Cryptography/Bibliography: Difference between revisions
Jump to navigation
Jump to search
imported>Howard C. Berkowitz No edit summary |
imported>Howard C. Berkowitz (Moved references from article draft; this does need cleanup) |
||
Line 4: | Line 4: | ||
* Gaines, Helen F. ''Cryptanalysis'' | * Gaines, Helen F. ''Cryptanalysis'' | ||
* Sinkov, Abraham. ''Elementary Cryptanalysis: A Mathematical Approach'' Excellent; readable at a high school level | * Sinkov, Abraham. ''Elementary Cryptanalysis: A Mathematical Approach'' Excellent; readable at a high school level | ||
* [[The Codebreakers]] by [[David Kahn]]. | |||
* The Code Book by [[Simon Singh]], a clearly written anecdotal history of crypto, covering modern methods including public key. | |||
* [[Crypto: How the Code Rebels Beat the Government Saving Privacy in the Digital Age]] by [[Steven Levy]], about the political and legal conflicts in the US about cryptography, such as the [[Clipper Chip]] controversy and the [[Bernstein v. United States]] lawsuit. | |||
* ''Stealing Secrets, Telling Lies: How [[Espionage|Spies]] and [[Cryptology|Codebreakers]] Helped Shape the [[Twentieth Century]]'', by [[James Gannon]]. | |||
* [http://www.mindspring.com/~schlafly/crypto/faq.htm sci.crypt mini-FAQ]. | |||
* [http://www.nsa.gov/kids/ NSA's CryptoKids]. | |||
* [http://www.rsasecurity.com/rsalabs/node.asp?id=2152 RSA Laboratories' Frequently Asked Questions About Today's Cryptography] | |||
* [http://java.sun.com/developer/technicalArticles/Security/Crypto/ Cryptography: The Ancient Art of Secret Messages] by [[Monica Pawlan]] - February 1998 | |||
* ''In Code: A Mathematical Journey'' by [[Sarah Flannery]] (with David Flannery). Popular account of Sarah's award-winning project on public-key cryptography, co-written with her father. | |||
==More advanced, but dated== | ==More advanced, but dated== | ||
* Friedman, William F. ''Military Cryptanalysis'' | * Friedman, William F. ''Military Cryptanalysis'' | ||
Line 10: | Line 18: | ||
==Definitely mathematical== | ==Definitely mathematical== | ||
* Scheier, Bruce. ''Applied Cryptography: Protocols, Algorithms, and Source Code in C'' | * Scheier, Bruce. ''Applied Cryptography: Protocols, Algorithms, and Source Code in C'' | ||
* [http://www.cacr.math.uwaterloo.ca/hac/ Handbook of Applied Cryptography] by A. J. Menezes, P. C. van Oorschot, and S. A. Vanstone (PDF download available), somewhat more mathematical than Schneier's book. | |||
* ''Introduction to Modern Cryptography'' by [[Phillip Rogaway]] and [[Mihir Bellare]], a mathematical introduction to theoretical cryptography including reduction-based security proofs. [http://www.cs.ucdavis.edu/~rogaway/classes/227/spring05/book/main.pdf PDF download]. | |||
==Fiction== | |||
* [[Cryptonomicon]] by [[Neal Stephenson]] (novel, WW2 [[Enigma machine|Enigma]] cryptanalysis figures into the story, though not always realistically). | |||
* ''Alvin's Secret Code'' by [[Clifford B. Hicks]] (children's novel that introduces some basic cryptography and cryptanalysis). | |||
* ''Cryptography and Mathematics'' by [[Bernhard Esslinger]], 200 pages, part of the free open-source package [[Cryptool]], http://www.cryptool.com. |
Revision as of 15:09, 9 August 2008
- Please sort and annotate in a user-friendly manner. For formatting, consider using automated reference wikification.
Elementary
- Gaines, Helen F. Cryptanalysis
- Sinkov, Abraham. Elementary Cryptanalysis: A Mathematical Approach Excellent; readable at a high school level
- The Codebreakers by David Kahn.
- The Code Book by Simon Singh, a clearly written anecdotal history of crypto, covering modern methods including public key.
- Crypto: How the Code Rebels Beat the Government Saving Privacy in the Digital Age by Steven Levy, about the political and legal conflicts in the US about cryptography, such as the Clipper Chip controversy and the Bernstein v. United States lawsuit.
- Stealing Secrets, Telling Lies: How Spies and Codebreakers Helped Shape the Twentieth Century, by James Gannon.
- sci.crypt mini-FAQ.
- NSA's CryptoKids.
- RSA Laboratories' Frequently Asked Questions About Today's Cryptography
- Cryptography: The Ancient Art of Secret Messages by Monica Pawlan - February 1998
- In Code: A Mathematical Journey by Sarah Flannery (with David Flannery). Popular account of Sarah's award-winning project on public-key cryptography, co-written with her father.
More advanced, but dated
- Friedman, William F. Military Cryptanalysis
Definitely mathematical
- Scheier, Bruce. Applied Cryptography: Protocols, Algorithms, and Source Code in C
- Handbook of Applied Cryptography by A. J. Menezes, P. C. van Oorschot, and S. A. Vanstone (PDF download available), somewhat more mathematical than Schneier's book.
- Introduction to Modern Cryptography by Phillip Rogaway and Mihir Bellare, a mathematical introduction to theoretical cryptography including reduction-based security proofs. PDF download.
Fiction
- Cryptonomicon by Neal Stephenson (novel, WW2 Enigma cryptanalysis figures into the story, though not always realistically).
- Alvin's Secret Code by Clifford B. Hicks (children's novel that introduces some basic cryptography and cryptanalysis).
- Cryptography and Mathematics by Bernhard Esslinger, 200 pages, part of the free open-source package Cryptool, http://www.cryptool.com.