Cryptography/Bibliography: Difference between revisions

From Citizendium
Jump to navigation Jump to search
imported>Howard C. Berkowitz
No edit summary
imported>Sandy Harris
 
(7 intermediate revisions by 3 users not shown)
Line 1: Line 1:
{{subpages}}
{{subpages}}
==Elementary==
==Elementary==
* Gaines, Helen F. ''Cryptanalysis''
* Gaines, Helen F. ''Cryptanalysis''
* Sinkov, Abraham. ''Elementary Cryptanalysis: A Mathematical Approach'' Excellent; readable at a high school level
* Sinkov, Abraham. ''Elementary Cryptanalysis: A Mathematical Approach'' Excellent; readable at a high school level
* [[The Codebreakers]] by [[David Kahn]]. the classic history of the field, Ancient Egypt to 20th Century
* The Code Book by [[Simon Singh]], a clearly written anecdotal history of crypto, covering modern methods including public key.
* [[Crypto: How the Code Rebels Beat the Government Saving Privacy in the Digital Age]] by [[Steven Levy]], about the political and legal conflicts in the US about cryptography, such as the [[Clipper Chip]] controversy and the [[Bernstein v. United States]] lawsuit.
* ''Stealing Secrets, Telling Lies:  How [[Espionage|Spies]] and [[Cryptology|Codebreakers]] Helped Shape the [[Twentieth Century]]'', by [[James Gannon]].
* [http://www.mindspring.com/~schlafly/crypto/faq.htm sci.crypt mini-FAQ].
* [http://www.nsa.gov/kids/ NSA's CryptoKids].
* [http://www.rsasecurity.com/rsalabs/node.asp?id=2152 RSA Laboratories' Frequently Asked Questions About Today's Cryptography]
* [http://java.sun.com/developer/technicalArticles/Security/Crypto/ Cryptography: The Ancient Art of Secret Messages] by [[Monica Pawlan]] - February 1998
* ''In Code: A Mathematical Journey'' by [[Sarah Flannery]] (with David Flannery). Popular account of Sarah's award-winning project on public-key cryptography, co-written with her father.


==More advanced, but dated==
==More advanced, but dated==
* Friedman, William F. ''Military Cryptanalysis''
* Friedman, William F. ''Military Cryptanalysis'' The original Friedman version is [http://www.nsa.gov/public_info/declass/military_cryptanalysis.shtml available] on the NSA site. The later revised version, ''Military Cryptanalytics'' is not.


==Definitely mathematical==
==Definitely mathematical==
* Scheier, Bruce. ''Applied Cryptography: Protocols, Algorithms, and Source Code in C''
* ''Applied Cryptography: Protocols, Algorithms, and Source Code in C'', by Bruce Schneier — a common reference for programmers
* ''Handbook of Applied Cryptography'' by A. J. Menezes, P. C. van Oorschot, and S. A. Vanstone, somewhat more mathematical than Schneier's book. [http://www.cacr.math.uwaterloo.ca/hac/ PDF download]
* ''Introduction to Modern Cryptography'' by [[Phillip Rogaway]] and [[Mihir Bellare]], a mathematical introduction to theoretical cryptography including reduction-based security proofs.  [http://www.cs.ucdavis.edu/~rogaway/classes/227/spring05/book/main.pdf PDF download].
 
== Difficulties of cryptography ==
 
Well-known papers:
* "Why Cryptosystems Fail", Ross Anderson [http://www.cl.cam.ac.uk/~rja14/Papers/wcf.html HTML]
* "Why Cryptography Is Harder Than It Looks", Bruce Schneier [http://www.schneier.com/essay-037.html HTML]
* "Lessons Learned in Implementing and Deploying Crypto Software", Peter Gutmann [http://www.cs.auckland.ac.nz/~pgut001/pubs/usenix02.pdf PDF]
* "Why Johnny can't encrypt: a usability evaluation of PGP 5.0", Alma Whitten & J.D. Tygar [http://gaudior.net/alma/johnny.pdf PDF]
 
Ross Anderson's book ''Security Engineering'' provides more detailed coverage. The entire first edition and parts of the second are available online. [http://www.cl.cam.ac.uk/~rja14/book.html index page]
 
==Fiction==
* [[Cryptonomicon]] by [[Neal Stephenson]] (novel, WW2 [[Enigma machine|Enigma]] cryptanalysis figures into the story, though not always realistically).
* ''Alvin's Secret Code'' by [[Clifford B. Hicks]] (children's novel that introduces some basic cryptography and cryptanalysis).
* ''Cryptography and Mathematics'' by [[Bernhard Esslinger]], 200 pages, part of the free open-source package [[Cryptool]], http://www.cryptool.com.

Latest revision as of 20:53, 10 May 2011

This article is developing and not approved.
Main Article
Discussion
Related Articles  [?]
Bibliography  [?]
External Links  [?]
Citable Version  [?]
 
A list of key readings about Cryptography.
Please sort and annotate in a user-friendly manner. For formatting, consider using automated reference wikification.

Elementary

More advanced, but dated

  • Friedman, William F. Military Cryptanalysis The original Friedman version is available on the NSA site. The later revised version, Military Cryptanalytics is not.

Definitely mathematical

  • Applied Cryptography: Protocols, Algorithms, and Source Code in C, by Bruce Schneier — a common reference for programmers
  • Handbook of Applied Cryptography by A. J. Menezes, P. C. van Oorschot, and S. A. Vanstone, somewhat more mathematical than Schneier's book. PDF download
  • Introduction to Modern Cryptography by Phillip Rogaway and Mihir Bellare, a mathematical introduction to theoretical cryptography including reduction-based security proofs. PDF download.

Difficulties of cryptography

Well-known papers:

  • "Why Cryptosystems Fail", Ross Anderson HTML
  • "Why Cryptography Is Harder Than It Looks", Bruce Schneier HTML
  • "Lessons Learned in Implementing and Deploying Crypto Software", Peter Gutmann PDF
  • "Why Johnny can't encrypt: a usability evaluation of PGP 5.0", Alma Whitten & J.D. Tygar PDF

Ross Anderson's book Security Engineering provides more detailed coverage. The entire first edition and parts of the second are available online. index page

Fiction