Date: Thu, 6 Jan 94 02:39:51 PST
To: cypherpunks@toad.com
Subject: A Crypto Biblio
Message-ID: <199401061036.CAA17662@well.sf.ca.us>
MIME-Version: 1.0
Content-Type: text/plain
number 006 CLACKER'S DIGEST December 6, 1992.
philosophy and applications for analytical engines
------------------------------------------------------------------
(46 lines) A Cryptography Bibliography by mercury@well.sf.ca.us
(Technically, cryptography is MAKING codes while cryptanalysis is
BREAKING them. Both are subsumed under cryptology. A CIPHER is
a regular transposition such as A=Z, B=Y, etc., while a CODE is a
table of arbitrary symbols.)
Kahn, David, THE CODEBREAKERS, MacMillan, 1967. The MOST
complete history with specific examples. Written before public
keys, RSA, etc., but still THE place to start.
Marotta, Michael, THE CODE BOOK, Loompanics, 1987, Overview of
history and post-1967 developments.
Sinkov, Abraham, ELEMENTARY CRYPTANALYSIS: A MATHEMATICAL
APPROACH, Random House, 1968. Sinkov worked for Friedman on the
breaking of Purple. First rate.
Gaines, Helen Fouche, CRYPTANALYSIS, Dover, 1956. A classic
work. The first step to breaking codes and ciphers.
Lysing, Henry, SECRET WRITING, Dover, 1974. Another reprint of
another classic.
Smith, Laurence Dwight, CRYPTOGRAPHY, Dover, 1955. Ditto.
Konheim, Alan G., CRYPTOGRAPHY: A PRIMER, John Wiley, 1981.
Textbook for mathematicians from IBM's Watson Center. Includes
public keys, digital signatures.
Meyer, Carl H., and Matyas Stephen M., CRYPTOGRAPHY, John Wiley,
1982. From IBM Cryptography Competency Center. For computers,
includes public keys, digital signatures.
Weber, Ralph E., UNITED STATES DIPLOMATIC CODES AND CIPHERS 1775-
1938, Precedent, 1979. Not just a history! The appendix
contains the all the keys!!
Chadwick, THE DECIPHERMENT OF LINEAR B, Vintage, 1958. Worked with
Michael Ventris on unraveling Minoan script.
Yardley, Herbert O., THE AMERICAN BLACK CHAMBER, Ballantine 1981,
Random House, 1931. Yardley broke German ciphers in WWI and then
Japanese ciphers of 1920, and was fired in 1931 because "Gentlemen
don't read each other's mail."
(anonymous), THE DATA ENCRYPTION STANDARD, National Bureau of
Standards, January 1977, NTIS NBS-FIPS PUB 46.
(anonymous), DATA SECURITY AND THE DATA ENCRYPTION STANDARD,
National Bureau of Standards, 1978, Pub 500-27; CODEN: XNBSAV.
Rivest, Ronald L., Shamir, A., and Adleman, L., "A Method for
Obtaining Digital Signatures and Public-key Cryptosystems,"
COMMUNICATIONS OF THE ACM, February, 1979. The last word.
-------------------------- 30 ------------------------------------
Return to January 1994
Return to “Michael Edward Marotta <mercury@well.sf.ca.us>”
1994-01-06 (Thu, 6 Jan 94 02:39:51 PST) - A Crypto Biblio - Michael Edward Marotta <mercury@well.sf.ca.us>