Author: Martin Gardner
Publisher: Courier Corporation
Release Date: 2013-04-10
Genre: Games & Activities
Cipher and decipher codes: transposition and polyalphabetical ciphers, famous codes, typewriter and telephone codes, codes that use playing cards, knots, and swizzle sticks . . . even invisible writing and sending messages through space. 45 diagrams.
Author: Tony J. Tallarico
Publisher: Courier Dover Publications
Release Date: 2016-03-16
Genre: Juvenile Nonfiction
Dozens of intriguing puzzles pose and answer interesting questions based on world history, geography, popular culture, and many other subjects. Alphabet and number codes, picture puzzles, and more, suitable for ages 8–11. Solutions.
History?s amazing secrets and codes?and how to crack them yourself. This fascinating look at history?s most mysterious messages is packed with puzzles to decode and ciphers that kids can use themselves. Here are the encrypted notes of Spartan warriors, the brilliant code-crackers of Elizabeth I, secret messages of the American Revolution, spy books of the Civil War, the famous Enigma Machine, and the Navajo code talkers. As computers change the way we communicate, codes today are more intriguing than ever. From invisible ink to the CIA, this exciting trip through history is a hands-on, interactive experience? so get cracking!
Author: Denise Sutherland
Publisher: John Wiley & Sons
Release Date: 2011-06-09
The fast and easy way to crack codes and cryptograms Did you love Dan Brown's The Lost Symbol? Are you fascinated by secret codes and deciphering lost history? Cracking Codes and Cryptograms For Dummies shows you how to think like a symbologist to uncover mysteries and history by solving cryptograms and cracking codes that relate to Freemasonry, the Knights Templar, the Illuminati, and other secret societies and conspiracy theories. You'll get easy-to-follow instructions for solving everything from the simplest puzzles to fiendishly difficult ciphers using secret codes and lost symbols. Over 350 handcrafted cryptograms and ciphers of varying types Tips and tricks for cracking even the toughest code Sutherland is a syndicated puzzle author; Koltko-Rivera is an expert on the major symbols and ceremonies of Freemasonry With the helpful information in this friendly guide, you'll be unveiling mysteries and shedding light on history in no time!
Author: Paul B. Garrett
Release Date: 2001
Genre: Business & Economics
This unique book explains the basic issues of classical and modern cryptography, and provides a self contained essential mathematical background in number theory, abstract algebra, and probability—with surveys of relevant parts of complexity theory and other things. A user-friendly, down-to-earth tone presents concretely motivated introductions to these topics.More detailed chapter topics include simple ciphers; applying ideas from probability; substitutions, transpositions, permutations; modern symmetric ciphers; the integers; prime numbers; powers and roots modulo primes; powers and roots for composite moduli; weakly multiplicative functions; quadratic symbols, quadratic reciprocity; pseudoprimes; groups; sketches of protocols; rings, fields, polynomials; cyclotomic polynomials, primitive roots; pseudo-random number generators; proofs concerning pseudoprimality; factorization attacks finite fields; and elliptic curves. For personnel in computer security, system administration, and information systems.
The Mathematics of Secrets takes readers on a fascinating tour of the mathematics behind cryptography—the science of sending secret messages. Most books about cryptography are organized historically, or around how codes and ciphers have been used, such as in government and military intelligence or bank transactions. Joshua Holden instead shows how mathematical principles underpin the ways that different codes and ciphers operate. Holden focuses on both code making and code breaking and he discusses the majority of ancient and modern ciphers currently known. Holden begins by looking at substitution ciphers, built by substituting one letter or block of letters for another. Explaining one of the simplest and historically well-known ciphers, the Caesar cipher, Holden establishes the key mathematical idea behind the cipher and discusses how to introduce flexibility and additional notation. Holden goes on to explore polyalphabetic substitution ciphers, transposition ciphers, including one developed by the Spartans, connections between ciphers and computer encryption, stream ciphers, and ciphers involving exponentiation. He also examines public-key ciphers, where the methods used to encrypt messages are public knowledge, and yet, intended recipients are still the only ones who are able to read the message. He concludes with a look at the future of ciphers and where cryptography might be headed. Only basic mathematics up to high school algebra is needed to understand and enjoy the book. With a plethora of historical anecdotes and real-world examples, The Mathematics of Secrets reveals the mathematics working stealthily in the science of coded messages.
Author: Simon Singh
Release Date: 2011-01-26
In his first book since the bestselling Fermat's Enigma, Simon Singh offers the first sweeping history of encryption, tracing its evolution and revealing the dramatic effects codes have had on wars, nations, and individual lives. From Mary, Queen of Scots, trapped by her own code, to the Navajo Code Talkers who helped the Allies win World War II, to the incredible (and incredibly simple) logisitical breakthrough that made Internet commerce secure, The Code Book tells the story of the most powerful intellectual weapon ever known: secrecy. Throughout the text are clear technical and mathematical explanations, and portraits of the remarkable personalities who wrote and broke the world's most difficult codes. Accessible, compelling, and remarkably far-reaching, this book will forever alter your view of history and what drives it. It will also make you wonder how private that e-mail you just sent really is.
When New York–based graphic designers and long-time friends Timothy Goodman and Jessica Walsh found themselves single at the same time, they decided to try an experiment. The old adage says that it takes 40 days to change a habit—could the same be said for love? So they agreed to date each other for 40 days, record their experiences in questionnaires, photographs, videos, texts, and artworks, and post the material on a website they would create for this purpose. What began as a small experiment between two friends became an Internet sensation, drawing 5 million unique (and obsessed) visitors from around the globe to their site and their story since it was launched in July 2013. 40 Days of Dating: An Experiment is a beautifully designed, expanded look at the experiment and the results, including a great deal of material that never made it onto the site, such as who they were as friends and individuals before the 40 days and who they have become since. Note: 40 Days of Dating has a special binding that allows it to open very flat by attaching the endpapers to the inside covers.
Author: Fred B. Wrixon
Publisher: Black Dog & Leventhal Pub
Release Date: 2005
Genre: Language Arts & Disciplines
Covert communications have won or lost wars, exposed political intrigue, disguised secret religions and societies, and secured financial transactions. This immensely readable world history of clandestine communication—finally in paperback—includes illustrations, diagrams, and puzzles that instruct readers how to become amateur cryptographers. It’s the last word on secret languages!
Author: Dev Gualtieri
Release Date: 2014-12-20
Genre: Coding theory
Children enjoy making and sending secret messages. Secret message making, called cryptography, has become much more interesting with the advent of computers and the Internet. It's interesting to learn the basics and understand what's happening "under the hood" of cryptographic applications.This book has a spectrum of content that's interesting to children of all ages. It gives instructions on how to encode messages in a variety of simple and complex ways. Children can create messages using traditional ciphers, some used for thousands of years. Messages can be coded through conventional techniques, such as Morse Code, semaphores, and Braille, but messages can be encoded also as music, pigs and flowers.Advanced cryptography uses a lot of mathematics, but this book shields the younger readers from most of the math. However, a few interesting number games are included, and ways to create art from words and phrases.
Author: Robert Harris
Publisher: Random House
Release Date: 2011-02-15
Bletchley Park: the top-secret landmark of World War Two, where a group of young people were fighting to defeat Hitler, and win the war. March 1943, the Second World War hangs in the balance, and at Bletchley Park a brilliant young codebreaker is facing a double nightmare. The Germans have unaccountably changed their U-boat Enigma code, threatening a massive Allied defeat. And as suspicion grows that there may be a spy inside Bletchley, Jericho's girlfriend, the beautiful and mysterious Claire Romilly suddenly disappears.