Originally published in the New Mathematical Library almost half a century ago, this charming book explains how to solve cryptograms based on elementary mathematical principles, starting with the Caesar cipher and building up to progressively more sophisticated substitution methods. Todd Feil has updated the book for the technological age by adding two new chapters covering RSA public-key cryptography, one-time pads, and pseudo-random-number generators. Exercises are given throughout the text that will help the reader understand the concepts and practice the techniques presented. The book assumes minimal mathematical prerequisites and therefore explains from scratch such concepts as summation notation, matrix multiplication, and modular arithmetic.
This book would be an excellent text for courses in cryptology where some of the students are in computer science. The mathematics behind the encryption/decryption is completely explained at a level where people with a weaker mathematical background can understand it. Basic number theory concepts such as congruences, simple linear algebra and frequency statistics are all the mathematics that is needed. The coverage is introductory, yet the reader is given a sufficiently deep exposure so that they can appreciate the significance and value of encryption in the modern world. The worked examples also impart the sense of intellectual challenge and stimulation that working in encryption can give. The areas examined are:
*) Monoalphabetic ciphers using additive alphabets *) General monoalphabetic substitution *) Polyalphabetic substitution *) Polygraphic systems *) Transposition *) RSA encryption *) Perfect security - one-time pads
Many exercises with solutions are also included, which would allow a reader to use the book for self study as well. Of all the areas of mathematics that I have taught, I had the most fun teaching a course in encryption and compression. Furthermore, given the feedback that I received from the students, they enjoyed it as well. This is one of the very best books on the basic tactics of encryption that has ever been published; I would not hesitate to use it as a text.
Published in Journal of Recreational Mathematics, reprinted with permission and this review appears on Amazon.