Cryptology


The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography
The Woman Who Smashed Codes: A True Story of Love, Spies, and the Unlikely Heroine who Outwitted America's Enemies
Cryptonomicon
The Codebreakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet
Applied Cryptography: Protocols, Algorithms, and Source Code in C
The Da Vinci Code (Robert Langdon, #2)
The Rose Code
Enigma
Code Girls: The Untold Story of the American Women Code Breakers Who Helped Win World War II
Inferno (Robert Langdon, #4)
Angels & Demons (Robert Langdon, #1)
Code Talker: The First and Only Memoir By One of the Original Navajo Code Talkers of WWII
Seizing The Enigma: The Race To Break The German U-boat Codes, 1939-1943
Crypto: How the Code Rebels Beat the Government—Saving Privacy in the Digital Age
Digital Fortress
The Mathematics of Secrets by Joshua HoldenThe Code Book by Simon SinghDecrypted Secrets by Friedrich L. BauerEncyclopedia of Cryptology by David E. NewtonThe Code-Breakers by David Kahn
The bookshelf of a cipher nerd.
49 books — 2 voters
The Riddle of the Labyrinth by Margalit FoxBreaking the Maya Code by Michael D. CoeThe Code Book by Simon SinghLost Languages by Andrew RobinsonThe Writing of the Gods by Edward Dolnick
Cryptolinguistics
16 books — 17 voters

Jason Fagone
The first step was usually very simple: count the letters in the cryptogram. In English, the most frequently used letter is E, the most frequent two-letter group is TH, and the most fre-quent three-letter group is THE. So if you count the letters in the ciphertext and the most common letter is B, it might stand for E, and if the most common three-letter group is NXB, it might stand for THE. You can count other things in a cryptogram, like the total number of vowels and consonants, and how often ...more
Jason Fagone, The Woman Who Smashed Codes: A True Story of Love, Spies, and the Unlikely Heroine who Outwitted America's Enemies

Jason Fagone
The strength of a cryptographic system usually has less to do with its design than with the way people tend to use it. Humans are the weak link. Instead of changing keys or passwords at regular intervals, we use the same ones over and over, for weeks or months or years. We repeat the same words (such as "secret") at the start of multiple messages, or repeat entire messages multiple times, giving codebreakers a foothold. We choose key phrases that are easy to guess: words related to where we live ...more
Jason Fagone, The Woman Who Smashed Codes: A True Story of Love, Spies, and the Unlikely Heroine who Outwitted America's Enemies

More quotes...