The Spartan Scytale and Developments in Ancient and Modern Cryptography

The Spartan Scytale and Developments in Ancient and Modern Cryptography

Author: Martine Diepenbroek

Publisher: Bloomsbury Publishing

Published: 2023-11-16

Total Pages: 265

ISBN-13: 135028128X

DOWNLOAD EBOOK

This book offers a comprehensive review and reassessment of the classical sources describing the cryptographic Spartan device known as the scytale. Challenging the view promoted by modern historians of cryptography which look at the scytale as a simple and impractical 'stick', Diepenbroek argues for the scytale's deserved status as a vehicle for secret communication in the ancient world. By way of comparison, Diepenbroek demonstrates that the cryptographic principles employed in the Spartan scytale show an encryption and coding system that is no less complex than some 20th-century transposition ciphers. The result is that, contrary to the accepted point of view, scytale encryption is as complex and secure as other known ancient ciphers. Drawing on salient comparisons with a selection of modern transposition ciphers (and their historical predecessors), the reader is provided with a detailed overview and analysis of the surviving classical sources that similarly reveal the potential of the scytale as an actual cryptographic and steganographic tool in ancient Sparta in order to illustrate the relative sophistication of the Spartan scytale as a practical device for secret communication. This helps to establish the conceptual basis that the scytale would, in theory, have offered its ancient users a secure method for secret communication over long distances.


Cryptography

Cryptography

Author: Laurence Dwight Smith

Publisher: Courier Corporation

Published: 1955

Total Pages: 180

ISBN-13: 9780486202471

DOWNLOAD EBOOK

Explains transposition, substitution, and Baconian bilateral ciphers and presents more than one hundred and fifty problems.


Codes and Ciphers - A History of Cryptography

Codes and Ciphers - A History of Cryptography

Author: Alexander D'Agapeyeff

Publisher: Read Books Ltd

Published: 2016-08-26

Total Pages: 153

ISBN-13: 1473350913

DOWNLOAD EBOOK

This vintage book contains Alexander D’Agapeyeff’s famous 1939 work, Codes and Ciphers - A History of Cryptography. Cryptography is the employment of codes and ciphers to protect secrets, and it has a long and interesting history. This fantastic volume offers a detailed history of cryptography from ancient times to modernity, written by the Russian-born English cryptographer, Alexander D'Agapeyeff. The contents include: - The beginnings of Cryptography - From the Middle Ages Onwards - Signals, Signs, and Secret Languages - Commercial Codes - Military Codes and Ciphers - Types of Codes and Ciphers - Methods of Deciphering Many antiquarian texts such as this, especially those dating back to the 1900s and before, are increasingly hard to come by and expensive, and it is with this in mind that we are republishing this book now in an affordable, modern, high quality edition. It comes complete with a specially commissioned new biography of the author.


Espionage in the Ancient World

Espionage in the Ancient World

Author: R.M. Sheldon

Publisher: McFarland

Published: 2015-09-03

Total Pages: 245

ISBN-13: 1476610991

DOWNLOAD EBOOK

Intelligence activities have always been an integral part of statecraft. Ancient governments, like modern ones, realized that to keep their borders safe, control their populations, and keep abreast of political developments abroad, they needed a means to collect the intelligence which enabled them to make informed decisions. Today we are well aware of the damage spies can do. Here, for the first time, is a comprehensive guide to the literature of ancient intelligence. The entries present books and periodical articles in English, French, German, Italian, Spanish, Polish, and Dutch--with annotations in English. These works address such subjects as intelligence collection and analysis (political and military), counterintelligence, espionage, cryptology (Greek and Latin), tradecraft, covert action, and similar topics (it does not include general battle studies and general discussions of foreign policy). Sections are devoted to general espionage, intelligence related to road building, communication, and tradecraft, intelligence in Greece, during the reign of Alexander the Great and in the Hellenistic Age, in the Roman republic, the Roman empire, the Byzantine empire, the Muslim world, and in Russia, China, India, and Africa. The books can be located in libraries in the United States; in cases where volumes are in one library only, the author indicates where they may be found.


Mathematical Recreations and Essays

Mathematical Recreations and Essays

Author: Walter William Rouse Ball

Publisher: Courier Corporation

Published: 1987-01-01

Total Pages: 468

ISBN-13: 0486253570

DOWNLOAD EBOOK

This classic work offers scores of stimulating, mind-expanding games and puzzles: arithmetical and geometrical problems, chessboard recreations, magic squares, map-coloring problems, cryptography and cryptanalysis, much more. "A must to add to your mathematics library" ? The Mathematics Teacher. Index. References for Further Study. Includes 150 black-and-white line illustrations.


A Material History of Medieval and Early Modern Ciphers

A Material History of Medieval and Early Modern Ciphers

Author: Katherine Ellison

Publisher: Routledge

Published: 2017-09-14

Total Pages: 286

ISBN-13: 1351973088

DOWNLOAD EBOOK

The first cultural history of early modern cryptography, this collection brings together scholars in history, literature, music, the arts, mathematics, and computer science who study ciphering and deciphering from new materialist, media studies, cognitive studies, disability studies, and other theoretical perspectives. Essays analyze the material forms of ciphering as windows into the cultures of orality, manuscript, print, and publishing, revealing that early modern ciphering, and the complex history that preceded it in the medieval period, not only influenced political and military history but also played a central role in the emergence of the capitalist media state in the West, in religious reformation, and in the scientific revolution. Ciphered communication, whether in etched stone and bone, in musical notae, runic symbols, polyalphabetic substitution, algebraic equations, graphic typographies, or literary metaphors, took place in contested social spaces and offered a means of expression during times of political, economic, and personal upheaval. Ciphering shaped the early history of linguistics as a discipline, and it bridged theological and scientific rhetoric before and during the Reformation. Ciphering was an occult art, a mathematic language, and an aesthetic that influenced music, sculpture, painting, drama, poetry, and the early novel. This collection addresses gaps in cryptographic history, but more significantly, through cultural analyses of the rhetorical situations of ciphering and actual solved and unsolved medieval and early modern ciphers, it traces the influences of cryptographic writing and reading on literacy broadly defined as well as the cultures that generate, resist, and require that literacy. This volume offers a significant contribution to the history of the book, highlighting the broader cultural significance of textual materialities.


Secret Key Cryptography

Secret Key Cryptography

Author: Frank Rubin

Publisher: Simon and Schuster

Published: 2022-08-30

Total Pages: 342

ISBN-13: 1633439798

DOWNLOAD EBOOK

Explore the fascinating and rich world of Secret Key cryptography! This book provides practical methods for encrypting messages, an interesting and entertaining historical perspective, and an incredible collection of ciphers and codes—including 30 unbreakable methods. In Secret Key Cryptography: Ciphers, from simple to unbreakable you will: Measure the strength of your ciphers and learn how to guarantee their security Construct and incorporate data-compression codes Generate true random numbers in bulk Construct huge primes and safe primes Add an undetectable backdoor to a cipher Defeat hypothetical ultracomputers that could be developed decades from now Construct 30 unbreakable ciphers Secret Key Cryptography gives you a toolbox of cryptographic techniques and Secret Key methods. The book’s simple, non-technical language is easy to understand and accessible for any reader, even without the advanced mathematics normally required for cryptography. You’ll learn how to create and solve ciphers, as well as how to measure their strength. As you go, you’ll explore both historic ciphers and groundbreaking new approaches—including a never-before-seen way to implement the uncrackable One-Time Pad algorithm. Whoever you are, this book is for you! History buffs will love seeing the evolution of sophisticated cryptographic methods, hobbyists will get a gentle introduction to cryptography, and engineers and computer scientists will learn the principles of constructing secure ciphers. Even professional cryptographers will find a range of new methods and concepts never published before. Purchase of the print book includes a free eBook in PDF, Kindle, and ePub formats from Manning Publications. About the technology From the Roman empire’s Caesar cipher to the WWII Enigma machine, secret messages have influenced the course of history. Today, Secret Key cryptography is the backbone of all modern computing infrastructure. Properly designed, these algorithms are efficient and practical. Some are actually unbreakable, even using supercomputers or quantum technology! About the book Secret Key Cryptography teaches you how to create Secret Key ciphers, ranging from simple pen-and-paper methods to advanced techniques used in modern computer-based cryptography. It reveals both historic examples and current innovations. You’ll learn how to efficiently encrypt large files with fast stream ciphers, discover alternatives to AES encryption, and avoid strong-looking but weak ciphers. Simple language and fun-to-solve mini-ciphers make learning serious concepts easy and engaging. What's inside Construct 30 unbreakable ciphers Measure the strength of your ciphers and guarantee their security Add an undetectable backdoor to a cipher Defeat hypothetical ultracomputers of the future About the reader For professional engineers, computer scientists, and cryptography hobbyists. No advanced math knowledge is required. About the author Frank Rubin has been doing cryptography for over 50 years. He holds an MS in Mathematics, and a PhD in Computer Science. Table of Contents 1 Introduction 2 What is cryptography? 3 Preliminary concepts 4 Cryptographer’s toolbox 5 Substitution ciphers 6 Countermeasures 7 Transposition 8 Jefferson Wheel Cypher 9 Fractionation 10 Variable-length fractionation 11 Block ciphers 12 Principles for secure encryption 13 Stream ciphers 14 One-time pad 15 Matrix methods 16 Three pass protocol 17 Codes 18 Quantum computers