From the book lists at Adware Report:

All information current as of 19:42:54 Pacific Time, Saturday, 19 February 2005.

Codes and Ciphers : Julius Caesar, the ENIGMA, and the Internet

   by Robert Churchhouse

    Cambridge University Press
    06 December, 2001


   Usually ships in 24 hours

Click the button below to . . .

(which will add the book to your Amazon U.S.A. "Shopping Cart")

. . . or use your browser's Back button to return to the search-list page.

Editorial description(s):

From Book News, Inc.
Convinced that there is a middle way between code books that ignore mathematics altogether and those that assume the full arsenal of graduate-level mathematics, Churchhouse (computing mathematics, Cardiff U., Wales) introduces general readers to a number of codes and ciphers, starting with the ancient and elementary, and progressing through some wartime cipher machines to systems currently in commercial use today. Readers looking for the mathematics will find it in the appendix. Problems are included for class use or self- evaluation.Copyright © 2004 Book News, Inc., Portland, OR

"He has written an excellent book that belongs in your personal library." Cryptologia "Churchhouse (emer., Cardiff Univ., Wales) offers a history and explanation of codes, ciphers, cryptography, and cryptanalysis from Julius Caesar and WWII code-breaking activities to the present day including the world of the Internet. It makes for a most exciting read... An excellent resource to support introductory courses in cryptography or crypt-analysis." Choice

Book Info
Describes and analyzes many cipher systems ranging from the earliest and elementary to the most recent and sophisticated, such as RSA and DES, as well as wartime machines such as the ENIGMA and Hagelin, and ciphers used by spies. Softcover available. --This text refers to the

Book Description
The design of code and cipher systems has undergone major changes in modern times. Powerful personal computers have resulted in an explosion of e-banking, e-commerce and e-mail, and as a consequence the encryption of communications to ensure security has become a matter of public interest and importance. This book describes and analyzes many cipher systems ranging from the earliest and elementary to the most recent and sophisticated, such as RSA and DES, as well as wartime machines such as the ENIGMA and Hagelin, and ciphers used by spies. Security issues and possible methods of attack are discussed and illustrated by examples. The design of many systems involves advanced mathematical concepts and this is explained in detail in a major appendix. This book will appeal to anyone interested in codes and ciphers as used by private individuals, spies, governments and industry throughout history and right up to the present day.

Reader review(s):

You learn how some key encryption machines were made, September 29, 2002
The ability to convert data into a form that is readable only by a selected group has been a matter of utmost importance for thousands of years. The fate of entire nations has rested on the ability of a nation to keep their messages secure or accurately unravel the messages of opponents. The most celebrated cases involve instances of war, where the messages sent by the Germans and Japanese were intercepted and decrypted by the allies. While not decisive in the outcome of the war, the knowledge gained was of enormous value and did a great deal to assist in the victory. By far, the most well known case is that of the Enigma machine used by the Germans in world war two. The British were able to break the code and the knowledge they obtained made a significant difference in the early years of the war.
Encryption is now a foundation pillar of modern society. Trillions of dollars are now electronically exchanged over the course of a year, and the entire world economy is now dependent on the ability of computers to exchange data in a manner that is accurate and secure from fraud. While security over the Internet is the most widely cited example, most of the data is exchanged over private lines.
The first documented case of encryption being used in war is when Julius Caesar used a simple substitution cipher to send orders to his troops. That and all similar codes is where the book begins. After that, there is a very detailed examination of the Enigma and Hagelin machines, right down to how the wheels interact. This part of the book was by far the most interesting, as well as the descriptions of how it was possible for the allied cryptographers to break the Enigma code. It turns out that the breaking of the codes was not due to a flaw in the machine, but in the way it was used. The remaining part of the book is filled with a description of public key cryptography and the applications for the Internet.
The sections on the substitution ciphers and public key cryptography are good but fairly standard. Problems are given at the end of each chapter and solutions are in the back of the book. What makes this book unique is the mechanical descriptions of the Enigma and Hagelin cipher machines. If you are interested only in the mathematics of encryption, then you will most likely not find them interesting. However, if you are like me and are interested in the mechanical aspects of the machines, then you will like it.

well written and for all, August 7, 2004
This is not a schoolbook, yet it takes from the format some usefull features for such a book : you have some worked out examples and a few exercises to practice. After all, math is not something you read like a novel, but rather something you DO! The author understands that.

But the book also has an easy going feel to it and is very clear. Mixed in with the math, you have tidbits of history and general culture mixed in. If you compare it to a very good book out there (the code book by Singh), you find out more about the codes and the mechanics of them in this book.

good read!

{end of page}

(Page code from the SEO Tools, Toys, and Packages site)