Synopses & Reviews
Codes Ciphers & Other Cryptic & Clandestine Communication chronicles the world of secret communication from hieroglyphics to the Internet. The making and breaking of codes through history has won or lost wars, exposed political intrigue, disguised secret religions and secured financial transactions. It is a fascinating world of technological advances, cloak and dagger maneuvers and war espionage.
Whether browsing through or reading cover to cover, you'll learn the amazing achievements of cryptology from the Rosicrucian's and Mason's secret transmissions to the Ultra operation which broke the German code and helped win World War II to computer codes that protect ATM's and the Internet today.
Progressing methodically through the development of each coding method, concise, and engaging profiles describe the structural basis of each system and the thrilling stories that surround it. Biographies identify the significant code developers and breakers. Illustrations of letter and number patterns recreate the code makers' procedures, and sketches of coding machines show the actual devises used in the field.
Every type of coded communication is covered from transpositions, substitutions and polygraphic ciphers to signals, stenography and ancient symbols. In special chapters, code and cipher breaking hints and puzzles explain how to make your own secret messages and how to break other people's. Anyone can become an amateur cryptologist!
Synopsis
This book weaves illustrated examples with technical explanations of important coding methods and discusses their place in the exciting world of secret communications. Special chapters teach readers easy and fun ciphers to devise and use at home.
Synopsis
Spies, secret societies, religious cults as well as anyone who has used an ATM or the internet rely on the making and breaking of codes for security.
Like a spy novel combined with the technology of a Tom Clancy thriller, Codes, Ciphers and Other Clandestine Communication successfully interweaves technical explanations of each important coding method with their place in the shadowy world of secret communications. Special chapters teach some easy and fun ciphers that readers can make and use at home. Hundreds of illustrated examples take the reader step-by-step through the foundations of cipher making from Caesar's cipher to World War I's ADFGX and beyond. Detailed diagrams and line drawings of each coding machine will delight technology buffs and war-machine aficionados. Packed with historical anecdotes about cryptography's most famous pioneers and practitioners, this book covers the development of codes through the ages from the druids, Marie Antoinette, Aaron Burr, Confederate spies in the Civil War to the Freemasons, German U-Boat Wolf Packs, the KGB, and much more.Synopsis
Learn the fascinating world of codes - from deciphering ancient hieroglyphics to cipher machines used in the world wars to computer cryptology for encoding financial transactions. The making and breaking of codes has shaped history. Every section is a dramatic story with thrilling narratives and detailed descriptions of code development.
Description
Includes bibliographical references (p. 681-696) and index.
About the Author
Fred B. Wrixon is an expert in codes, military history and espionage. He has written three books including Codes, Ciphers and Secret Languages, Codes and Ciphers and 2440 Questions and Answers. He often spends his free time exchanging code deciphering puzzles with friends. He lives in the Ohio River Valley.
Table of Contents
CIPHERS
Transposition Ciphers
Reverse Transposition
Reverse Variations
Geometric Ciphers
Route Transpositions
Rail Fence
Variations on the Rail Fence
Horizontal Routes
Alternate Horizontals
Vertical Routes
Alternate Verticals
Diagonal Routes
Alternate Diagonals
Clockwise Routes
Counterclockwise Routes
Columnar Transposition
Interrupted Columnar
Diagonal Columnar
Double Columnar
Four Corner Transposition
Triangle and Trapezoid Transpositions
World Transposition
SUBSTITUTION CIPHERS
Monoalphabetic Substitution
Shift Ciphers
Shift Cipher with Keyword
Keyphrase Ciphers
Random Substitution Ciphers
Charlemagne's Cipher
Zodiac Cipher
Mary Queen of Scots Cipher
Chvalier de Rohan's Cipher
Rose Greenhow's Cipher
Edgar Allan Poe's "Gold Bug" Cipher
Sherlock Holmes "Adventures of the Dancing Men" Cipher
The Shadow's Ciphers
Geometric Ciphers
Rosicrucian Cipher
Freemason's Cipher
Alphanumeric Ciphers
Franklin-Dumas CIpher
"The Man from Scotland Yard" Cipher
Mulltiliteral Forms
Polybius Checkerboard
Elizabeth Van Lew's Cipher
Knock Cipher
Multiliteral Variatons
Multiple Equivalents
Variants
Multiliteral Ciphers with Keyword
Multiliteral Tables
Russian Nihilist Cipher
Straddling Checkerboard
Polyalphabetic Substituton
Disks
Alberti's Disk
Porta's Disk
Tableux
Trithemius's Tabula Recta
Vigenere's Table
Key Progression
Marie Antoinette's Cipher
Variations of Vigenere's Table
Gronsfeld Cipher
Beaufort Cipher
Polygraphic Ciphers
Porta's Digraphic Cipher
Playfair Cipher
Two-square Cipher
Four-Square Cipher
Trigraphic Ciphers
Algebraic Ciphers
Fractionating Ciphers
Aperiodic Fractionating Ciphers
Periodic Encipoherment
Tripartite Fractionating Ciphers
Bifid Cipher
ADFGX
ADFGVX
CIPHER DEVICES AND MACHINES
Cipher Devices
Thomas Jefferson's Wheel Cypher
Wadsworth's Device
Wheatstone's Cryptograph
Saint-Cyr Slide
Cylindrical Cryptograph
Pletts's Device
M-138 And M-138A
M-94
Advancements in Cipher Machines
M-209
Electrically Wired Rotors
Edward Hebern's Electric Code Machine
Elecronic cipher machine (ECM) and ECM Mark II
Sigaba
Enigma
Typex
Colossus
Red
Alphabetical Typewriter '97 And The Purple Analog
Unbreakable Ciphers
Baudot Code/Vernam Cipher
Mauborgne's One-Time System
One-Time Pads
VIC Cipher
Computer Cryptography
Data Encryption Standard
Two-Key Cryptography
RSA Cryptoalgorithm
Authentication
Key Generation
Quantum Cryptography
Fundamentals of Quantum Computation
Quantum Cryptography
Cryptanalysis
Cryptanalytic Techniques
Hints For Breaking Polyalphabetic Ciphers
CODES
Nomenclators
How To Make A Nomenclator
Benjamin Tallmadge's Nomenclator
XYZ Nomenclator
James Madison's Nomenclators
Book Codes
How To Make A Book Code
Benedict Arnold's Book Code
Nicholas Trist's Book Code
Presidential Election of 1876
Codebooks
How To Make A One-Part Code
How To Make A Two-Part Code
Early State Department Codes
State Department Code of 1867
Chief Signal Officer's Code (Circa 1871)
The Cipher of the Department of State
The Cipher of the Deparmtent of State (1899)
Green Cipher
Codes in World War I
Zimmermann Telegram
American Trench Code
The River Series: Potomac
The River Series: Mohawk
Telephone Code
The Lake Series: Champlain
The Lake Series: Huron
American Radion Service Code No. 1
Choctaw "Codetalkers"
Commercial Codes
The Slater Code
The Acme Code
Murray Teleprinter Process
Q Code
Pre-World War II Codes
Gray Code
Department of State Code A-1
Brown Code
World War II Codes
Black Code
Merchant Ships' Code
The "J" Series
JN25
Native American "Codetalkers"
Quadratic Code
Codes In Everyday Life
Universal Product Code (UPC)
Zip Code
ASCII
Banking Security Codes
Genetic Code
Codebreaking
Breaking Enciphered Codes
SIGNALS
Hand and Arm Signals
Naval Flaghoist Signals
Hand-Held Signaling Systems:
Flags, Disks and Torches
Light Signals
Constant Illumination Signals
Pyrotechnic and Chronosemic Systems
Reflected and Flashed Light
Mechanical Signaling Systems
Hand-Held Semaphore
Technical Advancemenets
The Electronic War Zone:
Signals Security and Signals Intelligence
STEGANOGRAPHY
Technical Methods of Concealment
Invisible Inks
How to Make an Invisible Ink
Cryptophotographic Techniques
Microdots
Linguistic Concealments
Semagrams
Semagrams in Writing
Grilles
Null Ciphers
Jargon Codes
Modern Transmissions Security
Laser And Infrared Technology
Pulse Code Modulation
Burst/Spurt Transmissions
Spread Spectrum
SCRIPTS and LANGUAGES
Protowriting
Solved Scripts
Deciphring an extinct script
Cuneiform
Decryption
Egyptian Hieroglyphs
Decryption
Hittite Cuneiform and Hieroglyphs
Decryption
Linear B
Decryption
Mayan Glyphs
Decryption
Unsolved Scripts
Proto-Elamite
Indus Seals
Linear A
The Phaistos Disk
Etruscan
Rongornogo
Voynich Manuscript
Cryptic Scripts Runes
Ogham
Modern Pictographic Scripts
Chinese
Japanese
Scripts and Signs for Special Interest Groups
Shorthand
Scripts For the Sight-Impaired
Braille
Moon type
Langauges: Invented, International and Artificial
Solresol
Volapuk
Esperanto
Biographies
Alberti, Leon Battista
Bazeries, Etienne
Cardano, Girolamo
Champollion, Jean Francois
Chappe, Claude
Driscoll, Agnes
Evans, Arthur
Fabyan, George
Friedman, Elizabeth
Friedman, William
Hagelin, Boris
Hebern, Edward
Hitt, Parker
Kasiski, Friedrich
Kerkhoffs, Auguste
Kullback, Solomon
Lamphere, Robert
Mauborgne, Joseph
Myer, Albert
Porta, Giovanni
Rawlinson, Henry
Rossignol, Antoinne
Safford, Laurence
Trithemius, Johannes
Ventris, Michael
Vigenere, Blaise de
Wheatstone, Charles
Yardley, Herbert
QUIZZES AND ANSWERS
APPENDIX
GLOSSARY
BIBLIOGRAPHY
INDEXKEN