Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
A brief history of cryptology and cryptographic algorithms
Dooley J., Springer Publishing Company, Incorporated, New York, NY, 2013. 118 pp.  Type: Book (978-3-319016-27-6)
Date Reviewed: Mar 26 2014

Despite its brevity, this 96-page book provides a detailed survey of cryptology from Julius Caesar’s time to 2001. Most readers will find the cryptographic algorithms included at specific points to be of greatest interest. In short, the work has restricted but specific appeal to cryptographers.

In nine chapters, there is a parallel rise from the real beginning of codes and ciphers generated by the need for secrecy and diplomacy during the creation of modern nations and city-states. Dooley discusses “black chambers,” described as “those organizations created by the newly formed nations to break the codes and ciphers of their neighbors.” The 19th century ushered in the era of the telegraph, and the “breaking of the unbreakable cipher, the Vignere,” despite a dearth of traditional cryptography. Radio “marked the advent of modern cryptology” during World War I. In the interwar period, cryptology became a permanent fixture of the American military, and during World War II, radio necessitated “vastly increased security, speed, and accuracy,” resulting in the development of the Enigma and M-134C/SIGABA encryption devices. Modern cryptology was standardized with the introduction of the US Federal Data Encryption Standard (DES), which was then superseded by the Advanced Encryption Standard (AES). The summary of the history of the field culminates with a discussion of the key exchange problem involving the transmission of a public key and private key, in which the same key is used for both enciphering and deciphering.

The primary value of the work is for those interested in the development of DES and AES, or for those working on the key exchange issue, which lies at the heart of the RSA algorithm. It will also be useful for readers who might want to use it as a text in computer security courses, especially since that is how the author intended it in the first place. Readers who require more comprehensive references about cryptology might consider David Kahn’s book [1] or, for a more mathematical approach, Craig Bauer’s [2].

Reviewer:  G. Mick Smith Review #: CR142115 (1406-0403)
1) Kahn, D. The codebreakers: the story of secret writing (rev. ed.). Scribner, New York, NY, 1996.
2) Bauer, C. P. Secret history: the story of cryptology. CRC Press, Boca Raton, FL, 2013.
Bookmark and Share
  Reviewer Selected
Featured Reviewer
 
 
Data Encryption (E.3 )
 
 
Software (K.2 ... )
 
Would you recommend this review?
yes
no
Other reviews under "Data Encryption": Date
 Blockchain basics: a non-technical introduction in 25 steps
Drescher D.,  Apress, New York, NY, 2017. 255 pp. Type: Book (978-1-484226-03-2)
Oct 26 2017
Guide to pairing-based cryptography
El Mrabet N., Joye M.,  Chapman & Hall/CRC, Boca Raton, FL, 2016. 420 pp. Type: Book (978-1-498729-50-5)
Sep 27 2017
Algebra for cryptologists
Meijer A.,  Springer International Publishing, New York, NY, 2016. 301 pp. Type: Book (978-3-319303-95-6)
Mar 20 2017
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2017 ThinkLoud, Inc.
Terms of Use
| Privacy Policy