The Code Book by Simon Singh The Codebreakers by David Kahn Enigma by Robert Harris Between Silk and Cyanide by Leo Marks The Keys of Egypt by. Buy The Codebreakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet 2Rev Ed by David Kahn (ISBN. Codebreakers. The Story of Secret Writing. By DAVID KAHN. (abridged by the author). A SIGNET BOOK from. NEW AMERICAN LIBRARV. TIMES MIRROR.
|Published (Last):||25 October 2016|
|PDF File Size:||12.63 Mb|
|ePub File Size:||10.53 Mb|
|Price:||Free* [*Free Regsitration Required]|
The Story of Secret Writing. The journalist-author of this massive, richly informative, and eminently readable book has been an amateur cryptologist sincewhen he was thirteen, and for many years President of the American Cryptogram Association. He has largely succeeded in the undertaking set forth in his preface, to write a serious history of cryptology—the development of the various methods of making and breaking codes and ciphers and how these have affected human events—using primary sources wherever possible and not fictionalizing or exaggerating the influence of cryptologic successes, although “codebreaking is the most important form of secret intelligence in the world today.
The preface is followed by a helpful few pages on the vocabulary of cryptology, and then the reader is launched into the pages of main text.
The opening chapter, “One Day of Magic,” is a dramatic presentation of the role of cryptology in connection with the attack on Pearl Harbor. The story begins with Herbert O. Yardley’s cryptologic section of military intelligence in World War I and “Black Chamber” of the s.
The events of the period between the wars are woven into a coherent narrative leading to the American success in breaking Japanese codes as war came closer. Kahn tells what was done, how it was done, and what the effect of those achievements was on the “day of infamy. The standout star is William F.
Friedman, “the world’s greatest cryptologist,” in his role in the attack on the Purple crypto-system of the Japanese.
The real conclusion to this chapter appears early in “Notes to Text,” which occupy pages at the back of the book. In the first few of these pages Kahn gives a cogent summary of his views on the responsibility for the Pearl Harbor disaster, paralleling closely such authoritative and well-reasoned opinions as those of the congressional kshn committee, Roberta Wohlstetter, and Samuel E.
After this dramatic opening the reader is treated to a pageant of cryptography through the centuries, beginning with the earliest known deliberate transformation of a writing about B. To this point the story is simply of cryptography, the rendering of a message unintelligible by some transformation of the plain text. The cryptanalysis side of crvptology begins with the Arabs, who in the seventh century were the first to discover and record methods of analyzing the frequency and juxtaposition of letters.
The author describes with examples and anecdotes the developments from this beginning to the sudden rise of secret writing with the Renaissance in western civilization and the work of Geoffrey Chaucer and Roger Bacon.
Thirty centuries is a long period to cover in some thirty pages of text, but seven pages codebreakets notes on this chapter indicate that Kahn has rather thoroughly plowed the field. Next the spread of political cryptography is pursued from rudimentary beginnings in the early 13th century through Venice, Rome, the Vatican, the secular principalities of Italy, and throughout Europe.
The growth daviv cryptology paces evenly the flowering of modern diplomacy. Kahn’s examples range from the well to the little known and from the simple to the recondite in each period and stage of development. The development of the modern system of polyalphabetic substitution, described in a chapter called “On the Origin of a Species,” began in the 17th century with the work of four amateurs who adopted a mixed alphabet, the principle of letter-by-letter encipherment, and an codebrakers changed key.
A further improvement came in the use of grilles and tableaux to govern the enciphered sequence. These successes were not achieved without pitfalls and pratfalls, which Kahn recounts with clarity and gaiety, including an example of Casanova’s use of cryptanalysis as a key to seduction.
In spite of the kahb to polyalphabetic substitution, the nomenclators system of cryptography first developed for Pope Clement 11 in the late 14th century continued to flourish in Europe. Kahn at tributes its continued use to a legend of unbreakability nourished by writings of inferior cryptologists, whose books. There is good reason for this. The authors borrowed their knowledge from earlier volumes and puffed it out with their own hypothesizing, which seems never to have been deflated by contact with the bruising actuality of solving cryptograms that they themselves had not made up.
The literature of cryptology was all theory and no practice. Kahn goes on to describe the almost unbelievably efficient Geheime Kabinets-Kanzlei of Vienna in the 18th century, and in Codebeakers the work of John Wallis for William and Mary and later of Edward Willes and his descendants, who dominated the English field for nearly a century. Across the Atlantic cryptology was cidebreakers its way informally into the life of the American colonies.
In the solution of a monoalphabetic substitution cipher showed George Washington that a Boston Tory was sending military information to British commander Gage. James Lovell, of the Continental Congress, may be called the father of American cryptanalysis for his prompt solutions of some intercepted redcoat cryptograms. There was cryptographic involvement in the case of Benedict Arnold and later that of Aaron Burr.
Thomas Jefferson invented a “wheel cypher,” far and away the most advanced of its day, but he seems to have filed and forgotten it. It was rediscovered among his papers in the Library of Congress inthe year the U. Army adopted an almost identical device invented independently. Kahn stresses how telegraphy made cryptography what it is today, principally by creating a new instrument for war—the signal communications that enabled commanders for the first time in history to exert instantaneous and continuous control over great masses of men spread over large areas.
The role of ciphers in the Civil War and postwar politics is described in a brief codebbreakers called “Crises of the Union. Of cryptologic events before World War I perhaps the most sensational involvement occurred in the Dreyfus case, which was not finally closed until Less than a decade later the war engulfed most of the principal nations of the world, and communications—now by radio as well as cable—took on a new importance.
British and French cryptology had an early lead; Germany had no cryptanalysts on the Western Front for the first two years of the war. In the United States, Hitt’s Manual for the Solution of Military Ciphersselling for thirty-five cents, served as the textbook to train cryptanalysts of the American Expeditionary Forces. In “A War of Intercepts” Kahn covers the episodes of the war in which cryptology was involved, that of the Zimmermann telegram being the outstanding one. This war “marks the great turning point in the history of cryptology.
Radio made all the difference, but cryptanalysis bad matured, too. Yardley, who “owes his fame less to what he did than to what he said—and to the sensational way in which he said it,” and William Frederick Friedman, “uncontestably the greatest,” whose eminence is due “most emphatically to what he did. His theoretical studies, which revolutionized the science, were matched by his actual solutions, which astounded it. Both are complemented by his peripheral contributions.
He straightened out the tangled web of cipher systems and introduced a clarifying terminology for his arrangement. Words he coined gleam upon more than one page of today’s dictionaries. His textbooks have trained thousands. His historical articles have shed light in little-known corners of the study, and the Shakespeare book has done much to quash one major area of a perennial literary nuisance.
The work of private individuals and corporations in developing new machines and new aspects of cryptology in the period between the wars is told in convincing and sometimes intimate detail in the chapter entitled “Secrecy for Sale. Kahn seems to have something of an obsession for his belief that “the armed forces had adopted the rotor principle from Hebern and used it without just compensation in hundreds of thousands of high-security machines in World War II and in the cold war.
Kahn coxebreakers, incidentally, an interesting anecdote about the testing of the Hebern machine at the Navy building. There were continuing electrical problems—fuses blowing and solenoids burning out—although other tests which the Director of Naval Communications had suggested be carried out at his home on Kalorama Road gave no such trouble.
It was finally discovered that the Navy building was still using direct current inwhile the Kalorama Road neighborhood was provided with AC power.
The cryptography of World War II is delineated in four chapters covering pages. Numerous anecdotes and episodes and some epic stories are interestingly told, many in good perspective. It is clear that Kahn found several ready European sources of information about allied, enemy, and neutral cryptology in the war. The detail sometimes appears exhaustive. The sources he names are never the top experts, for the most part entirely unknown; and his daid consequently depend upon surface and low-level detail.
But the stories are well told. The one great exception to his European coverage is Britain, and the gap shows. Probably British cryptologists, under the constraints of their Official Secrets Acts, are less likely to talk than those from countries with codebreeakers severe protective laws. In any case, Kahn has stated that he excised from his text at the request of the Defense Department the material he had on British cryptologic activities.
In narrating events of the Pacific war Kahn sometimes violates his prefatory promise thhe to credit cryptanalysis unduly, or at least he fails to credit other factors. After telling, dramatically and in detail, the story of the interception and death of Admiral Isoroku Yamamoto, for example, he concludes, “Cryptanalysis had given America the equivalent of a major victory,” thus ignoring his own reminder that “Knowledge alone is not power.
To have any effect it must be linked th physical force. A chapter of 62 pages devoted to the history and structure of the National Security Agency tells of publicized successes and failures in which it has been involved. Descriptions of scandals and defections, most notably that of Martin and Mitchell, are derived from news accounts and lead to an endorsement for Congressional surveillance of intelligence agencies.
This chapter reports on military communications generally, along with those of the Department of State and other parts of the government, including the hot line to Moscow.
Most of the material is based upon news releases, news accounts, and speculation. Kahn seeks to validate the. The book’s last section is a collection of heterogeneous addenda that can be taken or left. There is a psychoanalytic treatment of cryptology in which coddbreakers is equated with voyeurism and it is implied “that cryptography may come ultimately from the infantile sexual pleasure that Freud says children obtain from the muscle tension of retaining the feces. There is a collection of historical oddities, the most intriguing of which is probably the still unsolved Voynich manuscript.
The Codebreakers – Wikipedia
The fhe of Boger Bacon and the Shakespeare writings is treated not uninterestingly. In sum, this reviewer learned a lot from The Codebreakersfound many parts and sections to be of great interest, and considers it a monumental work. The shortcomings I mentioned above derive from a careless and somewhat cavalier attitude toward factual detail in matters not strictly cryptologic.
One detail is the meaning of the word interview. A number of the people whom the author “interviewed” told me they had no idea their conversations with him were related to the writing or publication of a book.
One man assured me that his “interview” consisted of a minute telephone conversation devoted mostly to reasons why Kahn should not try to write tge this subject.
As to historical detail: Zacharias is mistakenly treated as a cryptanalvst; the “Manchu laws” requiring the rotation of Army officers to the field are foolishly applied to the Navy; Vladivostok is cited as having a U. As this review was nearing completion I had occasion to talk with Kahn and mentioned some of these errors; he brushed them aside as too minute to be concerned about.
It is more understandable that his lack of experience in any kind of wartime office leads to some gaucheries and misinterpretations of the relationships among offices, functions, people, and intelligence reports; nowhere were organizational arrangements so precise and neat as he describes them. We read every letter, fax, or e-mail we receive, and we will convey your comments to CIA officials outside OPA as appropriate.
However, with limited staff and resources, we simply cannot respond to all who write to us. Submit questions or dagid online. Contact the Office of Privacy and Civil Liberties. Contact the Office of Inspector General. Contact the Employment Verification Office.
1973 The Codebreakers The Story Of Secret Writting ( David Kahn)
The United States and its partners continue to face a growing number of global threats and challenges. These challenges are international in scope and are priorities for the Central Intelligence Agency. If you have information about these or other national security challenges, please provide it through our secure online form.
The information you provide will be protected and confidential. The CIA is particularly interested codebreakwrs information about imminent or planned terrorist attacks.