Buy new:
Save with Used - Very Good
Return this item for free
We offer easy, convenient returns with at least one free return option: no shipping charges. All returns must comply with our returns policy.
Learn more about free returns.- Go to your orders and start the return
- Select your preferred free shipping option
- Drop off and leave!
Download the free Kindle app and start reading Kindle books instantly on your smartphone, tablet, or computer - no Kindle device required.
Read instantly on your browser with Kindle for Web.
Using your mobile phone camera - scan the code below and download the Kindle app.
Image Unavailable
Color:
-
-
-
- To view this video download Flash Player
The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography Paperback – Illustrated, August 29, 2000
Purchase options and add-ons
Throughout the text are clear technical and mathematical explanations, and portraits of the remarkable personalities who wrote and broke the world's most difficult codes. Accessible, compelling, and remarkably far-reaching, this book will forever alter your view of history and what drives it. It will also make you wonder how private that e-mail you just sent really is.
- Print length432 pages
- LanguageEnglish
- PublisherVintage
- Publication dateAugust 29, 2000
- Dimensions5.18 x 0.86 x 7.96 inches
- ISBN-100385495323
- ISBN-13978-0385495325
- Lexile measure1310L
Book recommendations, author interviews, editors' picks, and more. Read it now.
Frequently bought together

Customers who viewed this item also viewed
Editorial Reviews
Amazon.com Review
Confronted with the prospect of defeat, the Allied cryptanalysts had worked night and day to penetrate German ciphers. It would appear that fear was the main driving force, and that adversity is one of the foundations of successful codebreaking.
In the information age, the fear that drives cryptographic improvements is both capitalistic and libertarian--corporations need encryption to ensure that their secrets don't fall into the hands of competitors and regulators, and ordinary people need encryption to keep their everyday communications private in a free society. Similarly, the battles for greater decryption power come from said competitors and governments wary of insurrection.
The Code Book is an excellent primer for those wishing to understand how the human need for privacy has manifested itself through cryptography. Singh's accessible style and clear explanations of complex algorithms cut through the arcane mathematical details without oversimplifying. --Therese Littleton
Review
"Entertaining and satisfying. . . . Offers a fascinating glimpse into the mostly secret competition between codemakers and codebreakers." --USA Today
"A good read that, bless it, makes the reader feel a bit smarter when it's done. Singh's an elegant writer and well-suited to the task of leading the mathematically perplexed through areas designed to be tricky." --Seattle Weekly
"An absorbing tale of codemaking and codebreaking over the centuries." --Scientific American
"Singh spins tales of cryptic intrigue in every chapter." --The Wall Street Journal
"Brings together...the geniuses who have secured communications, saved lives, and influenced the fate of nations. A pleasure to read." --Chicago Tribune
"Enthralling...commendably lucid...[Singh's] book provides a timely and entertaining summary of the subject." --The Economist
From the Inside Flap
Throughout the text are clear technical and mathematical explanations, and portraits of the remarkable personalities who wrote and broke the world's most difficult codes. Accessible, compelling, and remarkably far-reaching, this book will forever alter your view of history and what drives it. It will also make yo wonder how private that e-mail you just sent really is.
From the Back Cover
Throughout the text are clear technical and mathematical explanations, and portraits of the remarkable personalities who wrote and broke the world's most difficult codes. Accessible, compelling, and remarkably far-reaching, this book will forever alter your view of history and what drives it. It will also make yo wonder how private that e-mail you just sent really is.
About the Author
Excerpt. © Reprinted by permission. All rights reserved.
Mary Queen of Scots was on trial for treason. She had been accused of plotting to assassinate Queen Elizabeth in order to take the English crown for herself. Sir Francis Walsingham, Elizabeth's Principal Secretary, had already arrested the other conspirators, extracted confessions, and executed them. Now he planned to prove that Mary was at the heart of the plot, and was therefore equally culpable and equally deserving of death.
Walsingham knew that before he could have Mary executed, he would have to convince Queen Elizabeth of her guilt. Although Elizabeth despised Mary, she had several reasons for being reluctant to see her put to death. First, Mary was a Scottish queen, and many questioned whether an English court had the authority to execute a foreign head of state. Second, executing Mary might establish an awkward precedent -- if the state is allowed to kill one queen, then perhaps rebels might have fewer reservations about killing another, namely Elizabeth. Third, Elizabeth and Mary were cousins, and their blood tie made Elizabeth all the more squeamish about ordering her execution. In short, Elizabeth would sanction Mary's execution only if Walsingham could prove beyond any hint of doubt that she had been part of the assassination plot.
The conspirators were a group of young English Catholic noblemen intent on removing Elizabeth, a Protestant, and replacing her with Mary, a fellow Catholic. It was apparent to the court that Mary was a figurehead for the conspirators, but it was not clear that she had actually given her blessing to the conspiracy. In fact, Mary had authorised the plot. The challenge for Walsingham was to demonstrate a palpable link between Mary and the plotters.
On the morning of her trial, Mary sat alone in the dock, dressed in sorrowful black velvet. In cases of treason, the accused was forbidden counsel and was not permitted to call witnesses. Mary was not even allowed secretaries to help her prepare her case. However, her plight was not hopeless because she had been careful to ensure that all her correspondence with the conspirators had been written in cipher. The cipher turned her words into a meaningless series of symbols, and Mary believed that even if Walsingham had captured the letters, then he could have no idea of the meaning of the words within them. If their contents were a mystery, then the letters could not be used as evidence against her. However, this all depended on the assumption that her cipher had not been broken.
Unfortunately for Mary, Walsingham was not merely Principal Secretary, he was also England's spymaster. He had intercepted Mary's letters to the plotters, and he knew exactly who might be capable of deciphering them. Thomas Phelippes was the nation's foremost expert on breaking codes, and for years he had been deciphering the messages of those who plotted against Queen Elizabeth, thereby providing the evidence needed to condemn them. If he could decipher the incriminating letters between Mary and the conspirators, then her death would be inevitable. On the other hand, if Mary's cipher was strong enough to conceal her secrets, then there was a chance that she might survive. Not for the first time, a life hung on the strength of a cipher.
The Evolution of Secret Writing
Some of the earliest accounts of secret writing date back to Herodotus, 'the father of history' according to the Roman philosopher and statesman Cicero. In The Histories, Herodotus chronicled the conflicts between Greece and Persia in the fifth century bc, which he viewed as a confrontation between freedom and slavery, between the independent Greek states and the oppressive Persians. According to Herodotus, it was the art of secret writing that saved Greece from being conquered by Xerxes, King of Kings, the despotic leader of the Persians.
The long-running feud between Greece and Persia reached a crisis soon after Xerxes began constructing a city at Persepolis, the new capital for his kingdom. Tributes and gifts arrived from all over the empire and neighbouring states, with the notable exceptions of Athens and Sparta. Determined to avenge this insolence, Xerxes began mobilising a force, declaring that 'we shall extend the empire of Persia such that its boundaries will be God's own sky, so the sun will not look down upon any land beyond the boundaries of what is our own'. He spent the next five years secretly assembling the greatest fighting force in history, and then, in 480 bc, he was ready to launch a surprise attack.
However, the Persian military build-up had been witnessed by Demaratus, a Greek who had been expelled from his homeland and who lived in the Persian city of Susa. Despite being exiled he still felt some loyalty to Greece, so he decided to send a message to warn the Spartans of Xerxes' invasion plan. The challenge was how to dispatch the message without it being intercepted by the Persian guards. Herodotus wrote:
As the danger of discovery was great, there was only one way in which he could contrive to get the message through: this was by scraping the wax off a pair of wooden folding tablets, writing on the wood underneath what Xerxes intended to do, and then covering the message over with wax again. In this way the tablets, being apparently blank, would cause no trouble with the guards along the road. When the message reached its destination, no one was able to guess the secret, until, as I understand, Cleomenes' daughter Gorgo, who was the wife of Leonides, divined and told the others that if they scraped the wax off, they would find something written on the wood underneath. This was done; the message was revealed and read, and afterwards passed on to the other Greeks.
As a result of this warning, the hitherto defenceless Greeks began to arm themselves. Profits from the state-owned silver mines, which were usually shared among the citizens, were instead diverted to the navy for the construction of two hundred warships.
Xerxes had lost the vital element of surprise and, on 23 September 480 bc, when the Persian fleet approached the Bay of Salamis near Athens, the Greeks were prepared. Although Xerxes believed he had trapped the Greek navy, the Greeks were deliberately enticing the Persian ships to enter the bay. The Greeks knew that their ships, smaller and fewer in number, would have been destroyed in the open sea, but they realised that within the confines of the bay they might outmanoeuvre the Persians. As the wind changed direction the Persians found themselves being blown into the bay, forced into an engagement on Greek terms. The Persian princess Artemisia became surrounded on three sides and attempted to head back out to sea, only to ram one of her own ships. Panic ensued, more Persian ships collided and the Greeks launched a full-blooded onslaught. Within a day, the formidable forces of Persia had been humbled.
Demaratus' strategy for secret communication relied on simply hiding the message. Herodotus also recounted another incident in which concealment was sufficient to secure the safe passage of a message. He chronicled the story of Histaiaeus, who wanted to encourage Aristagoras of Miletus to revolt against the Persian king. To convey his instructions securely, Histaiaeus shaved the head of his messenger, wrote the message on his scalp, and then waited for the hair to regrow. This was clearly a period of history that tolerated a certain lack of urgency. The messenger, apparently carrying nothing contentious, could travel without being harassed. Upon arriving at his destination he then shaved his head and pointed it at the intended recipient.
Secret communication achieved by hiding the existence of a message is known as steganography, derived from the Greek words steganos, meaning 'covered', and graphein, meaning 'to write'. In the two thousand years since Herodotus, various forms of steganography have been used throughout the world. For example, the ancient Chinese wrote messages on fine silk, which was then scrunched into a tiny ball and covered in wax. The messenger would then swallow the ball of wax. In the fifteenth century, the Italian scientist Giovanni Porta described how to conceal a message within a hard-boiled egg by making an ink from a mixture of one ounce of alum and a pint of vinegar, and then using it to write on the shell. The solution penetrates the porous shell, and leaves a message on the surface of the hardened egg albumen, which can be read only when the shell is removed. Steganography also includes the practice of writing in invisible ink. As far back as the first century ad, Pliny the Elder explained how the 'milk' of the thithymallus plant could be used as an invisible ink. Although transparent after drying, gentle heating chars the ink and turns it brown. Many organic fluids behave in a similar way, because they are rich in carbon and therefore char easily. Indeed, it is not unknown for modern spies who have run out of standard-issue invisible ink to improvise by using their own urine.
The longevity of steganography illustrates that it certainly offers a modicum of security, but it suffers from a fundamental weakness. If the messenger is searched and the message is discovered, then the contents of the secret communication are revealed at once. Interception of the message immediately compromises all security. A thorough guard might routinely search any person crossing a border, scraping any wax tablets, heating blank sheets of paper, shelling boiled eggs, shaving people's heads, and so on, and inevitably there will be occasions when the message is uncovered.
Hence, in parallel with the development of steganography, there was the evolution of cryptography, derived from the Greek word kryptos, meaning 'hidden'. The aim of cryptography is not to hide the existence of a message, but rather to hide its meaning, a process known as encryption. To render a message unintelligible, it is scrambled according to a particular protocol which is agreed beforehand between the sender and the intended recipient. Thus the recipient can reverse the scrambling protocol and make the message comprehensible. The advantage of cryptography is that if the enemy intercepts an encrypted message, then the message is unreadable. Without knowing the scrambling protocol, the enemy should find it difficult, if not impossible, to recreate the original message from the encrypted text.
Although cryptography and steganography are independent, it is possible to both scramble and hide a message to maximise security. For example, the microdot is a form of steganography that became popular during the Second World War. German agents in Latin America would photographically shrink a page of text down to a dot less than 1 millimetre in diameter, and then hide this microdot on top of a full stop in an apparently innocuous letter. The first microdot to be spotted by the FBI was in 1941, following a tip-off that the Americans should look for a tiny gleam from the surface of a letter, indicative of smooth film. Thereafter, the Americans could read the contents of most intercepted microdots, except when the German agents had taken the extra precaution of scrambling their message before reducing it. In such cases of cryptography combined with steganography, the Americans were sometimes able to intercept and block communications, but they were prevented from gaining any new information about German spying activity. Of the two branches of secret communication, cryptography is the more powerful because of this ability to prevent information from falling into enemy hands.
In turn, cryptography itself can be divided into two branches, known as transposition and substitution. In transposition, the letters of the message are simply rearranged, effectively generating an anagram. For very short messages, such as a single word, this method is relatively insecure because there are only a limited number of ways of rearranging a handful of letters. For example, three letters can be arranged in only six different ways, e.g. cow, cwo, ocw, owc, wco, woc. However, as the number of letters gradually increases, the number of possible arrangements rapidly explodes, making it impossible to get back to the original message unless the exact scrambling process is known. For example, consider this short sentence. It contains just 35 letters, and yet there are more than 50,000,000,000,000,000,000,000,000,000,000 distinct arrangements of them. If one person could check one arrangement per second, and if all the people in the world worked night and day, it would still take more than a thousand times the lifetime of the universe to check all the arrangements.
Product details
- Publisher : Vintage
- Publication date : August 29, 2000
- Edition : Reprint
- Language : English
- Print length : 432 pages
- ISBN-10 : 0385495323
- ISBN-13 : 978-0385495325
- Item Weight : 2.31 pounds
- Dimensions : 5.18 x 0.86 x 7.96 inches
- Lexile measure : 1310L
- Best Sellers Rank: #35,403 in Books (See Top 100 in Books)
- #2 in Web Encryption
- #16 in Linguistics Reference
- #115 in History & Philosophy of Science (Books)
- Customer Reviews:
About the author

Simon Singh is a science journalist and TV producer. Having completed his PhD at Cambridge he worked from 1991 to 1997 at the BBC producing Tomorrow's World and co-directing the BAFTA award-winning documentary Fermat's Last Theorem for the Horizon series. He is the author of Fermat's Last Theorem, which was a no 1 bestseller in Britain and translated into 22 languages. In 1999, he wrote The Code Book which was also an international bestseller and the basis for the Channel 4 series The Science of Secrecy.
Customer reviews
Customer Reviews, including Product Star Ratings help customers to learn more about the product and decide whether it is the right product for them.
To calculate the overall star rating and percentage breakdown by star, we don’t use a simple average. Instead, our system considers things like how recent a review is and if the reviewer bought the item on Amazon. It also analyzed reviews to verify trustworthiness.
Learn more how customers reviews work on AmazonCustomers say
Customers find the book captivating from start to end, with thorough descriptions of ciphers and codes throughout history. Moreover, the book is well-written and easily understandable for the average layman, leaving a great impression on readers. Additionally, customers describe it as highly intriguing and engaging, with one review noting how it blends history and math effectively.
AI Generated from the text of customer reviews
Select to learn more
Customers find the book captivating from start to end, describing it as a very interesting and fun read.
"What a great read that has sparked a greater curiosity for me. I’m looking for more to study on this field...." Read more
"...in balancing the two here, it seems to me, and the book is worth any reader's time whose interest is piqued by cryptography...." Read more
"This is a very well written and entertaining book that covers codes from the earliest ones to quantum computer codes...." Read more
"...reading this book purely for leisure as the storytelling and content is extremely interesting and captivating even for someone not particularly..." Read more
Customers find the book enlightening, providing thorough descriptions of the history of ciphers and codes, and serving as a good introduction to the topic.
"What a great read that has sparked a greater curiosity for me. I’m looking for more to study on this field...." Read more
"...It was a well written, fascinating and well paced read of the history and technology of cryptography. That was years ago...." Read more
"...But it's certainly not difficult to understand the concept of how these encryptions are deciphered, it's merely very tedious and painstaking to do..." Read more
"...book is written for a general audience, but also contains a lot of somewhat technical information, but is not so mathematical as to be inaccessible..." Read more
Customers find the book engagingly written and very readable, with one customer noting it is written for a general audience and is easily understood by the average layman.
"...It was a well written, fascinating and well paced read of the history and technology of cryptography. That was years ago...." Read more
"...In sum though, a very pleasing, well-written book about the perennial human need to keep matters secret." Read more
"...The book is written for a general audience, but also contains a lot of somewhat technical information, but is not so mathematical as to be..." Read more
"...about any reader and the analysis of the logic is clear and simple to latch on to, even as it delves into some deeper details...." Read more
Customers appreciate the book's pacing, finding it lucid and leaving a great impression upon oneself.
"...Also, he makes an elegant segue in the tale of how the Linear B tablets were finally translated, and the toing and froing of certain egotistical..." Read more
"I tremendously enjoyed reading this book, which explores perhaps the most fascinating aspect of cryptology: its role in society...." Read more
"...writing about technical subjects in a way that would be attractive to non-technical readers, as well as technical readers not looking for a textbook..." Read more
"...It sets the tone, gives enough background and as some other reviews rightly said, explains repetitively - but that's good I think as it leaves no..." Read more
Customers find the book highly intriguing, appreciating its puzzles, with one customer noting that the last chapter offers deeper insights.
"...It was a well written, fascinating and well paced read of the history and technology of cryptography. That was years ago...." Read more
"...are concerned about CURRENT EVENTS in this science the last chapter offers deeper insights and may be used as a springboard to investigate further..." Read more
"...At the end of the book it includes some puzzles for you solve ( I have not tried them yet .. but I'll soon )" Read more
"...Cryptography becomes interesting, intriguing, fun and highly readable under the author's writings...." Read more
Reviews with images
Excellent!
Top reviews from the United States
There was a problem filtering reviews. Please reload the page.
- Reviewed in the United States on June 8, 2025Format: KindleVerified PurchaseWhat a great read that has sparked a greater curiosity for me. I’m looking for more to study on this field. It was interesting to see all of the references back in the 90’s that are completely gone, like Netscape Navigator!
- Reviewed in the United States on October 27, 2024Format: PaperbackVerified PurchaseMy old boss used to keep a copy of this lying around in the office (think, "throne room"), and I eventually read the whole thing. It was a well written, fascinating and well paced read of the history and technology of cryptography.
That was years ago.
I recently decided to buy my own copy and give a re-read.
- Reviewed in the United States on July 10, 2012Like all narrative non-fictional works that, eventually in this case, deal with technical subjects whose details are beyond the scope of the non-specialist reader, this book attempts to strike a balance between two extremes, between a book so chock-full of technical detail that it reads like a textbook and a book that skimps so completely on the heart of the matter at hand that it can only be described as fluff. Singh has done a remarkable job in balancing the two here, it seems to me, and the book is worth any reader's time whose interest is piqued by cryptography.
Singh is singularly aided by his subject matter here. This book was recommended to me by a fellow poster on a crossword puzzle blog which I frequent, as a daily solver of the New York Times crossword. The discussions on the blog vary from the whimsical to the technical with all manner of things mooted. So goes Singh's book as well. But what makes this possible is that cryptography and cryptanalysis, for most of human history, has been no more complex, au fond, than a very difficult crossword puzzle. And one is not surprised to see a crossword used during WWII by the British to test potential candidates for work at top secret Bletchley Park, which was responsible for cracking Germany's "Enigma" code. The crossword is provided in the book and was jolly fun to solve.
It seems to me that up to the Vigenère polyalphabetic coding, known for centuries as "le chiffre indéchifferable", anyone with an interest in this book could understand and create such a cipher and write an encrypted message in it. Indeed, it's in deciphering such messages without the "keyword" that the technical going gets somewhat involved and perhaps beyond the ken of some readers not familiar with basic statistical analysis, and, not coincidentally, this decipherment of such encryptions is where maths starts to predominate. But it's certainly not difficult to understand the concept of how these encryptions are deciphered, it's merely very tedious and painstaking to do it as Charles Babbage finally did in the 19th Century.
Up to this point, for this reader in any event, no trade-off was necessary and Singh is free to fill his tale of codes and ciphers with histories which hinge upon them, starting with the life and death of Mary, Queen of Scots. Also, he makes an elegant segue in the tale of how the Linear B tablets were finally translated, and the toing and froing of certain egotistical archaeologists etc. - It should be noted here the final decipherment and translation of Linear B was the cumulative work of men (and one woman) of genius who were linguistic prodigies. - Again, pass the 19th century and the non-specialist becomes more than a tad lost in the, literally and figuratively, nuts and bolts of Enigma machines and multi-lingual scholarship and fluency.
Thus, it's no surprise that the ending of the book was the weakest part for me. Though it must be said that Singh goes out of his way to use "Alice, Bob, Eve" analogies to make the concepts clearer most effectively, being able to do what the main players in the tale are doing is far beyond the amateur's grasp. Also, the book is thirteen years old and the final sections dealing with computer encryption seem a bit dated already.
In sum though, a very pleasing, well-written book about the perennial human need to keep matters secret.
- Reviewed in the United States on February 10, 2014Format: PaperbackVerified PurchaseThis is a very well written and entertaining book that covers codes from the earliest ones to quantum computer codes. I liked the balance between historical information and some details about how codes and ciphers are created and broken. The book is written for a general audience, but also contains a lot of somewhat technical information, but is not so mathematical as to be inaccessible for most readers. I highly recommend this book to anyone interested in codes, ciphers and some of the privacy issues that are entailed with the use and decryption of them.
What is in the book –
The book goes beyond many others in the area of codes and ciphers in that it discusses very up to date topics (at least up to 1999 when the book was written), such as the ciphers being used for Internet transactions and questions of privacy and code breaking. The book also covers material on the deciphering of hieroglyphics and Linear-B, which are not covered in other books on codes. I found the sections on the techniques used to decipher messages enciphered with a Vigenére table and the algorithms employed by the DES and RSA systems to be very clear and enlightening. The book contains information on the Enigma machine and the work at Bletchley Park in Britain to decipher the messages sent on it. However, this material is not as detailed as the material in books such as Budainsky’s “Battle of Wits”, Kahn’s “Seizing the Enigma” or Sebag-Montefiore’s “The Battle for the Code”, so if this is your primary interest I would direct you to these sources. However, if your interest is more general then I think that “The Code Book” is an excellent choice.
- Reviewed in the United States on June 3, 2024Format: PaperbackVerified PurchaseOriginally got this book as it was a required reading for one of my linguistic courses. However, I eventually found myself reading this book purely for leisure as the storytelling and content is extremely interesting and captivating even for someone not particularly familiar with the content at first.
- Reviewed in the United States on February 10, 2009Format: PaperbackVerified PurchaseI've been developing an interest in physics as well as cryptography. I was turned on to Singh's The Code Book simply because it mentioned quantum physics in the title, a happy intersection between my two new hobby subjects. Soon after cracking it open, I realized that I'd picked up one of my favorite books in the past few years.
Singh does a great job of laying out the history of cryptography (code writing) and cryptanalysis (code breaking, essentially) as well as explaining the logic behind each of the codes he discusses. It's a fascinating history that builds and builds upon itself, making it clear to the reader how the cryptography readily available to him/her now was born. All the while, Singh's explanation of the thought behind the codes is clear enough for a non-math major to quickly grasp (i.e. myself).
I admit that the subject matter was right up my alley and this might not be the case for everyone, but I feel Singh's ability to weave a narrative into a convoluted subject (as it would be) is excellent and warrants a pick up. The history is sturdy enough to support just about any reader and the analysis of the logic is clear and simple to latch on to, even as it delves into some deeper details.
In all, this was a great read and I'd highly recommend picking it up.
Top reviews from other countries
Lobotomised and despisedReviewed in the United Kingdom on June 28, 20135.0 out of 5 stars Almost perfect.
Almost perfect for a layman's introductory book on cryptography/ cryptanalysis. 5 stars for all the historical introduction from Ceasar Shift, substitution/transposition, frequency analysis and linguistics, monoalphabets, polyalphabets, Vigenere and Babbage, Turing and the naval Enigma, but minus 0.5-1 stars because modern encryption/decryption techniques were a little rushed relative to the earlier historical half of the book and some applications were hardly mentioned. Interesting that Linear A and Etruscan had not been deciphered at the time this book was written.
Although I bought this book late, and technology has advanced since it was written, I was hoping to better understand encryption in the fields of computer science and technology (authentication and certificates on the internet, hashing of passwords, credit card technology...). There was a good intro on RSA and PGP, and I enjoyed the ending on photon traps and quantum computing. I wish there had been a little more on number theory (primes), a comparison of the many modern standards, the use of analysis in digital forensics, ...something a little more technical but maybe there are other books for that.
There are some dubious claims in the book that GCHQ invented asymetric public-key encryption 'before' Diffie-Hellman-Merkle and Rivest-Shamir-Aldeman. The claim being made is that GCHQ invented it shortly before (whatever they say, right?), but could not disclose their invention for reasons of national security. I realise that this story was put out in 1997 by GCHQ and not Simon Singh, but where is the evidence?
What is more likely is that there were reasons of national security for not disclosing that, despite the huge budgets, the shadowy cold-war era monoliths GCHQ (and NSA) were totally outwitted by a handful of freedom loving academics like Whitfield Diffie, who saw this technology as a means of protecting free speech and, therefore, democracy.
Kudos to Simon Singh for stating his suppor for the use of Zimmermann's PGP in the book.
The book concludes with a multiple stages code cracking challenge, which starts very easy and gets harder (there was a cash prize at the time).
-
Cliente AmazonReviewed in Brazil on December 8, 20185.0 out of 5 stars Excelente
Format: PaperbackVerified PurchaseCompreende a história das cifras desde as nossas primeiras invenções até o futuro da computação quântica. Recomendo fortemente para qualquer um interessado no assunto.
Observação: O livro não traz algoritmos explícitos de sistemas criptográficos, embora explique muito bem o funcionamento destes, principalmente o DHM e RSA.
Client d'AmazonReviewed in France on October 2, 20185.0 out of 5 stars An awesome history about codes.
Format: PaperbackVerified PurchaseA facsinating book about encryption and codes. It mingles both history and technicity. Didn't realise that codes were so important among history.
Recommend it !
MariaReviewed in India on June 21, 20195.0 out of 5 stars Just Buy It !
Format: PaperbackVerified PurchaseIf you've recently got into encoding/decoding or have found Morse code interesting and want to know more of the kind, or just for the sake of understanding Robert Langdon better, whatever the reason is - for beginners this book is the best ! Not only will you get to know so much about ciphers and their history from this book, you'll also get to experience the fun yourself by creating your own encrypted language !
This book can't, can never, fail to capture the attention, imagination, and curiosity of the reader, he/she will be fascinated for sure. As for the Amazon services, the delivery, condition of the book and price, all are perfect.
-
Gerardo Tonatiuh Primo RodriguezReviewed in Mexico on September 20, 20215.0 out of 5 stars Increíble, divertido, fácil de leer
Format: PaperbackVerified PurchaseMe gusto mucho! Soy fanático de los enigmas y con este libro exploré una historia secreta que no sabía.











