1994-01-06 - A Crypto Biblio

Header Data

From: Michael Edward Marotta <mercury@well.sf.ca.us>
To: cypherpunks@toad.com
Message Hash: dd68d6823695842d5a1c24a3c4c3e78e3ede1fbae6efba657c210197ef9716b7
Message ID: <199401061036.CAA17662@well.sf.ca.us>
Reply To: N/A
UTC Datetime: 1994-01-06 10:39:51 UTC
Raw Date: Thu, 6 Jan 94 02:39:51 PST

Raw message

From: Michael Edward Marotta <mercury@well.sf.ca.us>
Date: Thu, 6 Jan 94 02:39:51 PST
To: cypherpunks@toad.com
Subject: A Crypto Biblio
Message-ID: <199401061036.CAA17662@well.sf.ca.us>
MIME-Version: 1.0
Content-Type: text/plain


    number 006            CLACKER'S DIGEST           December 6, 1992. 
           philosophy and applications for analytical engines    
    ------------------------------------------------------------------
    (46 lines)  A Cryptography Bibliography by mercury@well.sf.ca.us
    
    (Technically, cryptography is MAKING codes while cryptanalysis is 
    BREAKING them.  Both are subsumed under cryptology.  A CIPHER is 
    a regular transposition such as A=Z, B=Y, etc., while a CODE is a 
    table of arbitrary symbols.)
    Kahn, David, THE CODEBREAKERS, MacMillan, 1967.  The MOST 
      complete history with specific examples.  Written before public 
      keys, RSA, etc., but still THE place to start. 
    Marotta, Michael, THE CODE BOOK, Loompanics, 1987, Overview of 
      history and post-1967 developments. 
    Sinkov, Abraham, ELEMENTARY CRYPTANALYSIS: A MATHEMATICAL 
      APPROACH, Random House, 1968.  Sinkov worked for Friedman on the 
      breaking of Purple.  First rate. 
    Gaines, Helen Fouche, CRYPTANALYSIS, Dover, 1956. A classic 
      work.  The first step to breaking codes and ciphers. 
    Lysing, Henry, SECRET WRITING, Dover, 1974.  Another reprint of 
      another classic. 
    Smith, Laurence Dwight, CRYPTOGRAPHY, Dover, 1955.  Ditto. 
    Konheim, Alan G., CRYPTOGRAPHY: A PRIMER, John Wiley, 1981.
      Textbook for mathematicians from IBM's Watson Center. Includes 
      public keys, digital signatures. 
    Meyer, Carl H., and Matyas Stephen M., CRYPTOGRAPHY, John Wiley, 
      1982. From IBM Cryptography Competency Center.  For computers,
      includes public keys, digital signatures. 
    Weber, Ralph E., UNITED STATES DIPLOMATIC CODES AND CIPHERS 1775-
      1938, Precedent, 1979.  Not just a history!  The appendix 
      contains the all the keys!! 
    Chadwick, THE DECIPHERMENT OF LINEAR B, Vintage, 1958. Worked with 
      Michael Ventris on unraveling Minoan script.
    Yardley, Herbert O., THE AMERICAN BLACK CHAMBER, Ballantine 1981, 
    Random House, 1931.  Yardley broke German ciphers in WWI and then 
    Japanese ciphers of 1920, and was fired in 1931 because "Gentlemen 
    don't read each other's mail." 
    (anonymous), THE DATA ENCRYPTION STANDARD,  National Bureau of 
      Standards, January 1977, NTIS NBS-FIPS PUB 46. 
    (anonymous), DATA SECURITY AND THE DATA ENCRYPTION STANDARD, 
    National Bureau of Standards, 1978, Pub 500-27; CODEN: XNBSAV. 
    Rivest, Ronald L., Shamir, A., and Adleman, L., "A Method for 
      Obtaining Digital Signatures and Public-key Cryptosystems," 
      COMMUNICATIONS OF THE ACM, February, 1979.  The last word. 
    -------------------------- 30 ------------------------------------
 





Thread