-Caveat Lector-

From
http://www.bostonphoenix.com/archive/books/99/12/02/THE_CODE_BOOK.html

{{<Begin>}}
Code warriors
Simon Singh explores the fascinating history of secret communication
by Damon Smith
 THE CODE BOOK: THE EVOLUTION OF SECRECY FROM MARY, QUEEN OF SCOTS TO QUANTUM
CRYPTOGRAPHY, by Simon Singh. Doubleday, 402 pages, $24.95.
Today corporations and civil libertarians routinely join forces in the US to
lobby for secure encryption software, much to the dismay of law enforcers and
the National Security Agency. Few parties would claim to understand the
technology and mathematical logic behind such programs, however. In The Code
Book, an admirably lucid account of the evolution of cryptography, Simon Singh
writes of the codes and ciphers that have been used to ensure privacy from the
ancient world to the computer age. As he did in his acclaimed book Fermat's
Enigma, Singh masterfully weds historiography and science writing, carefully
elucidating the often mind-boggling mechanics of encryption while spinning
tales of political intrigue and skullduggery, wartime bravery and great
mathematical ingenuity.

The Code Book is a highly entertaining guide to the world of enigmas and the
peaks of human cleverness, an overview of world history seen through the x-ray
goggles of a fun-loving scientist. "History is punctuated with codes," Singh
writes in his introduction. "They have decided the outcomes of battles and led
to the deaths of kings and queens." To reinforce this point, Singh recounts one
of the most famous episodes in British history: the 16th-century plot to
assassinate Queen Elizabeth. With the dramatic sense of an accomplished
novelist, Singh tells how the plan was foiled when a government minister
deciphered a letter sent by Mary Queen of Scots to her fellow Catholic
conspirators -- a revelation that resulted in her execution, marking a turning
point in the fate of Britain.

Singh uses this story primarily to illustrate the basic weakness of an
encryption technique known as monoalphabetic substitution, which prevailed
through the European Renaissance even though Arab scholars had learned long
before to break it using frequency analysis. He explains that it was eventually
replaced by the polyalphabetic Vigenère square, which protected military and
government dispatches for 250 years, until the eccentric genius Charles Babbage
(who developed a prototype for the first modern computer) discovered a method
for cracking it in the mid 19th century.

Throughout his book, Singh tantalizes the reader with fascinating stories of
how ciphers have played a role not only in historical events but in some of
Western civilization's best-kept secrets, such as the mysterious identity of
the Man in the Iron Mask, made famous by Alexandre Dumas. He also relates the
story of the Beale treasure, a $20 million fortune amassed in the Old West and
buried somewhere in Virginia, the directions to which are contained in a set of
encrypted papers that have thus far eluded the sharpest analytic minds, not to
mention professional treasure hunters. Part of the allure of these tales is
that Singh has a special talent for creating suspense, revealing just enough
information to engage one's imagination, but cloaking the essential details
until the last possible moment.

In addition to charting the development of encryption practices, one of Singh's
primary objectives is to show how the indefatigable efforts of cryptanalysts --
those who decipher coded messages -- have spurred important scientific
advancements. For instance, the invention of radio at the turn of the century
made it easier for government cryptanalysts to gather intelligence, as anyone
with an antenna could easily intercept enemy communications, but it also drove
the need for stronger encryption methods. This eventually resulted in the
"mechanisation of secrecy," the creation of machines to scramble messages
beyond the pen-wielding abilities of human beings, which has given rise to the
public-key cryptography widely used today by businesses and governments.
Another theme of The Code Book is the ongoing struggle between code makers and
code breakers, a dynamic Singh characterizes as "an intellectual arms race that
has had a dramatic impact on the course of history." Certainly this was the
case during the First and Second World Wars. Singh tells the story of Alan
Turing, a brilliant mathematician who devoted himself to the war effort at
Bletchley Park and helped to crack the Enigma code machines used by the Nazis.
Turing and his colleagues' breakthroughs prevented U-boat attacks and
ultimately shortened World War II, but because of the British intelligence
community's policy of maintaining secrecy for its operations, his important
work was never recognized.

Delicately approaching the subject of binary code (the language of computers)
in the final chapters, Singh manages to give a cogent explanation of how
software encryption developed from modular arithmetic, one-way functions, and
huge prime numbers without losing the careful balance between suspenseful
narrative and technical detail. And he presents the latest theories on how a
truly unbreakable code -- a far-out system based on the emission of polarized
photons -- may be at the doorstep of scientific knowledge.

The only criticism one might make of The Code Book is that Singh occasionally
coddles the reader, overexplaining fundamental ideas or rehashing problems he's
already elaborated fully. Still, that kind of repetition is reassuring to the
nontechnical reader. Peppering the text with graphs and diagrams, the former
BBC producer just wants to make sure anyone can follow along on his journey.
People with a general interest in world history, linguistics, or mathematics,
and especially crossword fanatics, will find this fascinating survey of secret
writing particularly hard to put down.

Damon Smith is a freelance writer living in Cambridge.

| home page | what's new | search | about the phoenix | feedback |
Copyright © 1999 The Phoenix Media/Communications Group. All rights reserved.


{{<End>}}

A<>E<>R
~~~~~~~~~~~~~~~
Integrity has no need of rules. -Albert Camus (1913-1960)
+ + + + + + + + + + + + + + + + + + + + + + + + + + + +
The only real voyage of discovery consists not in seeking
new landscapes but in having new eyes. -Marcel Proust
+ + + + + + + + + + + + + + + + + + + + + + + + + + + +
"Believe nothing, no matter where you read it, or who said
it, no matter if I have said it, unless it agrees with your
own reason and your common sense." --Buddha
+ + + + + + + + + + + + + + + + + + + + + + + + + + + +
It is preoccupation with possessions, more than anything else, that
prevents us from living freely and nobly. -Bertrand Russell
+ + + + + + + + + + + + + + + + + + + + + + + + + + + +
"Everyone has the right...to seek, receive and impart
information and ideas through any media and regardless
of frontiers." Universal Declaration of Human Rights
+ + + + + + + + + + + + + + + + + + + + + + + + + + + +
"Always do sober what you said you'd do drunk. That will
teach you to keep your mouth shut." Ernest Hemingway
+ + + + + + + + + + + + + + + + + + + + + + + + + + + +
Forwarded as information only; no endorsement to be presumed
+ + + + + + + + + + + + + + + + + + + + + + + + + + + +
In accordance with Title 17 U.S.C. section 107, this material
is distributed without charge or profit to those who have
expressed a prior interest in receiving this type of information
for non-profit research and educational purposes only.

DECLARATION & DISCLAIMER
==========
CTRL is a discussion and informational exchange list. Proselyzting propagandic
screeds are not allowed. Substance—not soapboxing!  These are sordid matters
and 'conspiracy theory', with its many half-truths, misdirections and outright
frauds is used politically  by different groups with major and minor effects
spread throughout the spectrum of time and thought. That being said, CTRL
gives no endorsement to the validity of posts, and always suggests to readers;
be wary of what you read. CTRL gives no credeence to Holocaust denial and
nazi's need not apply.

Let us please be civil and as always, Caveat Lector.
========================================================================
Archives Available at:
http://home.ease.lsoft.com/archives/CTRL.html

http:[EMAIL PROTECTED]/
========================================================================
To subscribe to Conspiracy Theory Research List[CTRL] send email:
SUBSCRIBE CTRL [to:] [EMAIL PROTECTED]

To UNsubscribe to Conspiracy Theory Research List[CTRL] send email:
SIGNOFF CTRL [to:] [EMAIL PROTECTED]

Om

Reply via email to