The Science of Secrecy


Book Description

A TV tie-in edition of The Code Book filmed as a prime-time five-part Channel 4 series on the history of codes and code-breaking and presented by the author. This book, which accompanies the major Channel 4 series, brings to life the hidden history of codes and code breaking. Since the birth of writing, there has also been the need for secrecy. The story of codes is the story of the brilliant men and women who used mathematics, linguistics, machines, computers, gut instinct, logic and detective work to encrypt and break these secrect messages and the effect their work has had on history.




The Code Book: The Secrets Behind Codebreaking


Book Description

"As gripping as a good thriller." --The Washington Post Unpack the science of secrecy and discover the methods behind cryptography--the encoding and decoding of information--in this clear and easy-to-understand young adult adaptation of the national bestseller that's perfect for this age of WikiLeaks, the Sony hack, and other events that reveal the extent to which our technology is never quite as secure as we want to believe. Coders and codebreakers alike will be fascinated by history's most mesmerizing stories of intrigue and cunning--from Julius Caesar and his Caeser cipher to the Allies' use of the Enigma machine to decode German messages during World War II. Accessible, compelling, and timely, The Code Book is sure to make readers see the past--and the future--in a whole new way. "Singh's power of explaining complex ideas is as dazzling as ever." --The Guardian




The Code Book


Book Description

Provides young adults with a review of cryptography, its evolution over time, and its purpose throughout history from the era of Julius Caesar to the modern day.




Cryptography


Book Description

Explains transposition, substitution, and Baconian bilateral ciphers and presents more than one hundred and fifty problems.




Restricted Data


Book Description

"Nuclear weapons, since their conception, have been the subject of secrecy. In the months after the dropping of the atomic bombs on Hiroshima and Nagasaki, the American scientific establishment, the American government, and the American public all wrestled with what was called the "problem of secrecy," wondering not only whether secrecy was appropriate and effective as a means of controlling this new technology but also whether it was compatible with the country's core values. Out of a messy context of propaganda, confusion, spy scares, and the grave counsel of competing groups of scientists, what historian Alex Wellerstein calls a "new regime of secrecy" was put into place. It was unlike any other previous or since. Nuclear secrets were given their own unique legal designation in American law ("restricted data"), one that operates differently than all other forms of national security classification and exists to this day. Drawing on massive amounts of declassified files, including records released by the government for the first time at the author's request, Restricted Data is a narrative account of nuclear secrecy and the tensions and uncertainty that built as the Cold War continued. In the US, both science and democracy are pitted against nuclear secrecy, and this makes its history uniquely compelling and timely"--




Secret History


Book Description

Winner of an Outstanding Academic Title Award from CHOICE MagazineMost available cryptology books primarily focus on either mathematics or history. Breaking this mold, Secret History: The Story of Cryptology gives a thorough yet accessible treatment of both the mathematics and history of cryptology. Requiring minimal mathematical prerequisites, the




Top Secret


Book Description

Presents history, trivia, and code-breaking tales in a guide book to the world of secret writing that includes examples of a variety of codes and ciphers.




The Mathematics of Secrets


Book Description

Explaining the mathematics of cryptography The Mathematics of Secrets takes readers on a fascinating tour of the mathematics behind cryptography—the science of sending secret messages. Using a wide range of historical anecdotes and real-world examples, Joshua Holden shows how mathematical principles underpin the ways that different codes and ciphers work. He focuses on both code making and code breaking and discusses most of the ancient and modern ciphers that are currently known. He begins by looking at substitution ciphers, and then discusses how to introduce flexibility and additional notation. Holden goes on to explore polyalphabetic substitution ciphers, transposition ciphers, connections between ciphers and computer encryption, stream ciphers, public-key ciphers, and ciphers involving exponentiation. He concludes by looking at the future of ciphers and where cryptography might be headed. The Mathematics of Secrets reveals the mathematics working stealthily in the science of coded messages. A blog describing new developments and historical discoveries in cryptography related to the material in this book is accessible at http://press.princeton.edu/titles/10826.html.




The Genesis of Secrecy


Book Description

An examination of some enigmatic passages and episodes in the gospels.




Fermat's Last Theorem


Book Description

Introducing the Collins Modern Classics, a series featuring some of the most significant books of recent times, books that shed light on the human experience - classics which will endure for generations to come.