Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
A brief history of cryptology and cryptographic algorithms
Dooley J., Springer Publishing Company, Incorporated, New York, NY, 2013. 118 pp.  Type: Book (978-3-319016-27-6)
Date Reviewed: Mar 26 2014

Despite its brevity, this 96-page book provides a detailed survey of cryptology from Julius Caesar’s time to 2001. Most readers will find the cryptographic algorithms included at specific points to be of greatest interest. In short, the work has restricted but specific appeal to cryptographers.

In nine chapters, there is a parallel rise from the real beginning of codes and ciphers generated by the need for secrecy and diplomacy during the creation of modern nations and city-states. Dooley discusses “black chambers,” described as “those organizations created by the newly formed nations to break the codes and ciphers of their neighbors.” The 19th century ushered in the era of the telegraph, and the “breaking of the unbreakable cipher, the Vignere,” despite a dearth of traditional cryptography. Radio “marked the advent of modern cryptology” during World War I. In the interwar period, cryptology became a permanent fixture of the American military, and during World War II, radio necessitated “vastly increased security, speed, and accuracy,” resulting in the development of the Enigma and M-134C/SIGABA encryption devices. Modern cryptology was standardized with the introduction of the US Federal Data Encryption Standard (DES), which was then superseded by the Advanced Encryption Standard (AES). The summary of the history of the field culminates with a discussion of the key exchange problem involving the transmission of a public key and private key, in which the same key is used for both enciphering and deciphering.

The primary value of the work is for those interested in the development of DES and AES, or for those working on the key exchange issue, which lies at the heart of the RSA algorithm. It will also be useful for readers who might want to use it as a text in computer security courses, especially since that is how the author intended it in the first place. Readers who require more comprehensive references about cryptology might consider David Kahn’s book [1] or, for a more mathematical approach, Craig Bauer’s [2].

Reviewer:  G. Mick Smith Review #: CR142115 (1406-0403)
1) Kahn, D. The codebreakers: the story of secret writing (rev. ed.). Scribner, New York, NY, 1996.
2) Bauer, C. P. Secret history: the story of cryptology. CRC Press, Boca Raton, FL, 2013.
Bookmark and Share
  Reviewer Selected
Featured Reviewer
Data Encryption (E.3 )
Software (K.2 ... )
Would you recommend this review?
Other reviews under "Data Encryption": Date
 Cracking codes with Python: an introduction to building and breaking ciphers
Sweigart A.,  No Starch Press, San Francisco, CA, 2018. 416 pp. Type: Book (978-1-593278-22-9)
Jun 1 2018
Tutorials on the foundations of cryptography: dedicated to Oded Goldreich
Lindell Y.,  Springer International Publishing, New York, NY, 2017. 450 pp. Type: Book (978-3-319570-47-1)
Jun 1 2018
 Mathematical modelling for next-generation cryptography: CREST Crypto-Math Project
Takagi T., Wakayama M., Tanaka K., Kunihiro N., Kimoto K., Duong D.,  Springer International Publishing, New York, NY, 2017. 368 pp. Type: Book
May 1 2018

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2018 ThinkLoud, Inc.
Terms of Use
| Privacy Policy