ŷ

Jump to ratings and reviews
Rate this book

The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography

Rate this book
In his first book since the bestselling Fermat’s Enigma, Simon Singh offers the first sweeping history of encryption, tracing its evolution and revealing the dramatic effects codes have had on wars, nations, and individual lives. From Mary, Queen of Scots, trapped by her own code, to the Navajo Code Talkers who helped the Allies win World War II, to the incredible (and incredibly simple) logisitical breakthrough that made Internet commerce secure, The Code Book tells the story of the most powerful intellectual weapon ever known: secrecy.

Throughout the text are clear technical and mathematical explanations, and portraits of the remarkable personalities who wrote and broke the world’s most difficult codes. Accessible, compelling, and remarkably far-reaching, this book will forever alter your view of history and what drives it. It will also make you wonder how private that e-mail you just sent really is.

432 pages, Paperback

First published January 1, 1999

2835 people are currently reading
56822 people want to read

About the author

Simon Singh

16books1,477followers
Simon Lehna Singh, MBE is a British author who has specialised in writing about mathematical and scientific topics in an accessible manner. He is the maiden winner of the Lilavati Award.

His written works include Fermat's Last Theorem (in the United States titled Fermat's Enigma: The Epic Quest to Solve the World's Greatest Mathematical Problem), The Code Book (about cryptography and its history), Big Bang (about the Big Bang theory and the origins of the universe) and Trick or Treatment? Alternative Medicine on Trial (about complementary and alternative medicine).

He has also produced documentaries and works for television to accompany his books, is a trustee of NESTA, the National Museum of Science and Industry and co-founded the Undergraduate Ambassadors Scheme.

Ratings & Reviews

What do you think?
Rate this book

Friends & Following

Create a free account to discover what your friends think of this book!

Community Reviews

5 stars
13,756 (48%)
4 stars
10,516 (37%)
3 stars
3,187 (11%)
2 stars
588 (2%)
1 star
301 (1%)
Displaying 1 - 30 of 1,768 reviews
Profile Image for Paul.
2,511 reviews20 followers
December 15, 2016
9788 432411439 1440 57418348 0 50828309836 7889474 45 24348 033 243417400836 5742 0328439 46459 94 974 243473 3047 83 50296 89 6448 434 8945 5079747 9703 5748439 3046 033 68148 08 0 1440 09 2709 974 509074 204 7413 83 9788 584137

974 009747 278948 01409 2709 24013 7014 1443 60894 0 374 8019429 2897 8027 4397088082 033 83 8027 03 43606836 204 9709 434 20399 7415 109 14 37023 837 145474 7403836 9788 14406 8 4314 703 0 1474 70382439074 034214364 45 274594670574 033 02 1474 2027 974 1042037 88367 43510838 978368 84 2411 9709 440 34399 3443 034 57847 034214364 45 974 8019429 94 902014 9788 14408 85 8 203 0334789033 896 0341434 203! 8911 3458389414 14 7403836 2474 45 788 2470 83 974 5090747

8424 45 974 945828 2414743 7474 074399 94273820114 243247343 2897 24348 033 2434174008366 109 3401 2897 974 97038109843 45 0328439 94398 8027 08 78474614578287 0328439 3403 103600648 074399 243486 08 80276 1420084 9744 2474399 2740943 2897 974 839439843 45 2432401836 974 243943988 60894 974 455488946 83 50298 109 9744 074 74141039 83 9709 8424 45 974 9427386048 074 870743 2897 2434174008367 97484 27059478 02900114 2004 547 740114 83947489836 74038366 84 8998 0 2412424 381478843 033 434 9709 88367 240148 8394 974 7489 45 974 1440 84021488147

14 2073436 9740678 7403836 9788 1440 2811 2004 440 2039 94 34114 344547 8394 974 8019429 2099477 547903094146 974 009747 57418348 0 5079747 7403836 1889 09 974 433 45 974 14406 84 97474 074 514394 45 509074 34186798 83 89474!

5787 85 440 02900114 2439 94 974 455479 45 34243836 9788 7418426 440 649 0 6413 89077 03 820683074 6413 89076 109 89811777


And for those who care, here is the key to decode the above review:


0 a k u
1 b l v
2 c m w
3 d n x
4 e o y
5 f p z
6 g q ,
7 h r .
8 i s ;
9 j t '


Be warned, though; the key alone will not give you a complete decoding! :-)

And for those who can't be bothered, here's the decoded review:
Profile Image for Mario the lone bookwolf.
805 reviews5,172 followers
April 9, 2023
A journey through the history of coding, cryptography, and codebreaking.

From primitive to high tech
Chronologically arranged, the book begins in ancient times and describes simple forms of encryption such as shaving the head, tattooing a message, waiting a few weeks, or wrapping a leather strip with important information around a stick of specified thickness. The further the time progresses, the more complex the techniques become and get ever shorter expiration dates because of the specialists trying to crack them.

Very specific
The methods used are described in detail, which is sometimes too advanced for beginners, and because of this, it´s sometimes advisable to skim the purely theoretical descriptions as in my case (laziness and layman). The military historical and political aspects are anyway much more interesting for the philistines of applied science.

Alternative realities
Thus, in the race between decoders and creative code writers, not only the reputation of the technicians but often also the history of the world as we know it was at stake. An earlier, later, or even non-occurrence of an encryption or decryption technique would almost certainly have led to another current geopolitical map, unleashing close to any possible uchronic alternative timeline.

That escalated quickly
The closer the book comes to the present, the more explosive the stories become. Like for instance the possibility of an undecipherable encryption technique, which should, as wanted by the military, never be widely used because of its complexity and importance for cyberwarfare superiority.

The big unanswered question at the end of the book is whether today's very secure encryption technology has already been silently banished into the area of no longer total reliability. The suddenly antiquated encryption technique could be owned by a nemesis like quantum computers (or quantum teleportation hacked, although this would enrage theoretical physicists a bit) or just supercomputers or immense combined computational power. Because this is the most important economic and military factor, the uncertainty is immense. And it would be interesting to know because almost all private and commercial traffic is secured in one of these ways too. Let´s be surprised.

A wiki walk can be as refreshing to the mind as a walk through nature in this completely overrated real-life outside books:

Profile Image for Jim.
95 reviews38 followers
September 19, 2008
The Code Book is like geek porn. Explanations of the theories behind cryptography are woven together with anecdotes of times when code-making or code-breaking was integral to historical events. Singh strikes an excellent balance with this book. The clarity of his writing makes the explanations of the mathematics of cryptography very straightforward without dumbing them down, and the historical connections are always fascinating.

Personally, my favorite part was the section devoted to the role cryptography played in World War II. The cracking of the Enigma at Bletchley Park was probably one of the greatest moments in nerd history.

If you're fascinated by puzzles, curious about history, or you want to know what privacy really means in the 21st century, pick up this book. You'll have a hard time putting it down.
Profile Image for Bradley.
Author9 books4,740 followers
March 3, 2019
Coming on 20 years after the book was written, it’s still quite awesome despite all our subsequent advances in cryptography.

Or rather, I should say, we’re still living in the same world already transformed by pretty good encryption. The methods for breaking the security still falls in the same category as usual: interception. Of course, the means of interception has gotten amazingly good and creative as hell, but that isn’t the primary scope of this book.

Rather, it’s about an awesome crash course in the history of encryption from the Middle Ages or earlier, say Roman or Greek, all the way forward to mechanical solutions a-la Babbage and right into the thrilling good stuff of WW2, including Turing and the awesome Code Talkers.

The advances since then are almost stunningly fascinating, however, and aside from Zimmerman’s courageous advent of PGP, the REST of the story may well be trapped under National Security blankets still.

Alas. What I wouldn’t give to get a backstage pass to those goings-on. :)

Well written, accessible, and rather thorough, this book remains one of the best books on encryption for laypersons. Highly recommended.
Profile Image for Richard Derus.
3,661 reviews2,199 followers
May 14, 2020
PEARL RULED (p79)

The development of the telegraph, which had driven a commercial interest in cryptography, was also responsible for generating public interest in cryptography. The public became aware of the need to protect personal messages of a highly sensitive nature, and if necessary they would use encryption, even though this took more time to send, thus adding to the cost of the telegram.

When I awoke from my coma, I realized: 1) sesquipedalian verbiage needs must be read while fresh and hale, 2) I don't care as much as I thought I would, 3) hot Spring afternoon sunshine feels good.

Also, I might not be as smart as I thought I was. The graphs and tables preceding this page caused me to whimper and curl into a fetal ball. Ahead (I peeked) were *entire*pages* of comma-separated numbers. That is unconscionable. It is a replay of , the SF novel with equations in it, that I could not even bring myself to hurl at a wall I was so paralyzed by outraged betrayal at picking up a novel to discover EQUATIONS in it.

Keep your filthy math out of my fiction!

Anyway, this book. It's non-fiction so there's no reason to be sniffy about numbers and junk, right? Sorta right. I need something to give me the will to drag myself over the glass shards atop the bed of coals and in this read there wasn't anything at stake from moment to moment. Overall, yes; secrecy/privacy is a major part of the online world both in its presence and absence. But in this book the stakes are abstract and waaaaaaaaayyyyyyyyy above my li'l punkin haid.

I'll keep it in case it calls to me this winter. Now, no.
Profile Image for Belhor Crowley.
114 reviews99 followers
September 24, 2014
By far the best and the most interesting book on the subject. recommended to anyone interested in Cryptography and its history. I read it in three days mainly because I couldn't put it down.
Profile Image for Shafaet Ashraf.
Author1 book119 followers
April 1, 2015
প্রায় ৩মাস ধর� পড়ে শে� করলা� যেকোনো সিনেমাকে হা� মানানো ক্রিপ্টোগ্রাফি� ইতিহাস� এই বইয়ের সত্যিকারের মজ� নিতে হল� ক্রিপ্টোগ্রাফি� প্রটোকলগুল� বুঝে বুঝে পড়ত� হব�, তব� সেগুলো বুঝত� জটিল কোনো গণিত জানা� দরকা� হব� না, লেখকের দক্ষতা� পরিচয়টা সেখানেই।

পৃথিবীতে বড� বড� সব যুদ্ধগুল� হয়েছে আসলে 'কোডব্রেকার' আর 'কোডমেকার' দে� মধ্য�, যারা� প্রতিপক্ষে� পাঠানো গোপন চিঠিগুলো পড়ে ফেলত� পেরেছে তারা� কৌশলগত দি� থেকে একধা� এগিয়ে গিয়েছে। সে� জুলিয়াস সিজারে� সিজা� সাইফার থেকে শুরু কর� নাৎসিদের ব্যবহৃ� এনিগমা মেশি�, আধুনিক কালে� পাবলিক-কী এনক্রিপশ�, কোয়ান্টাম ক্রিপ্টোগ্রাফি� বিবি৮৪ এনক্রিপশ� সবকিছু নিয়� আলোচনা কর� হয়েছে এই বইয়ে।

যদ� মন� হয� যে খটমট� গণিত নিয়� এই বই তাহল� ভু� হব�, এই বই ক্রিপ্টোগ্রাফি� ইতিহাসের, কিভাবে মানুষে� ইতিহাসের গতিপথে ক্রিপ্টোগ্রাফি বিশা� ভুমিকা রেখে চলেছ� তা� নিয়� এই বই�

Profile Image for Annie.
1,101 reviews403 followers
August 27, 2017
I haven’t had this much gleeful delight in a book in a long time. This book is pure fun. It’s not fast reading necessarily, and requires some active engagement to keep up, but man, it is a blast. If you read a lot of spy books as a child, or if you’re secretly jealous when there’s a cipher to be solved in a TV or movie plot and a character says,“Yeah, I can totally crack this if I have a few hours, let me get to work,� you’re going to love this.

Singh introduces us to famous historical ciphers and codes, as well as the basic principles underlying code making and code breaking- you actually get a fairly solid foundation on understanding how to build and crack most classic ciphers.

--------------CODES AND CIPHERS--------------

Some examples of interesting codes this book unpacks and deconstructs with you:

-Transposition. Substitution. Superencipherment.

-Caesar shift ciphers.

-The Vigenere square cipher.

-The Great Cipher of Louis XIV.

-The as-yet-unsolved Beale cypher.

-The ADFGVX cipher.

-The Zimmerman telegraph cipher.

-The one-time pad cipher (aka a Vigenere cipher where the keyword is a random string of letters, at least as many as are in the text to be enciphered- which is inherently un-decipherable by cryptanalysis. But which of course requires both the message writer and receiver to have a copy of the random key, which makes it vulnerable to discovery. Plus it’s expensive to constantly create brand-new random keys for hundreds of messages a day).

-Navajo code-talking.

-All the way on up to quantum cryptography, which in theory at least is an uncrackable cipher.

---------------CRYPTANALYSIS---------------

For me, the real genius comes into play here, in cryptanalysis- the deciphering of all those nasty little devils. Some memorable moments in cryptanalysis history:

-Al-Kindi’s method of deciphering by analyzing the message in terms of letter frequency, or looking for unusual letter pairings (in English, Q is basically always followed by U so if you find a particular letter that is never followed by anything but another particular letter, that’s probably Q and U).

-Bazeries� method of deciphering the Great Cipher of Louis XIV by analyzing by syllable frequency rather than letter.

-Charles Babbage (who, incidentally, invented the prototype of a computer way back in the 1700s) invented a method of deciphering the Vigenere cipher. First, you look for repeated sequences of letters- words that are repeated, and which happened to have gotten encrypted the same way because they land on a multiple of the number of letters the key has. You count the spaces in between those words, and draw up a chart with all the different repeated word sequences and the factors that go into those spaces (e.g. factors of 20 would include 1, 2, 4, 5, 10, and 20- but you wouldn’t use just 1 letter for a keyword, so it can’t be that). Find the number that's a factor common to ALL of the repeated letter sequences, and you know the number of letters in the key word. Then you look at the letters the first letter of the keyword would be used to encrypt and use frequency analysis on *that*. [I’m not explaining this well, but Singh does, and it’s so brilliant it makes your ears wiggle.]

-The deciphering of the ancient script known as Linear B by Alice Kober and Michael Ventris.

-------------MODERN CRYPTOGRAPHY-------------

Cryptography can basically be credited with the invention of computers. Furthermore, cryptographers are the reason you can send encrypted messages that nobody but the receiver can access, and the reason you can buy things over the Internet without people taking you credit card information.

I have a BlackBerry, so I feel like I’m supposed to be a slick techie who knows what encryption is, but I’ve never heard it explained as straightforwardly as this book:

Alice wants to send Bob a letter and she doesn’t want the postal service workers to be able to read it. Obviously, she can’t just send it in a padlocked iron lock-box, because she has no way of securely giving Bob a key. So what can she do? She puts the letter in the iron box, padlocks it, mails it to him. He puts his own padlock on it- the box now has two padlocks- and sends it back to her. Now Alice removes her own padlock and sends the box, locked with Bob’s own padlock, back to him. He removes his padlock and reads the letter. That way, the box is never unlocked, but Alice and Bob don’t have to find a way to exchange keys. (This would be especially problematic if the key has to be different for every message or device, the way it is in technology).

Then there's the asymmetrical public key encryption system designed by Diffie, where Alice has a “public key� that allows anyone to encrypt a message to her, but cannot be decrypted by the same key- it can only be decrypted by another key, the private key to which only Alice has access. So Bob could “look up� Alice’s public key, which is known to everyone, encrypt his message to her, and she can decrypt it. In the padlock scenario, this would mean Bob would go to the post office, take an “Alice padlock,� of which there are many copies, lock the box with his message inside, and mail it to her. Only Alice holds the key that can unlock this, so the system is secure.

---------------CONCLUSIONS---------------

This is just such a cool book, an absolute ride. I can't imagine anyone who wouldn't have at least a little fun with it. It's accessible, it's interesting, it's challenging, and it's an unusual read. Not a bad thing to say about this one.
Profile Image for Stefan Kanev.
125 reviews235 followers
October 14, 2015
I recently watched The Imitation Game, which left such a bad taste in my mouth, that I wanted to clean it up with something in a similar subject. Having read two of Sighn's other books, I picked this one.

I had high expectations and it met them nicely. The book tells the story of ciphers and encryption through history � from what the Greek and the Romans did, through the Enigma, and finally to RSA. The style is very easy and pleasant to read, everything is pretty understandable even if you don't have a math background (sometimes to the point of being slightly inaccurate) and there are a lot of interesting stories inbetween.

This book has a single downside � it's so pleasant and easy to read, that you'll be done with it in no time. Highly recommended.
Profile Image for Arnab Paul.
62 reviews118 followers
August 10, 2015
পড়ে শে� করলা� Simon Singh এর The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography
বইটি� সন্ধান পা� গুডরিড� ঘাঁটাঘাঁটি করতে করতে� Cryptography;অর্থাৎ আপনা� তথ্যকে সর্বসাধারণের আড়ালে রেখে সংরক্ষ� � প্রাপককে সরবরাহ করার বিদ্যা নিয়� এই বই।হাজার বছ� আগের রাজা বাদশাদের আম� থেকে Cryptography-� চর্চ� শুরু,যা� স্রো� এখ� আপনা� সোশা� মিডিয়� অ্যাকাউন্ট থেকে সেলফোনের রিচার্� কার্ডে� ব্যবহারে চলছে সদর্পে !চারশ� পৃষ্ঠা� এই বইটিতে Cryptography-� রোমাঞ্চক� ইতিহাস , বিকাশে� রাজনীতি� পটভূমি ছাড়াও এর গাণিতি� সৌন্দর্যের সুখপাঠ্য বর্ণণা আছে।গণিতের অংশগুল� খটমট� নয� মোটে�, উচ্চ মাধ্যমিক পর্যায়ে� বিন্যা�-সমাবেশ,সংখ্যাতত্ত্বের সাধারণ ধারণ� থাকলেই যথেষ্ট�
বইয়ের শুরু রাণী এলিজাবেথের হাতে স্কটিশ রাণী� Encryption-সংক্রান্� ফ্যাসাদে পড়ে করুণ মৃত্যুদণ্ডের কাহিনি দিয়�, শে� হয়েছে ভবিষ্যতে� প্রযুক্ত� Quantum Cryptography সম্ভাবনায়�
প্রাচীনকাল� রাজা বাদশার� শত্রুরাজ্য পা� হয়ে মিত্রে� কাছে গোপন খব� পাঠাতে Cryptography-� আশ্রয় নিতেন।শুরুতে চর্চাট� ছিলো শুধু লুকানোতে, অর্থাৎ Steganography. স্পা�-এর মাথা কামিয়� সেখানে মেসে� লিখে চু� গজানোর পর পাঠানো হত, শত্রুর হা� থেকে তথ্য বাঁচাতে।খোলস অবিকৃত রেখে সেদ্� ডিমে� সাদা অংশে লেখা� পদ্ধতি� আবিষ্কার তখনি!পুরো বই জুড়েই 'কথ�-লুকানো' বিদ্যা� দুর্দান্� সব কাহিনি,
পাশাপাশি তা থেকে তথ্য বে� করার কৌশল এর কথ� � বাৎস্যায়ন তাঁর কামসূত্রেও উল্লেখ কর� গেছে� এর কথ�,নারীদে� জন্য নির্ধারি� ৬৪ কলার ৪৫ নম্বরে আছ� এই বিদ্যা,"ম্লেচ্ছিকা-বিকল্প"!
ঐতিহাসিক সেকাহিনি, Code maker � Code breaker দে� যুদ্ধ। প্রথমদিক� চল� বর্ণের প্রতিস্থাপ� এর মাধ্যম� Monoalphabetic Encryption ,মানে নির্দিষ্� সংখ্যক অক্ষ� শিফ্‌ট কর�; a এর জায়গায় d ,b -� বদলে e এভাবে। এনিয়ম� এক বর্ণ শিফট কর� "ANT" কে লিখত� হব� "BOU"� অর্থাৎ ইংরেজি ছাব্বিশট� অক্ষ� এক� এক� শিফট কর� টেস্� করলে� বেরিয়� আসবে আস� মেসেজ।দিনে দিনে Cryptography
কঠিন হত� লাগলো। Code maker-রা বর্ণ প্রতিস্থাপ� এর পরিবর্তে Randomly বর্ণ নির্ধারণ করলে� এবারে।অর্থাৎ প্রেরক ইচ্ছেমতো বর্ণ ধরবে�,যা� এক কপ� থাকব� প্রাপকের কাছে।এবারে সহজে মেসে� বে� করার পদ্ধতি আর চলছেনা�
কিন্তু মানুষে� বুদ্ধিচর্চার Legecy টা এখানেই, পরিসংখ্যান বিশ্লেষণের মাধ্যম� সে� টেক্সট� পাঠে� পদ্ধতি� বে� করলে� Code breaker-রা� প্রতিট� ভাষা� ধ্বনিতত্ত্� বিশ্লেষণ করলে দেখা যায়,এখান� সুনির্দিষ্� কিছু ধ্বন� বেশি ব্যবহৃ� হয়।যেমন ইংরেজিতে সবচে' বেশি ব্যবহৃ� হয� "e",তারপ� "a","t" ইত্যাদি।এভাব� বর্ণ বে� করার পদ্ধতি� না� Frequency Analysis. আরবেরা এই পদ্ধতি� জনক।ধর্মগ্রন্থ� কো� কো� শব্দ কতোবার ব্যবহা�
হয়েছে, এই চর্চার মাধ্যম� পদ্ধতিটি� আবিষ্কার(আল-শব্দটা বেশি ব্যবহা� হয�,তাই� সংশ্লিষ্� ধ্বনিগুলোর বাহুল্� থাকব� এখান�)�
এবার একটা সাধারণ পদ্ধতি� কথ� বলছি� একটা ইংরেজি Encrypted Text ধর� নিন। আলোচ্য পদ্ধতিটি� সাহায্যে কো� বর্ণ বেশি ব্যবহৃ� হয়েছে,তা� একটা হিসে� কর� আমরা "e" কোনট� বে� কর� নিতে পারি।স্যাম্প� হিসেবে Text থেকে বেছে নিচ্ছি তি� অক্ষরে� এম� একটা শব্দ, যা� শেষে ঐবর্ণট� অর্থাৎ যা� আড়ালে লুকায়িত "e" আছে। এবার দেখব� দ্বিতীয় অক্ষরটিকে। পুরো Text � যদ� "e" এর পর�
� দ্বিতীয় অক্ষরট� না দেখা যায় তাহল� নিশ্চিতভাবেই বল� দেয়� যায়,অক্ষরট� "h" এব� শব্দটা "The". পুরো ইংরেজি ভাষায় খু� বেশি শব্দ নে� যেখানে "e" এর পর "h" বসে।এভাব� � বর্ণগুলো প্রতিস্থাপ� করলে� আস� মেসেজে� চেহারা বে� হত� শুরু করবে।বাকিট� ভাষাবিদদের কাজ।বইয়� পুরো এক অধ্যায� জুড়� ধাপে ধাপে একটা গুপ্তবার্ত� বে� কর� দেখানো হয়েছে,যা কোনভাবেই রহস্যোপন্যাসের কাহিনিজট ছাড়ান� থেকে চেয়� কম নয়।
ছোটবেলায� এডগা� এলান পো'� The Gold Bug � এরকম পদ্ধতিতে গুপ্তধ� বে� করার কথ� পড়েছিলা�,যদিও তখ� কিছু বুঝিনি।ঐ অধ্যায়ট� পড়া� পর পুরোনো প্রশ্নের উত্ত� পেয়� চমৎকৃত হয়েছি!
চার্লস ব্যবেজ � স্যা� হুইটস্টো�(সার্কিটে� Wheatstone Bridge-খ্যা�) এরকম Cryptanalys � সুপারদর্শী ছিলেন।তাদে� ��� মজার ঘটনা না উল্লেখ করলে� নয়। ভিক্টোরিয়ান ইংল্যান্ডে প্রেমি�-প্রেমিকা� অবাধ ভালোবাসা� আদান প্রদানটাকে ঠি� সহজভাব� নেয়� হতোনা।পরিবারের কে� যে� না জানত� পারে,তা� পত্রিকার ব্যক্তিগ� কলাম� Encryption এর মাধ্যম� প্রেমপত্রে� আদান-প্রদান হবার ট্রেন্� চালু হয়েছি� তখ�!
স্যা� হুইটস্টো� একদি� The Times পত্রিকায� অক্সফোর্ডে� এক ছাত্রে� প্রেমিকাকে লেখা চিঠি� পাঠোদ্ধা� করেন,দেখে� সেখানে লেখা পালিয়� বিয়� করার কথা।পরের সংখ্যায় � এক� Encryption মেথড-� তিনি বুঝিয়� সুঝিয়� লেখে�;দে� বাবা,এভাব� পালিয়� বিয়� করাটাত� ঠি� না।পরে� সংখ্যায় প্রে���িকা বেচারি সোজা-সাপ্টা ইংরেজিতে লিখে বসেন ,"Dear Charlie, write no more.Our cipher is discovered." !
এভাব� অসংখ্য রক� ধাঁধ� তৈরি � ভাঙানো� ঘটনা ইতিহাস� জ্বাজল্যমান।হাতে কলমে লেখা� ব্যাপারট� উঠ� গে� রেডিয়�-যোগাযো� ব্যবস্থা� আবিষ্কারের মাধ্যমে। Cryptography-� সবচে' গুরুত্‌বপূর্� অধ্যায� শুরু হয� প্রথ� বিশ্বযুদ্ধ শুরু হল� পরে।জয� পরাজয় নির্ধারণ� গুপ্তবার্তাই হয়ে দাঁড়ায় প্রধান নিয়ামক।আমেরিক� � ব্রিটে� Cryptography-� দৌড়� তখনও এগিয়ে,এর মাধ্যমেই বিজয� ত্বরান্বিত হয়।কিন্তু দ্বিতীয় বিশ্বযুদ্ধ� জার্মানবাহিন� নামে
দুর্লংঘ্� "Enigma" নিয়ে। সে সময়কা� রোমহর্ষক ইতিহাসের শ্বাসসরুদ্ধক� বর্ণনা আছ� বইটিতে।স� ইতিহাস শীতল স্নায়ুযুদ্ধের,মর্মান্তিক � এক� সাথে চূড়ান্ত উত্তেজনাকর।ঐ সময়টাতে� Cryptography-� বিকাশট� হয� সবচে' বেশি� ততদিনে Cryptography-টা আর ভাষাবিদদের মধ্য� সীমাবদ্ধ নয�,বর� গণিতবি�,দাবাড়�,বিজ্ঞানীদে� প্রাধান্যে এগিয়ে চলছে দ্রুতগতিতে।অপ্রতিরোধ্য "Enigma"কে� হা� মানা� Bletchley Park
এর বিজ্ঞানী,গণিতবিদেরা,যা� অন্যতম নায়� অ্যালা� টুরি�! তিনি� প্রথ� কম্পিউটারে� রূপকার, মেকানিকে� ডিভাইসের মাধ্যম� এর তৈরি।পরবর্তীতে তা� উন্নয়� কর� হয� ভ্যাকুয়াম টিউব ব্যবহা� করে।কীভাবে পর্যায়ক্রমে যান্ত্রি� কাঠামো থেকে তাড়িতিক রূ� লা� কর� কম্পিউটা�, � অধ্যায়ও পড়লেই ধর� যায় স্পষ্ট� আর� আছ� আদিম মিশরীয় ভাষা হায়ারোগ্লিফিক রহস্যভেদের কাহিনি�
আপনা� ইমেই�,ফেসবুক অ্যাকাউন্ট কতোটুক� সুরক্ষিত? আন্তর্জাতি� নিরাপত্ত� সংস্থাগুলো নজ� রাখছ� কি? USA-� National Security Agency(NSA) ওখানকা� সফটওয়্যার কোম্পানিগুলো� প্রত� নি্য� আরোপ করেছ�, বহির্দেশ� বিক্রি� সফটওয়্যারের সিকিউরিট� যে� এম� না হয� যে,তারা তা Break করতে না পারে!এর পক্ষ� তারা যুক্তি হাজি� কর� টেররিস্টচক্রের চক্রান্ত-পূর্বাভা� পাবা� অজুহাত দেখিয়ে।যদিও নথ� ঘেঁট� দেখা যায়,
অনেক সময়� ক্ষমতাধর প্রেসিডেন্টর� এই আড়িপাতাকে ব্যবহা� করেছেন বিপক্ষদলের দূর্বলতাকে অস্ত্র হিসেবে পেতে।সেক্ষেত্র� ব্যক্তিগ� নিরাপত্তার প্রশ্ন� আমাদের মত� দেশে� মানুষে� অবস্থানট� তাহল� কোথায়?
ইতিহাস,বিশ্বারাজনীতি,গণিত,প্রযুক্তিপ্রেমিদের জন্য অবশ্যপাঠ্য এই বই�
Profile Image for Pallavi Gambhire.
56 reviews178 followers
January 13, 2012
I never thought I'd love a book about mathematics, or ever see the beauty of mathematics. My mother was definitely right when she kept pestering me to work harder on my math and argued that it was EVERYWHERE! (I had argued back saying I would be fine as long as I could perform the basic calculations!)
Maybe this is what growing up is about!
That being said, this is a very informative book about the past, present and future of cryptography. Singh takes us on a journey from ancient times where simple communications and hence simple codes sufficed, through a series of unfortunate events that resulted in the execution of Mary, Queen of Scots,to a time in the future when quantum cryptography might prevail. My favorite part is when he talks about the decipherment of Linear B (which led me to another amazing book of the same name), an ancient language discovered in the remains of a palace in Crete. Oh, and he also makes the Second World War seem interesting in an entirely differently way.
Singh has a knack for explaining ideas and theories, which might seem mundane if explained by someone else, in a very interesting manner. His use of characters called Alice,Bob and Eve to explain the codes, made it easy for a layperson like me to understand the theory behind them.
He even adds a few ciphers for us to decipher at the end. I must admit I skipped over those pages, but might return to them at some point in the future.
I recommend this book to anyone who is fascinated by ancient history, linguistics, cryptography, quantum physics, OR MATHEMATICS!
Profile Image for Shoti.
105 reviews1 follower
March 22, 2020
01000001 01101110 00100000 01100101 01101110 01110100 01100101 01110010 01110100 01100001 01101001 01101110 01101001 01101110 01100111 00100000 01110011 01110101 01101101 01101101 01100001 01110010 01111001 00100000 01101111 01100110 00100000 01110100 01101000 01100101 00100000 01101111 01101110 01100111 01101111 01101001 01101110 01100111 00100000 01110010 01100001 01100011 01100101 00100000 01100010 01100101 01110100 01110111 01100101 01100101 01101110 00100000 01100011 01101111 01100100 01100101 01110010 01110011 00100000 01100001 01101110 01100100 00100000 01100010 01110010 01100101 01100001 01101011 01100101 01110010 01110011 00100000 01101111 01110110 01100101 01110010 00100000 01110100 01101000 01100101 00100000 01101101 01101001 01101100 01101100 01100101 01101110 01101110 01101001 01100001 00101100 00100000 01101001 01110100 00100000 01101001 01110011 00100000 01100001 00100000 01110000 01101001 01110100 01111001 00100000 01110100 01101000 01100001 01110100 00100000 01110100 01101000 01100101 00100000 01110000 01100001 01110011 01110100 00100000 01110100 01110111 01101111 00100000 01100100 01100101 01100011 01100001 01100100 01100101 01110011 00100000 01101000 01100001 01110110 01100101 00100000 01101110 01101111 01110100 00100000 01100010 01100101 01100101 01101110 00100000 01100011 01101111 01110110 01100101 01110010 01100101 01100100
Profile Image for Gorab.
810 reviews140 followers
May 27, 2020
⭐⭐⭐⭐�
This turned out to be a mine of knowledge for me.

What I learnt:
1. Difference between cryptography, steganography, ciphers, encryption and decryption

2. Various ciphers and their detailed techniques - Monoalphabetic, Caesar shift, Vigenere, Pigpen, Playfair, EDLSs, Morse Code, Beale Cipher�

3. Deciphering the ancient Egyptian and Greek texts - Hieroglyphics - how Linear B was decoded, and why Linear A is still a puzzle waiting to be solved.

4. Standardization of encryption - today's popular encryption mechanisms - DES and RSA

5. Future with quantum computing - explanation is crystal clear to help someone who is new to quantum mechanics.

6. Most interesting part - knowing and understanding all the great persons involved in making and breaking the code.

7. Details on the never ending race between non-breakable code and mechanism to defy all encryption.

8. Interesting background stories - Mary Queen of Scots, Man in the Iron Mask, Arab's frequency analysis, Creation (and breaking) of German Enigma, Bletchley Park, Navajo code, Rosetta stone, Zimmermann's PrettyGoodPrivacy, formation of laws "against" strong encryption.

8. A whole load of many more interesting concepts

If not for world war and the quest to decode the enemies thoughts, we wouldn't have the luxury of computers way ahead of its time.
Whether the same will be true for Quantum computers? I think so�

Interesting quotes:
"Cryptography used to be an obscure science, of little relevance to everyday life. Historically, it always had a special role in military and diplomatic communications. But in the Information Age, cryptography is about political power, and in particular, about the power relationship between a government and its people. It is about the right to privacy, freedom of speech, freedom of political association, freedom of the press, freedom from unreasonable search and seizure, freedom to be left alone."

"The fundamental question is whether or not governments should legislate against cryptography. Cryptographic freedom would allow everyone, including criminals, to be confident that their e-mails are secure. On the other hand, restricting the use of cryptography would allow the police to spy on criminals, but it would also allow the police and everybody else to spy on the average citizen."

"The deciding factor will be whom the public fears the most - criminals or the government"

As Neil Bohr said - "Anyone who can contemplate quantum mechanics without getting dizzy hasn’t understood it."

"The urge to discover secrets is deeply ingrained in human nature; even the least curious mind is roused by the promise of sharing knowledge withheld from others. Some are fortunate enough to find a job which consists in the solution of mysteries, but most of us are driven to sublimate this urge by the solving of artificial puzzles devised for our entertainment. Detective stories or crossword puzzles cater for the majority; the solution of secret codes may be the pursuit of a few." - John Chadwick

Highly recommended stuff!

Recommended for: If you love treasure hunt, logical deductions, puzzles, anything related to digital privacy sounds fascinating to you, then this is the book for you.
Not recommended: If you totally abhor simple mathematics, data interpretation, tables and charts.
4 reviews
May 3, 2015
This is a fascinating introduction to the world of cryptography. It has opened my eyes to a whole new subject that interests me, and now I have spent many hours attempting to create a machine that can decrypt hidden messages. It is a wonderful and gripping tale of the history of cryptography, and presents the entire plot as a battle between the code makers and the code breakers. I was never left a little bored at parts as I occasionally am during non-fiction books because it is a continuous story that flows throughout the pages. It keeps you in suspense over the fate of the queen of Scotland, the behind-the-scenes intelligence conflict in the midst of World War II, and the secret of the Beale treasure. For anyone interested in the matter, it is a must read, and for anyone who think they might enjoy the subject, I highly suggest it.
The history contained in this near-novel doesn't merely end a long time ago, but extends up to the very present, and discusses the exciting possibilities of cryptography in the future. Quantum computers and qubits enter the scene, hopefully presenting the holy grail of code-making, letting the code makers win the struggle forever. Our modern lives lay on the foundation of the public and private key system, including everything from the internet to checks. The only reason you are capable having your own private account in security is that complex math is occurring behind the scenes, multiplying two prime numbers hundreds of digits long so that any computer would take the lifetime of the universe to decode the messages you send. If you want to understand our modern age, you should definitely read this book.
Profile Image for Hristina.
536 reviews79 followers
April 24, 2017
Read for the Reading Without Walls challenge, for 'a topic you don't know much about'. And even though I didn't finish it in a week, CHALLENGE COMPLETE.

I really enjoyed The Code Book. The explanations were well-done, and the history lessons amazed me, which is odd because I'm not a history fan. I learned a lot about codes and ciphers and how they work, and that was the best part of it all. I liked the writing, so I think I might pick up another Simon Singh book in the future.
Profile Image for Đoàn Duy.
25 reviews87 followers
May 18, 2018
Trong lịch s� nhân loại đã xảy ra những cuộc chiến tranh tàn khốc, như hai cuộc th� chiến đầu th� k� 20. Tuy nhiên, bên cạnh những cuộc chiến bên ngoài chiến trường, thì ẩn bên trong nó lại là một cuộc chiến khác: cuộc chiến v� thông tin. Đã có truyền tin thì tất nhiên cần phải có yêu cầu gi� bí mật. Th� là ngành khoa học mật mã (cryptography) ra đời đ� phục v� cho yêu cầu đó.

Cuốn sách “Mật mã� (The Code Book) s� dẫn dắt chúng ta nhìn lại lịch s� dưới góc nhìn của mật mã học. Cuốn sách bắt đầu bằng những dạng mật mã đơn giản nhất ra đời t� cuối th� k� 16 và kết thúc � cuối th� k� 20 bằng việc giới thiệu v� ý tưởng mật mã lượng t�, một loại mật mã được cho là bất kh� chiến bại dựa trên lí thuyết lượng t�.

Simon Singh (1964-?), tác gi� cuốn sách, là tiến sĩ vật lí người Anh gốc Ấn Đ�. Ông là một nhà khoa học tài năng và đã từng có nhiều đóng góp đáng k� trong việc ph� biến khoa học dưới nhiều hình thức: t� viết sách đến tham gia làm phim tài liệu khoa học. Ngoài cuốn The Code Book, trước đó ông còn là tác gi� một cuốn sách khá nổi tiếng Fermat’s Last Theorem (Định lí cuối cùng của Fermat), và chính ông cũng là đạo diễn b� phim tài liệu cho chuyên mục Horizon của BBC (chuyên mục nói v� lĩnh vực khoa học công ngh�) v� đ� tài định lí Fermat này.

Cuốn sách The Code Book được Simon Singh trình bày rất d� hiểu, bạn không cần phải lo cho dù bạn không thật s� giỏi v� toán học, vì mỗi khi gặp một khái niệm toán học có v� l� lẫm thì Simon s� dừng lại vài dòng, thậm chí c� trang sách, đ� giải thích nó rồi mới đi tiếp. Do đó ch� cần bạn biết làm bốn phép tính cộng-tr�-nhân-chia cùng với một s� tò mò v� th� giới mật mã là đ� đ� đọc cuốn sách.

Ban đầu, người ta ch� nghĩ ra những loại mật mã đơn giản, đ� đ� che giấu nội dung thông tin. Kiểu như xáo trộn v� trí các ch� cái, hay là thay th� ch� cái này bằng một ch� cái khác, v.v.. Nhưng chẳng bao lâu sau thì những loại mật mã th� này đều b� các nhà giải mã phá được. Th� là có s� liên tục đổi mới trong cách tạo mã tạo ra một cuộc chiến trường kì giữa những nhà tạo mã và những nhà giải mã. Có người giải mã ra được thì bắt đầu nảy sinh tìm loại mật mã mới, và khi một loại mật mã mới ra đời thì các nhà giải mã lại phải lao đầu vào nghĩ cách hóa giải. Thậm chí người ta phải lập ra những đội ngũ chuyên nghiệp ch� đ� làm công việc giải mã thông tin của đối phương.

Trong lịch s� mật mã học, có những bước ngoặt đáng k� đã góp phần không nh� trong việc quyết định lịch s� th� giới nói chung.

1. Máy Enigma

Bước ngoặt đầu tiên chính là việc cơ giới hóa việc tạo mã, bằng s� ra đời của h� thống mật mã Enigma. Đây chính là vũ khí lợi hại nhất cũng như là nguyên nhân ch� yếu dẫn đến thất bại của Đức Quốc Xã trong thời kì th� chiến th� hai. Chính cái máy Enigma này là nguồn động lực làm nảy sinh ra những ý tưởng đột phát v� công ngh� trong th� k� 20. Ý tưởng vĩ đại nhất có l� thuộc v� Alan Turing, người có công lớn nhất trong việc hóa giải máy Enigma, khi trong quá trình giải mã Enigma ông đã hình thành một ý niệm v� một c� máy được gọi là Turing Machine � tiền đ� cho s� phát minh máy tính sau này.

Ngoài ra, cũng vào thời kì th� chiến th� hai thì lịch s� khoa học mật mã đã chứng kiến một loại mật mã bất kh� xâm phạm đúng nghĩa của nó,. Đó là loại mật mã dùng ngôn ng� của người địa phương Navajo đang sinh sống tại vùng đất Arizona � Mĩ. Navajo là một b� lạc rất nh�, và th� âm Navajo là một dạng ngôn ng� cực kì hiếm gặp, c� nước Mĩ ngoại tr� vài ba chục người là có nghiên cứu, ngoài ra nếu không phải là người Navajo thì trên th� giới chẳng một ai có th� hiểu nổi ngôn ng� này. Người Mĩ đã dùng ngôn ng� này cùng với những người Navajo biết tiếng Anh làm mật mã liên lạc, và h� đã có được một h� thống mật mã tuyệt đối an toàn.

Như vậy có th� nói th� chiến th� hai chính là cuộc chiến cân não giữa hai phe tạo mã và giải mã. Nếu như ngày đó, Alan Turing vì một lí do nào đó không th� hoàn thành s� mệnh giải mã Engima của mình, thì có l� lịch s� th� giới đã r� sang một hướng khác.

2. Giải mã các văn t� c� xưa

Một đỉnh cao trong lịch s� mật mã học cũng như khảo c� học chính là việc giải mã những văn t� c� xưa bao gồm những ch� tượng hình của Ai Cập c� đại cũng như ch� Linear B nổi tiếng của Hy Lạp c� đại. Ch� tượng hình Ai Cập c� đại đã nh� vào phiến đá Rosetta (Rosetta Stone, là phiến đá trên đó có ch� tượng hình Ai Cập kèm với ch� demotic và ch� Hy Lạp) làm cơ s� đ� giải mã. Jean-Francois Champollion là người đã hoàn thiện việc giải mã các ch� tượng hình này, và thành qu� này của ông còn có một phần không nh� đóng góp của một nhà khoa học đa năng Thomas Young. Nếu như ch� tượng hình Ai Cập c� đại còn có Rosetta Stone làm cơ s� giải mã thì ch� Linear B hoàn toàn không có gì. Dù vậy nó vẫn được giải mã bởi Michael Ventris, vốn là một kiến trúc sư, với s� góp sức của nhà nghiên cứu Hy Lạp c� đại John Chadwick. Có th� nói việc giải mã được các văn t� c� xưa đã cho thấy sức sáng tạo và tưởng tượng của con người dường như không có giới hạn, và đó cũng chính là một bước ngoặt khác trong lịch s� nhân loại trong việc khám phá lịch s� các nền văn minh c� đại.

3. Phân phối chìa khóa mã

Trong khoa học mật mã, có một vấn đ� cực kì quan trọng, mà mãi sau th� chiến th� hai thì người ta mới tìm ra cách giải quyết triệt đ� nó. Đó chính là vấn đ� phân phối chìa khóa mã. Muốn giải mã thì bắt buộc phải có chìa khóa, và làm th� nào đ� người nhận có được chìa khóa mã một cách an toàn nhất. Có l� ch� có cách gặp mặt trực tiếp nhau, vì nếu trao đổi qua vô tuyến thì s� b� rò r� thông tin ngay. Hãy tưởng tượng bạn tạo ra mật mã đ� liên lạc với hàng ngàn người trên th� giới, và phải gặp mặt từng người đ� trao chìa khóa mã, th� thì s� phải tốn rất nhiều nguồn nhân lực và chi phí ch� đ� phục v� cho chuyện phân phối chìa khóa này. Như vậy với việc kinh t� phát triển, nhu cầu đòi hỏi bảo mật thông tin ngày càng cao với mật đ� ngày càng lớn, thì việc làm sao phân phối chìa khóa mã một cách an toàn và hiệu qu� nhất đã tr� thành một bài toán nhức đầu khác cho giới khoa học mật mã.

Đã có một ý tưởng nhen nhóm lên cho việc giải quyết vấn đ� này. Hãy tưởng tượng thông tin cần được gửi là bức thư đựng trong một hộp sắt, với � khóa chính là mật mã dùng đ� mã hóa bức thư, và chìa khóa m� � khóa chính là chìa khóa mã. Anh A gi� đây muốn đưa thông tin cho anh B thì phải tìm cách làm sao đưa luôn chìa khóa mã cho anh B mà không cần phải gặp mặt. Đặt trường hợp là nếu gửi chìa khóa qua bưu điện thì cơ may chìa khóa b� lọt ra ngoài là rất cao. Th� là A và B quyết định th� này: anh A dùng một cái hộp có 2 l� khóa đ� có th� khóa lại bằng 2 � khóa. Anh A bóp � khóa của mình lại, � khóa A, và gi� chìa khóa A cho riêng mình. Đưa sang anh B, anh B lại dùng � khóa của mình, � khóa B, đ� khóa cái hộp thêm lần nữa, và cũng gi� chìa cho riêng mình, rồi gửi v� lại anh A. Anh A thấy lúc này cái hộp đã được khóa tới 2 � khóa, nên đã lấy chìa của mình m� � khóa A, xong rồi gửi sang anh B. Lúc này cái hộp còn lại duy nhất một � khóa mà ch� anh B mới m� được, nên cho dù cái hộp b� đánh cắp thì người ta cũng chẳng tài nào m� nổi. Và anh B ch� việc lấy chìa của mình m� � khóa B rồi đọc thư.

Tuy nhiên, ý tưởng là th�, nhưng trong khoa học mật mã nếu áp dụng đúng như vậy thì s� nảy sinh một vấn đ� khác thuộc v� logic: đó là trình t� giải mã. Cái hộp có 2 � khóa, m� � nào trước đi nữa thì cái hộp cũng được m� ra. Nhưng một văn bản được mã hóa cần phải được giải mã theo trình t� “vào trước-ra sau�. Tức là nếu văn bản được mã hóa 2 lần thì người nào mã hóa sau cùng s� phải giải mã nó đầu tiên nếu muốn bức thư hoàn toàn được giải. Tr� lại câu chuyện lúc nãy, vì anh B mã hóa bức thư cuối cùng nên anh B phải giải mã bức thư ra đầu tiên, rồi đưa anh A giải mã lần nữa thì bức thư mới có th� đọc được, nhưng anh B mới là người cần đọc bức thư, nên nếu làm vậy thì khi bức thư được giải mã hoàn toàn thì nó lại � ch� anh A, như vậy thì cũng vô dụng.

Dù ý tưởng có điểm không logic như vậy, đó chính là động lực cho các nhà khoa học mật mã đi tìm lời giải. � khúc này có một chi tiết cực hay liên quan đến việc tạo mã, chính chi tiết này đã giúp cho người ta vượt qua được sức ì tâm lí bao lâu nay đ� giải quyết được vấn đ� phân phối chìa khóa mã. T� đó hình thành loại mật mã mới khác, đuợc cho là không th� phá v�, vào cuối th� k� 20: mật mã RSA.

4. Mật mã lượng t�

Tuy vào thời điểm cuối th� k� 20, RSA là mật mã cực mạnh rồi, nhưng người ta lại phải đối diện với nguy cơ nó s� b� phá v�. Lúc này, lí thuyết lượng t� bắt đầu đóng vai trò của nó. S� dĩ mật mã RSA không b� phá nổi là vì hạn ch� � các máy tính, cho dù máy tính có phát triển kiểu tốc đ� xung tăng gấp đôi sau 18 tháng thì cũng phải mất c� ngàn năm mới đ� mạnh đ� phá v� RSA. Th� nhưng với một máy tính lượng t� thì ch� mất dăm ba phút. Đ� đối phó trước với s� xuất hiện máy tính lượng t� sau này, người ta bắt đầu nghĩ đến một dạng mật mã tuyệt đối, tức là mãi mãi không th� phá v�. Và khái niệm v� mật mã lượng t� đã ra đời.

Có th� thấy ngành khoa học mật mã đã quy t� rất nhiều lĩnh vực: t� toán học, đến ngôn ng� học, và rồi lí thuyết lượng t� của ngành vật lí học cũng góp mặt vào. Không ch� trình bày v� những loại mật mã khác nhau qua từng thời kì, mà Simon Singh còn thông qua mật mã học đ� k� các câu chuyện lịch s�, những câu chuyện bên l� của những nhà khoa học thiên tài như Alan Turing, Thomas Young, Jean-Francois Champollion, Michael Ventris,v.v.. Do vậy đây hoàn toàn không phải là một cuốn sách khô khan toàn s� với ch� cùng những công thức toán học này n�. Trái lại những câu chuyện mang tính lịch s� trong cuốn sách s� khiến người đọc cảm giác như đang đọc một cuốn tiểu thuyết trong đó nội dung chính là cuộc chiến cân não giữa hai phe lập mã và giải mã.

à-ò,
20100408
Profile Image for Eric_W.
1,944 reviews416 followers
March 20, 2011
Singh, author of , has even included a code to practice one's deciphering skills on. The successful cryptanalyst will win $15,000. In the appendix, he discusses other famous attempts at breaking codes, including the recent book, , by Michael Drosnin. This work caused quite a stir a couple of years ago when Drosnin, building really on the work of several Hebrew scholars, claimed to have discovered several prophecies hidden in the text of the Bible, a forecast of the assassination of the Kennedys and of Anwar Sadat. The Biblical code was an EDLS (equidistant letter sequence) code, where you take any text, pick a particular starting letter and jump ahead a given number of letters to spell out a sentence.

As critics have pointed out, any large text will produce all sorts of things. Brendan McKay at the Australian National University used Drosnin's technique to search Moby Dick and discovered similar predictions of assassinations that have occurred. Hebrew texts, Singh notes, are particularly rich in EDLSs because Hebrew has no vowels, which means interpreters can insert vowels as they see fit. Codes are constantly evolving; as code breakers break them, new ones must be developed. The supposed one-time pads, as in the Cryptonomicon, even had weaknesses � for example, if used more than once or from patterns inadvertently created by typists, patterns being the entry into most ciphers. Cryptanalysis, or the process of code breaking, was really invented by Islamic scholars in the 19th century. Substitution ciphers, where another alphabet is substituted for the original, were believed to be unbreakable; there were so many possible combinations of 26 letters that it would take billions of years to test all of them.

The Islamic scholars, while analyzing the Koran, discovered that the frequency of letters was not the same. In English, for example, the letter 'e' appears much more frequently than 'z' By analysis of letter frequency and knowing the language of the cipher, deciphering became quite simple. Blaise de Vigeniere solved this weakness by inventing the Vigeniere square, which provided multiple cipher alphabets using keywords to link letters with particular alphabets, a polyalphabetic cipher. The beauty of his scheme was that the letter “e� might be represented by several other letters, so frequency became irrelevant C or so everyone thought. To decipher the code, all one needed was the keyword, easy to remember, and not necessary to write down anywhere. Deciphering was a tedious process, however, and his impregnable ciphering system was not widely used. The Great Cipher was created by a father and son team working for Louis XIV. Their system was to use a combination of various types of ciphers. Unfortunately, they died without recording how their cipher worked, and many documents in French archives remained completely unreadable until the late 19th century when a French cryptanalyst spent several years painstakingly applying his knowledge of ciphers to the problem. Several of the documents thus finally deciphered revealed the identity of the Man in the Iron Mask.

Charles Babbage, inventor of the modern calculator and computer, was the one who broke Vigeniere's polyalphabetic system, by using statistics to create an algorithm that helped reveal the keyword. The problem in the twentieth century has not been the development of undecipherable ciphers. The computer makes encoding very easy and quite unbreakable. But each ciphered message can only be deciphered using a key. The recipient has to know the key. Banks would hire messengers to deliver keys to encrypted messages that needed to be sent from one bank to another. That proved to be a bureaucratic nightmare, and as the Internet created a need for encrypted messages between individuals and online stores or other persons, the deliverer of the key became very important. Martin Hellman, Ralph Merkle, and Whitfield Diffie decided the problem was not insoluble. As Hellman said, “God rewards fools.�

Only a fool would be willing to work on a problem for which the experts had said there was no solution, and to be willing to keep getting excited by an idea only to have it flop, then try another. Their solution was unique. They eliminated the need for key exchange. Just how they did this is marvelous in its simplicity, but if I told you you wouldn't need to read the book, which is what I heartily recommend. PQP, the cipher made public so that anyone could use it, made the government nervous and civil libertarians and others in favor of privacy leap for joy. Now anyone could encrypt a message with total security. We hear constantly about the worry that the NSA, CIA, and others in government have about the easy ability of ordinary people to have a level of encryption that is indecipherable. But, of course, it=s in their interest to make everyone think they have an indecipherable message, so my guess is that those agencies already know how to break the unbreakable codes but just don't want anyone to know they can.
Profile Image for Cindy.
268 reviews285 followers
August 25, 2013
This is a *must* read before reading . Or maybe after, like I did.

If you at all feel uncomfortable in your knowledge of one time pad cyphers, public/private keys, or the importance of really good cryptography for average folks, please read this book! It's sadly a bit out of date, but Singh does such a brilliant job of methodically building up the complexity in cyphers though history, that you will inevitably learn a ton.
Profile Image for Jason.
242 reviews24 followers
February 3, 2009
i picked this up at my brother in law's house and started reading it, immediately went out and bought a copy....
wow...
what a FANTASTIC book...
mathematically oriented non-fiction that reads like an anthology of suspense stories...
highly enjoyable...
Profile Image for Eirini Zazani.
351 reviews18 followers
July 27, 2020
Πολύ όμορφο βιβλίο για την κρυπτογραφία και τους κωδικοθραύστες είτε αφορά αρχαίες γραφές είτε κατασκοπία ή οικονομία. Ο συγγραφέας έχει ερευνήσει πολύ και παραδίδει ένα επιστημονικό εγχειρίδιο του οποίου το θέμα, με αφηγηματικό ταλέντο, καταφέρνει να εκλαικεύσει. Υπάρχει στο βιβλίο πλούσιο οπτικό υλικό κι επεξηγηματικά παραρτήματα. Δυστυχώς, το βιβλίο αναφέρεται στην κρυπτανάλυση και το σπάσιμο των κωδίκων μέχρι το 2000, με αποτέλεσμα και κάποιες ιστοσελίδες που αναφέρει να είναι ανενεργές. Θα ήταν πολύ ενδιαφέρον να βλέπαμε την εξέλιξη της κρυπτογραφίας και τα επόμενα έτη. Συστήνεται ανεπιφύλακτα.
Profile Image for Sajjad thaier.
204 reviews116 followers
February 6, 2019

يمكن أعتبار هذا الكتاب هو أفضل مقدمة كتبت لغير المتخصصين فيما يخص موضوع التشفير والتعمية.
يتناول الكتاب أنواع وأساليب التشفير وإخفاء الرسائل والخطط العسكرية منذ عصور ما قبل الميلاد وحتى وقتنا الحاضر. في البداية يعرض الكاتب أقدم أساليب التشفير المسجلة وهي شفرة قيصر وهي أبسط أنواع التشفير التي يقوم المشفر بتحريك الأبجدية بعدد معين من المواضع مثل أبدا حرف الألف بالباء والباء بالتاء وهكذا وكلما تم كشف شفرة جديدة يتم تطوير شفرة أقوى على الكسر وهكذا كان المعركة طوال التاريخ بين المشفرين وكاسري الشفرات أو محللي الشفرات وقد لعبت الشفرات دوراً رئيسياً في تشكيل السياسة العالمية فكشف الشفرة التي كانت تستخدمها ماري ملكة اسكتلندا هو السبب الرئيسي الذي أدى إلى إعدامها وكذلك قيام البريطانيين بكسر شفرة الانيغما الالمانية قد كشف الخطط العسكرية الالمانية بشكل كامل أمام الحلفاء بل حسب بعض التعابير كانت الحرب الوحيدة في التاريخ الذي كان أحد الطرفين معرفة كاملة بكل تحركات خصمه.
أما الان فأن التشفير يشكل شيء محورياً في حياتنا حتى لو لم ندرك ذلك فالتشفير هو ما يوفر لنا ارسال واستقبال الرسائل بشكل سري ومن دون الاطلاع عليها من قبل طرف ثالث . وقد عانى أصحاب هذا المجال من المضايقات الشديدة من الحكومات التي لم تكن تريد لتقنية التشفير أن تنتشر بشكل واسع وكان ذلك في سبعينيات وثمانينيات القرن الماضي . لكن الطبيعة البشرية والرغبة بالحرية من دون رقابة تنتصر دائماً وابداً .
Profile Image for Jen.
221 reviews13 followers
October 8, 2011
I thought this book would be dry and boring, but oh no! I love a good puzzle, and this history of making, cracking, and innovating secret codes was enthralling. And it gets better ... at the end of the book there are codes to try your hand out. I got pretty excited when I solved the first (and easiest one). They got harder and the book became overdue at the library so I gave it up. For about a week I had the idea that I was going to be the best code cracker ever and that the CIA would HAVE to hire me and I would find the secret buried treasure in the hills of Virginia (or wherever). I even bought a book of New York Times crossword puzzles to exercise my brain, and I have since come to accept reality. I will probably never solve an entire crossword puzzle on my own (by the way, the Wall Street Journal is sooooo much harder than NYT--just looking at them makes me feel stupid), much less crack secret codes.
Profile Image for Dan.
1,247 reviews52 followers
November 5, 2017
The Code Book has wide appeal and is a good read for anyone who is of the polymath mindset. If you like history pertaining to computing or are interested in algorithms, it is a monumental book.

Singh may be the best science writer out there. He has that rare ability to take complex science and math topics and explain in very straightforward layman’s terms.

Profile Image for Kat V.
1,056 reviews5 followers
May 22, 2024
This is fascinating. What a fun and accessible way to break down codes and cyphers over the years! No math required on the part of the reader to understand, thankfully! The beginning was more interesting than the end but still really good overall. 4.1 stars
Profile Image for Grace.
3,178 reviews198 followers
July 15, 2023
3.5 rounded down

Interesting concept about the evolution of cryptography, but a little dry at times and overly involved. Definitely didn't feel as much geared towards the casual reader curious about cryptography but with no real interest in actual codebreaking themselves...
Profile Image for Krycek.
108 reviews32 followers
September 6, 2013
I was fascinated with codes and ciphers when I was a kid. I even had a "junior spy code kit" with a bunch of cool stuff and I could send little notes to friends with secret messages like "Mr. Nutzenjammer is a dork" and "Cindy eats her boogers" and we would all congratulate ourselves with our cleverness. That's all pretty juvenile, but the ciphers included in my little spy kit were the basics in modern encryption systems and you can read all about it in Simon Singh's The Code Book, an excellent primer for understanding encryption methods and a fascinating account of its development through history.

Amazingly, Singh has the ability to make this rather complex topic understandable as well as entertaining. I am by no means mathematically inclined, but Singh explains the processes involved in each cipher he describes through baby steps and multiple analogies. If one doesn't work for you then the next will until you get it. This book actually makes you feel like you're learning something.

Nevertheless, some of the concepts are mind boggling. Imagine for a moment this number: 10^130. It's a huge number but can be factored by a computer in about 15 seconds. Now imagine the number 10^308, which is ten million billion billion billion billion billion billion billion billion billion billion billion billion billion billion billion billion billion billion billion times bigger than the number 10^130. It would take more than a thousand years for a hundred million personal computers working together to crack a cipher using a value such as this in its key, yet this is the scale of numbers that most modern banking encryptions use. As one might guess, these encryptions are pretty much unbreakable.

Things truly get weird when Singh describes the concept of quantum cryptography, which I won't try to describe but will just say that I re-read that section a couple of times. Although quantum cryptography was just in a conceptual stage at the time of The Code Book's publication, who knows? It might be in usage now. The Code Book was first published in 2000 and a lot has changed since then (probably more than we realize, considering the secretive nature of the topic). At any rate, Singh makes a good point that cryptography, while historically of vital importance in political intrigues, is now of vital importance to most of our daily lives since the internet, for better or worse, has basically connected the world. Because of internet banking and commerce, information security is of prime importance.

Singh also, however, does a good job of telling the stories of code makers and code breakers. Particularly interesting and moving is the story of the brilliant cryptanalyst Alan Turning who committed suicide after the war when attempts to "cure" his homosexuality drove him into a deep depression. However, Turing was one of those unsung heroes working in secrecy, without whom the Allies may very well have lost World War II. Singh's ability to weave these stories into the complex mechanics of cryptography make for an engrossing narrative and one that has excited my intellectual imagination like few others have.

So ditch the "junior spy kit." That's kid stuff. Read The Code Book and you will know how to send inter-office gossip with complete security.
Profile Image for Julia Hughes.
Author20 books117 followers
September 20, 2011
Mr Singh manages to explain concepts that should be way beyond this thickie's level of understanding. That he manages to do so in an entertaining page turning manner is testament to his skill both as a mathematician and a writer. This book examines how from earliest history in parallel with writing, it became necessary for human kind to devise ways to send messages in code. So we learn how complex codes developed from very simple ones, and Simon explains along the way that there are ancient codes still waiting to be decoded and we also learn how to identify when a code is actually being deployed. It seems the best codes are the simplest, but if you need to tell more than two people a code, like a secret, it becomes more vulnerable. Entwined with the stories of code, are the stories of people who throughout history have relied on those codes being unbreakable - in some cases paying with their lives (eg Mary Queen of Scot) when it this is proved not to be the case. We're all intrigued by codes - witness the popularity of newspaper coffee break pages which will usually include a codeword problem. This book is well illustrated, extremely readable and throws new light on an already fascinating subject.
Profile Image for Thom.
1,763 reviews69 followers
December 14, 2021
A history of codes and ciphers in context, with explanations and visuals. The only minor drawback is that it is 20 years old, and half of the "future speculations" are now commonplace - and less fully explained. Would happily read an update :)

Very accessible, and pushes the deeper math into the extensive appendices. The supporting materials are also excellent. The author published a series of codes in the book with a reward for breaking them, claimed a little more than a year after publication. Nice gimmick, but he also mentions others who have done the same (e.g. Martin Gardner). I would nominate this as THE reference book about codes if it were updated.

I somehow missed this book in the past, but after reading Singh's book on numbers in the Simpsons, I added this to my reading list - where it languished for more than six years. Do yourself a favor and don't wait that long. 4.5 stars.
Profile Image for Nicolle.
104 reviews1 follower
November 17, 2011
This is the second work of Simon Singh that I have read, and in my opinion it is the greater of the two. It explores the art of ciphering codes and encryption which has developed profusely over the centuries, with alot of help from Charles Babbage and the computer.

Singh delves into the story of Mary Queen of Scots and explains in an epic and intersting way about how Mary's life depended upon whether her encrypted messages were deciphered. It goes on to the key role of mathematicians in WWII particulatly the ones based in the England, who successfully decoded messages that the Germans sent to each other and it is said that without mathematicians we would've lost the war!

This is an engaging insight into the history of cryptography and a must read for any puzzle wizzes, mathematicians or historians.
Profile Image for Lady Clementina ffinch-ffarowmore.
930 reviews229 followers
May 21, 2015
Singh does an excellent job explaining the development and process of cryptography and cryptanalysis in easy to understand terms (except (for me) perhaps the working of the Enigma, which still is a bit of an enigma!)- in fact so easy does he make it sound that one might be tempted to believe that one can be a cryptanalyst oneself- well until on turns to practically solving problems anyway. I also liked the way he wove the explanations of the actual process and working of encryption and cryptanalysis with the history and stories of how they evolved and were used and finally broken. Another plus for me was his inclusion of ancient scripts and their decipherment. The book is both informative and thoroughly enjoyable! The one issue I had was with the edition that I bought in which some of the pictures were really dark and hard to see.
Displaying 1 - 30 of 1,768 reviews

Can't find what you're looking for?

Get help and learn more about the design.