CRYPTOGRAPHY

General

H - L

Hagerty, Alexander. "An Unpublished Yardley Manuscript." Cryptologia 23, no. 4 (Oct. 1999): 289-297.

The author discusses an unpublished manuscript Yardley wrote about the attack on Pearl Harbor. Yardley's manuscript "contains more spin than substance" and "is merely a curiosity."

Haldane, R.A. The Hidden World. New York: St. Martin's 1976. London: Hale, 1976.

Hannah, Theodore M. "Frank B. Rowlett: A Personal Profile." Cryptologic Spectrum (Spring 1981): 4-22. [Petersen]

Hassard, John R. "Cryptography in Politics." North American Review 128 (Mar. 1879): 315-325. [Petersen]

Haswell, John H. "Secret Writing." The Century Illustrated Monthly Magazine 85 (Nov. 1912-Apr. 1913): 83-92. [Petersen]

Joyner, David, ed. Coding Theory and Cryptography: From Enigma and Geheimschreiber to Quantum Theory. New York: Springer, 2000.

Kahn, David.

Kahn's seminal writings on cryptography are presented in a separate "KAHN" file.

Karpman, Gilbert. Cryptologie: Une histoire de ecritures secrètes des origines à nos jours. [Cryptology: A History of Secret Writing from the Origins to Today] Panazol, France: LaVauzelle, 2006.

Kahn, Cryptologia 31.3 (Jul. 2007), says that this work "refreshes our view of cryptology." The author "looks at the field in an original way and sheds a new light upon old knowledge.... This is an original and useful book."

Kelley, Stephen J. "The SIGCUM Story: Cryptographic Failure, Cryptographic Success." Cryptologia 21, no. 4 (Oct. 1997): 289-316.

William Friedman and Frank Rowlett cooperated on the design of a cryptographic device (Converter M-228 or SIGCUM) to encipher teletype traffic. The system was placed into service in January 1943. Rowlett discovered that the system was insecure, and achieved its prompt removal from service.

Kippenhahn, Rudolf. Tr., Ewald Osers. Code Breaking: A History and Explanation. Woodstock, NY: Overlook, 1999.

For Kahn, IJI&C 13.1, this "book, a collection of stories and elementary lessons about cryptology, lacks structure and is riddled with errors." Kruh, Cryptologia 24.1, cuts the author a bit more slack, noting that the book covers "a wide variety of topics with many interesting stories, including a few not widely known."

Kruh, Louis.

1. "An Armchair View of the Smithsonian Institution Cipher Machine Exhibit." Cryptologia 9, no. 1 (Jan. 1985): 38-51.

This article surveys (photographs of some of the machines exhibited are included) the Smithsonian exhibition "Cipher Machines: World War I-World War II."

2. "Early Communications Security in the U.S. Navy." Cryptologia 9, no. 4 (Oct. 1985): 324-331.

3. "The Navy Cipher Box Mark II." Cryptologia 6, no. 1 (Jan. 1982): 85-93.

4. "Reminiscences of a Master Cryptologist." Cryptologia 4, no. 1 (Jan. 1980): 45-50.

Petersen: "Frank B. Rowlett."

5. "The Shortsighted View of a Foresighted Admiral." Cryptologia 11, no. 3 (Jul. 1987): 156-159.

Petersen: "Adm. Hooper and Herbert Yardley."

6. "Stimson, the Black Chamber, and the 'Gentlemen's Mail' Quote." Cryptologia 12, no. 2 (Apr. 1988): 65-83.

Lowenthal calls this article a "[f]resh, well-researched look at one of the most famous incidents ... in U.S. intelligence history." Similarly, Sexton sees it as a "thorough examination of the circumstances and reasons for Secretary Stimson's withdrawal of State Department support of Yardley's Black Chamber."

7. "Tales of Yardley: Some Sidelights to His Career." Cryptologia 13, no. 4 (Oct. 1989): 327-357.

8. And Ralph Erskine. "Yardley Revisited, Again." Cryptologia 13, no. 1 (Jan. 1989): 85-88.

Kullback, Solomon. Statistical Methods in Cryptanalysis. Laguna Hills, CA: Aegean Park Press, 1976.

Laffin, John. Codes and Ciphers: Secret Writing Through the Ages. New York: Harper & Row, 1964. [Wilcox]

Lambert, Mike [CAPT/USN]. "The Navy's Cryptologic Community -- A Transformational Phoenix?" U.S. Naval Institute Proceedings 132, no. 10 (Oct. 2005): 74-75. Naval Intelligence Professionals Quarterly 22, no. 1 (Jan. 2006): 32-33.

"Rising from the ashes of decline, the Naval Security Group (the Navy's cryptologic community) is seeing the benefits of its transformation from a legacy signals intelligence (SIGINT) collection, analysis, and reporting organization to a truly multi-faceted 'information operations' organization."

Jacoby, "From the Chairman," NIPQ 22.3 (Jun. 2006): 3, takes issue with some of Lambert's commentary. Jacoby argues that "[t]he need [for change] can be stated in more positive terms.... The case might be better made by talking about relevance and integration of Navy's SIGINT and Information Warfare capabilities into the broader mosaic that is absolutely essential to dealing with the very difficult intelligence challenges of today's war."

Leary, Thomas (Penn). "Cryptography in the 15th and 16th Century." Cryptologia 20, no. 3 (Jul. 1996): 223-242.

Lewis, Frank W. Solving Cipher Problems: Cryptanalysis, Probabilities and Diagnostics. Laguna Hills, CA: Aegean Park Press, 1992.

Lunde, Paul, ed. The Book of Codes: Understanding the World of Hidden Messages. Berkeley, CA: University of California Press, 2009.

Christensen, Cryptologia 34.3 (Jul. 2010), says that this "lavishly illustrated" coffee-table book would make a good gift. "The story of cryptology (and a lot more) is told in a reasonable, quick, and visually attractive way."

Lysing, Henry. Secret Writing: An Introduction to Cryptograms, Ciphers, and Codes. New York: Dover, 1974. [Petersen]

Return to Cryptography Table of Contents