Churchhouse, Robert F. Codes and Ciphers: Julius Caesar, the Enigma and the Internet. Cambridge: Cambridge University Press, 2002.
Note from the Royal Historical Society Database: "Describes and analyses cipher systems from the earliest and most elementary to the most recent and sophisticated, but contains historical material relating to the period 1914-1945 and a chapter on wartime Enigma cipher machine."
Cole, Eric. Hiding in Plain Sight: Steganography and the Art of Covert Communication. Indianapolis, IN: Wiley, 2003.
Dam, Kenneth W, and Herbert S. Lin, eds. Cryptography's Role in Securing the Information Society. Washington, DC: National Academy of Sciences Press, 1996.
Cooper, FA 76.2 (Mar.-Apr. 1996), identifies this as the work of a 16-member committee, which airs "all aspects of public policy toward cryptography.... The committee argues for much more general availability and much greater use of cryptography." The report "contains a wealth of information."
Deavours, Cipher A., et. al., eds.
1. Cryptology: Machines, History, and Methods. Dedham, MD: Artech House, 1989.
Surveillant 1.1 identifies this work as "52 papers selected from Cryptologia magazine." Nautical Brass Online, http://members. aol.com/nbrass/biblio.htm, finds "[a] great deal of interesting material" here.
2. Cryptology Yesterday, Today, and Tomorrow. Dedham, MD: Artech House, 1987.
According to Nautical Brass Online, http://members.aol.com/ nbrass/biblio.htm, this is a "compilation of articles from Cryptologia" magazine, covering such topics as "history, personalities, machines, [and] mathematical approaches."
3. Selections from CRYPTOLOGIA: History, People and Technology. Boston & London: Artech House, 1998.
Erskine, I&NS 14.3, notes that this compilation contains 35 contributions published in the journal Cryptologia from 1987 to 1996. For the most part, "the articles are of a high standard." However, "[s]ome of the reminiscences ramble on, and add little to our knowledge."
Deavours, Cipher A., and Louis Kruh. Machine Cryptography and Modern Cryptanalysis. Dedham, MD: Artech House, 1985. London: Adtech Book Co., 1985.
According to Petersen, the work "[f]ocuses on the inter-war period and the U.S. solution of Japanese codes." Sexton notes, however, that the authors continue their narrative through the introduction of cryptanalytic computers in the 1960s, and terms the work an "essential source for those concerned with cryptanalysis and Communications Intelligence."
Miller, IJI&C 1.3, says this is an "absolutely superb book that will enable an ordinary reader to obtain a very good idea indeed of how machine ciphers can be broken." It is "authoritative." Erskine, I&NS 1.2, notes that parts of this book "are very technical"; nevertheless, the text "can generally be followed, given application, without existing cryptanalytical knowledge." Regrettably, the authors "are not always sound on historical detail, especially with Enigma." Overall, however, the book's "weaknesses are far outweighed by its merits."
de Lastours, Sophie, ed. Le Chiffre, le renseignement, et la guerre. [Cipher, Intelligence, and War] Paris: L'Harmattan, 2002.
According to Kahn, I&NS 23.2 (Apr. 2008), this volume consists of "19 studies presented at a conference in Peronne, near Amiens, 21 and 22 March 2001."
de Leeuw, Karl. "Johann Friedrich Euler (1741-1800): Mathematician and Cryptologist at the Court of the Dutch Stadholder William V." Cryptologia 25, no. 4 (Oct. 2001): 256-274.
de Leeuw, Karl, and Jan Bergstra, eds. The History of Information Security: A Comprehensive Handbook. Boston and Amsterdam: Elsevier, 2007.
Peake, Studies 52.4 (Dec. 2008) and Intelligencer 17.1 (Winter-Spring 2009), sees the 29 contributions in this reference work as offering "a far-reaching view of information security." It includes a "stimulating analysis of KGB Cold War eavesdropping operations that is based mainly on Russian sources.... This work provides well-documented historical background and an astute assessment of the role information security will play in today's society."
For Erskine, JIH 7.2 (Winter 2007-2008), "[t]his book is very ambitious and wide-ranging in its scope.... Some chapters seem to have been completed by mid-2005, and are therefore not quite as up-to-date as one might expect..... Some minor repetitions in different chapters should have been eliminated.... The main index should have been expanded, since this is a reference book. However, these are minor blemishes in a major work. Overall, one must be very impressed by the enormous amount of time and effort that the editors and authors have put into this well-produced volume."
1. "Yardley on Yap." Intelligence and National Security 9, no. 1 (Jan. 1994): 112-122.
The case for the contribution of the Black Chamber "can be better made round the Yap question arising in the course of the communications conference and settled within days of the opening of the Washington Conference, rather than the naval ratios, which have hitherto attracted the attention of historians."
2. "Yardley's Diplomatic Secrets." Cryptologia 18, no. 2 (Apr. 1994): 81-127.
This is an important piece of the great puzzle represented by Herbert Yardley, and should be read by anyone interested in American history of the interwar period or in cryptologic matters generally. The author focuses on the Yardley who wrote the unpublished manuscript, "Japanese Diplomatic Secrets," completed in 1933 and discovered by David Kahn in 1968.
Denniston views Yardley as "a clever operator and an original man, whose inherent characteristics made him his own worst enemy.... [H]is absence from cryptanalytical progress in America in the 1930s ... stemmed from the flaws in his own character. By publishing The American Black Chamber, with its false claims and dangerous revelations..., he threw away his longterm credibility."
Dooley, John F. "Was Herbert O. Yardley a Traitor?" Cryptologia 35, no. 1 (Jan. 2011): 1-15.
The author refutes Farago's accusation that Yardley sold the Japanese "decrypted Japanese diplomatic messages and the techniques used in their solution." Dooley's conclusion that "[t]here does not seem to be any hard evidence that [Yardley] was a traitor" is concurred in by David Kahn, "Letter to the Editor," Cryptologia 35, no. 2 (Apr. 2011): 109. On the other hand, Stephan Budiansky, "Letter to the Editor," Cryptologia 35, no. 3 (Jul. 2011): 199-202, suggests that there is "no slam-dunk exoneration of Yardley and it is well within the the realm of the possible" that the Sakuma memo "was reporting no more than the literal truth."
Ferguson, Niels, and Bruce Schneir. Practical Cryptography. Hoboken, NJ: Wiley, 2003.
Kruh, Cryptologia 28.2, identifies the authors as "two of the world's top cryptologic experts.... [They] provide the first hands-on guide" to implementing cryptography and incorporating it into real-world systems.
Friedman, William F.
Materials by and on "the father of American cryptography" are presented in a separate "FRIEDMAN" file.
Gaines, Helen F. Cryptanalysis. New York: Dover, 1956. [Petersen]
Return to Cryptography Table of Contents