Cryptology
CS440
Technical Books
- Handbook of Applied
Cryptography, Menezes, van Oorschot, Vanstone, CRC 1997. (Comprehensive
treatment of modern cryptography).
-
Cryptography Engineering, Ferguson, Schneier, Kohno, Wiley, 2010.
(Cryptography in the context of security.)
-
Decrypted Secrets, Bauer, Springer, 2007
(4th edition).
(Extremely comprehensive treatment of classical cryptology up to the end of
WWII)
- Modern Cryptography. Theory & Practice, Wenbo Mao, Prentice-Hall, 2004.
(Excellent text on cryptography, solid mathematical
foundations, and
practical discussions.)
-
Basic cryptanalysis
(field manual, released by the army; many similar books are available at
Aegan Park Press).
-
Applied Cryptanalysis, Stamp, Low 2007. (Fine collection a
material on attacks on many of the well-known cryptosystems including
classica, block, stream and asymmetric ciphers as well as hash-functions and
PRNGs).
-
Security Engineering,
Ross Anderson, Wiley, 2008 (2nd edition). (Standard text on the subject.
Partially available online.)
-
Understanding Cryptography, Paar, Pelzl, Springer, 2010.(Good
elementary introduction, partially visible online, including nice
introduction to modular arithmetic and other mathematical topics.)
Historical and Popular Books
- The Codebreakers, David Kahn, Sribner, 1996.
(Comprehensive history of cryptology.)
- Between Silk and Cyanide: A Codemaker's War, 1941-1945, Leo Marks, Free
Press, 2000. (Cliffhanger account of Marks code-making work for British spies in
Europe; compelling reading. Check out interview
with Marks)
- The American Black Chamber, Yardley, Aegean Park Press.
(Yardley was in charge of the American Black chamber which existed from 1917 to
1929. There also is a recent biography of Yardley by David Kahn entitled The
Reader of Gentlemen's Mail).
- The Code Book, Simon Singh, Anchor, 2000. (Popular historical
account of cryptology, with a fair amount of technical detail.)
- The Cuckoo's Egg, Cliff Stoll, Pocket Books, 1990. (Real life account of
Stoll tracking down a hacker. Better than James Bond.)
-
Cryptonomicon, Neal Stephenson, Harper, 2000.
(Occasionally long-winded novel, containing accurate technical details.)
- The Man Who Broke Purple, Ronald Clark, Little Brown, 1977. (Biography of
William Friedman, the father of modern American cryptography, and the story of
how he broke Purple.)
- The Puzzle Palace, James Bamford, Viking, 1983. (The
early history of the National Security Agency (NSA)).
-
The Shadow Factory,
James Bamford, Random House, 2009. (Bamford continues his story of the NSA
post 9/11).
Articles
-
Why and
How to Estalblish a Private Code on a Public Network, by Goldwasser,
Micali, Tong, 1982
-
declassified letter by John Nash on cryptography and complexity theory
-
Ron was wrong, Whit is right
(attack on RSA)
-
Hellman's Time-Memory Trade-Off (by Mark Stamp)
-
NSA declassified
documents on public-key cryptography
-
Attacks on RSA
(survey paper by Dan Boneh)
-
Polynomials in the
Nation's Service, Susan Landau, 2004.
-
Matt Blaze's papers on
weaknesses in master key systems,
lock-picking, and
safecracking
-
Maurer.
Conditionally-Perfect Secrecy and a Provably-Secure Randomized Cipher
-
Kish.
Secure classical
communications (as written up by Schneier)
-
Unbroken ciphers
-
Watch
Whitfield
Diffie on information security
- Long-term perspectives in Cryptography
-
graphical
representations of hash functions
-
tutorial on linear and differential cryptanalysis (by Howard Heys)
-
A hash of hash
functions (by Türker
Özsari)
-
How you can build an eavesdropper for a quantum cryptosystem
-
Factorization of a 768-bit RSA
modulus
- The Uneasy
Relationship between Mathematics and Cryptography; controversial article
by Neal Koblitz
-
The Brave New
World of Bodacious Assumptions in Cryptography, another article, by
Koblitz and Menezes, bound to stir controvery
-
They Cracked This 250-Year-Old Code, and Found a Secret Society Inside,
Noah Shachtman, Wirde, 2012.
Security
Simulators and other Tools
Movies
Python
Marcus Schaefer
Last updated: January 3rd, 2013.