The Code Book (66 page)

Read The Code Book Online

Authors: Simon Singh

Tags: ##genre

BOOK: The Code Book
8.9Mb size Format: txt, pdf, ePub
Deutsch, D., and Ekert, A., “Quantum computation,”
Physics World
, vol. 11, no. 3 (March 1998), pp. 33–56.
One of four articles in a special issue of
Physics World
. The other three articles discuss quantum information and quantum cryptography, and are written by leading figures in the subject. The articles are aimed at physics graduates and give an excellent overview of the current state of research.

Internet Sites

The Mystery of the Beale Treasure
http://www.roanokeva.com/stories/beale.html
A collection of sites relating to the Beale ciphers. The Beale Cypher and Treasure Association is currently in transition, but it hopes to be active soon.
Bletchley Park
http://www.cranfield.ac.uk/ccc/bpark/
The official Web site, which includes opening times and directions.
The Alan Turing Homepage
http://www.turing.org.uk/turing/
Enigma emulators
http://www.attlabs.att.co.uk/andyc/enigma/enigma_j.html
http://www.izzy.net/~ian/enigma/applet/index.html
Two excellent emulators that show how the Enigma machine works. The former allows you to alter the machine settings, but it is not possible to track the electrical path through the scramblers. The latter has only one setting, but has a second window that shows the scramblers moving and the subsequent effect on the electrical path.
Phil Zimmermann and PGP
http://www.nai.com/products/security/phil/phil.asp
Electronic Frontier Foundation
http://www.eff.org/
An organization devoted to protecting rights and promoting freedom on the Internet.
Centre for Quantum Computation
http://www.qubit.org/
Information Security Group, Royal Holloway College
http://isg.rhbnc.ac.uk/
National Cryptologic Museum
http://www.nsa.gov:8080/museum/
American Cryptogram Association (ACA)
http://www.und.nodak.edu/org/crypto/crypto/
An association which specializes in setting and solving cipher puzzles.
Cryptologia
http://www.dean.usma.edu/math/
resource/pubs/cryptolo/index.htm
A quarterly journal devoted to all aspects of cryptology.
Cryptography Frequently Asked Questions
http://www.cis.ohio-state.edu/hypertext/faq/usenet/cryptography-faq/top.html
RSA Laboratories’ Frequently Asked Questions About Today’s Cryptography
http://www.rsa.com/rsalabs/faq/html/questions.html
Yahoo! Security and Encryption Page
http://www.yahoo.co.uk/Computers_and_Internet/
Security_and_Encryption/
Crypto Links
http://www.ftech.net/~monark/crypto/web.htm

Picture credits

Line illustrations by Miles Smith-Morris.
Hieroglyphs reproduced by kind permission of British Museum Press.
Linear B characters reproduced by kind permission of Cambridge University Press.

1.1
Scottish National Portrait Gallery, Edinburgh;
1.2
Ibrahim A. Al-Kadi and Mohammed Mrayati, King Saud University, Riyadh;
1.3
Public Record Office, London;
1.4
Scottish National Portrait Gallery, Edinburgh;
2.1
Cliché Bibliothèque Nationale de France, Paris, France;
2.2
Science and Society Picture Library, London;
2.3
The Beale Treasure-History of a Mystery
by Peter Viemeister;
3.1
David Kahn Collection, New York;
3.1
Bundesarchiv, Koblenz;
3.2
National Archive, Washington DC;
3.3
General Research Division, The New York Public Library, Astor, Lenox and Tilden Foundations;
3.4
Luis Kruh Collection, New York;
3.5
David Kahn Collection;
3.6
Science and Society Picture Library, London;
4.1
David Kahn Collection, New York;
4.2
Imperial War Museum, London;
4.3
Private collection of Barbara Eachus;
4.4
Godfrey Argent Agency, London;
4.5
Imperial War Museum, London;
4.6
Telegraph Group Limited, London;
5.1
National Archive, Washington DC;
5.2
British Museum Press, London;
5.3
Louvre, Paris © Photo RMN;
5.4
Department of Classics, University of Cincinnati;
5.5
Private collection of Eva Brann;
5.6
Source unknown;
5.7
Private collection of Joan Chadwick;
6.1
Sun Microsystems;
6.2
Stanford, University of California;
6.3
RSA Data Security, Inc.;
6.4
Private collection of Brenda Ellis;
6.5
Private collection of Clifford Cocks;
6.6
Private collection of Malcolm Williamson;
7.1
Network Associates, Inc.;
8.1
Penguin Books, London;
8.2
Thomas J. Watson Laboratories, IBM.
The Code Book
Simon Singh

简介

<h3>Amazon.com Review</h3><p>Calling upon accounts of political intrigue and tales of life and death, author Simon Singh tells history's most fascinating story of deception and cunning: the science of cryptography--the encoding and decoding of private information. Based on __, this version has been abridged and slightly simplified for a younger audience. None of the appeal for curious problem-solving minds has been lost, though. From Julius Caesar to the 10th-century Arabs; from Mary Queen of Scots to "Alice and Bob"; from the Germans' Enigma machine to the Navajo code talkers in World War II, Singh traces the use of code to protect--and betray--secrecy. Moving right into the present, he describes how the Information Age has provided a whole new set of challenges for cryptographers. How private are your e-mail communications? How secure is sending your credit card information over the Internet? And how much secrecy will the government tolerate? Complex but highly accessible, <em>The Code Book</em> will make readers see the past--and the future--in a whole new light. (Ages 14 and older) </p><h3>From Publishers Weekly</h3><p>Simon Singh breaks down cryptic messages for the teenage set in The Code Book: How to Make It, Break It, Hack It, Crack It, an adaptation of his bestselling adult title The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptology. He covers actual instances of codebreaking, from its role in the plan to execute Mary, Queen of Scots, to the Navajo code talkers of WWII. </p>

该书籍由网友制作上传,版权归原作者所有,仅供学习交流之用,请在下载后24小时内自行删除!

--epub掌上书苑(http://www.cnepub.com)

Other books

Love Gone by Nelson, Elizabeth
The Ivy: Secrets by Kunze, Lauren, Onur, Rina
The Lure by Bill Napier
Sleigh Ride (Homespun) by Crabapple, Katie
Ironhand's Daughter by David Gemmell
Act Like You Know by Stephanie Perry Moore
The Heiress and the Sheriff by Stella Bagwell