Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
A brief history of cryptology and cryptographic algorithms
Dooley J., Springer Publishing Company, Incorporated, New York, NY, 2013. 118 pp.  Type: Book (978-3-319016-27-6)
Date Reviewed: Mar 26 2014

Despite its brevity, this 96-page book provides a detailed survey of cryptology from Julius Caesar’s time to 2001. Most readers will find the cryptographic algorithms included at specific points to be of greatest interest. In short, the work has restricted but specific appeal to cryptographers.

In nine chapters, there is a parallel rise from the real beginning of codes and ciphers generated by the need for secrecy and diplomacy during the creation of modern nations and city-states. Dooley discusses “black chambers,” described as “those organizations created by the newly formed nations to break the codes and ciphers of their neighbors.” The 19th century ushered in the era of the telegraph, and the “breaking of the unbreakable cipher, the Vignere,” despite a dearth of traditional cryptography. Radio “marked the advent of modern cryptology” during World War I. In the interwar period, cryptology became a permanent fixture of the American military, and during World War II, radio necessitated “vastly increased security, speed, and accuracy,” resulting in the development of the Enigma and M-134C/SIGABA encryption devices. Modern cryptology was standardized with the introduction of the US Federal Data Encryption Standard (DES), which was then superseded by the Advanced Encryption Standard (AES). The summary of the history of the field culminates with a discussion of the key exchange problem involving the transmission of a public key and private key, in which the same key is used for both enciphering and deciphering.

The primary value of the work is for those interested in the development of DES and AES, or for those working on the key exchange issue, which lies at the heart of the RSA algorithm. It will also be useful for readers who might want to use it as a text in computer security courses, especially since that is how the author intended it in the first place. Readers who require more comprehensive references about cryptology might consider David Kahn’s book [1] or, for a more mathematical approach, Craig Bauer’s [2].

Reviewer:  G. Mick Smith Review #: CR142115 (1406-0403)
1) Kahn, D. The codebreakers: the story of secret writing (rev. ed.). Scribner, New York, NY, 1996.
2) Bauer, C. P. Secret history: the story of cryptology. CRC Press, Boca Raton, FL, 2013.
Bookmark and Share
  Reviewer Selected
Featured Reviewer
 
 
Data Encryption (E.3 )
 
 
Software (K.2 ... )
 
Would you recommend this review?
yes
no
Other reviews under "Data Encryption": Date
Proxy-assisted access control scheme of cloud data for smart cities
Fan K., Wang J., Wang X., Yang Y.  Personal and Ubiquitous Computing 21(5): 937-947, 2017. Type: Article
Apr 5 2018
Reproducible circularly secure bit encryption: applications and realizations
Hajiabadi M., Kapron B.  Journal of Cryptology 30(4): 1187-1237, 2017. Type: Article
Mar 22 2018
 Fully privacy-preserving and revocable ID-based broadcast encryption for data access control in smart city
Lai J., Mu Y., Guo F., Susilo W., Chen R.  Personal and Ubiquitous Computing 21(5): 855-868, 2017. Type: Article
Jan 10 2018
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2018 ThinkLoud, Inc.
Terms of Use
| Privacy Policy