Deavours, Cipher A. "Helmich and the KL-7." Cryptologia 6, no. 3 (1982): 283-284.
Deavours, Cipher A. "Lobsters, Crabs, and the Abwehr Enigma." Cryptologia 21, no. 3 (Jul. 1997): 193-199.
The author discusses the Abwehr's variant of the Enigma cryptograph and identifies some of the machine's cryptanalytic weaknesses.
Deavours, Cipher A. "Shutting Off the Spigot in 1981." Cryptologia 5, no. 1 (1981): 43-45.
Petersen: "NSA restraints on private research in cryptology."
Deavours, Cipher A., et. al., eds.
1. Cryptology: Machines, History, and Methods. Dedham, MD: Artech House, 1989.
Surveillant 1.1 identifies this work as "52 papers selected from Cryptologia magazine." Nautical Brass Online, http://members. aol.com/nbrass/biblio.htm, finds "[a] great deal of interesting material" here.
2. Cryptology Yesterday, Today, and Tomorrow. Dedham, MD: Artech House, 1987.
According to Nautical Brass Online, http://members.aol.com/ nbrass/biblio.htm, this is a "compilation of articles from Cryptologia" magazine, covering such topics as "history, personalities, machines, [and] mathematical approaches."
3. Selections from CRYPTOLOGIA: History, People and Technology. Boston & London: Artech House, 1998.
Erskine, I&NS 14.3, notes that this compilation contains 35 contributions published in the journal Cryptologia from 1987 to 1996. For the most part, "the articles are of a high standard." However, "[s]ome of the reminiscences ramble on, and add little to our knowledge."
Deavours, Cipher A., and Louis Kruh. Machine Cryptography and Modern Cryptanalysis. Dedham, MD: Artech House, 1985. London: Adtech Book Co., 1985.
According to Petersen, the work "[f]ocuses on the inter-war period and the U.S. solution of Japanese codes." Sexton notes, however, that the authors continue their narrative through the introduction of cryptanalytic computers in the 1960s, and terms the work an "essential source for those concerned with cryptanalysis and Communications Intelligence."
Miller, IJI&C 1.3, says this is an "absolutely superb book that will enable an ordinary reader to obtain a very good idea indeed of how machine ciphers can be broken." It is "authoritative." Erskine, I&NS 1.2, notes that parts of this book "are very technical"; nevertheless, the text "can generally be followed, given application, without existing cryptanalytical knowledge." Regrettably, the authors "are not always sound on historical detail, especially with Enigma." Overall, however, the book's "weaknesses are far outweighed by its merits."
Deavours, Cipher A., and James Reeds. "The Enigma -- Historical Perspective." Cryptologia 1, no. 4 (Oct. 1977): 381-391.
Sexton lauds this article as an "excellent and understandable account of the technical development of the ENIGMA cipher machine."
Return to De - Deb