Edit WYSIWYGattachfile Attach PDF Raw View►More Actions▼More Actions

Restore topic to revision: You will be able to review the topic before saving it to a new revision

Copy text and form data to a new topic (no attachments will be copied though).
Name of copy:
You will be able to review the copied topic before saving

Rename/move topic... scans links in all public webs (recommended)
Rename/move topic... scans links in CBI_ComputerSecurity web only
Delete topic... scans links in all public webs (recommended)
Delete topic... scans links in CBI_ComputerSecurity web only

Revision Date Username Comment
722 Oct 2013 - 12:37ThomasMisa 
603 Oct 2013 - 15:26norqu036? 
524 Jun 2013 - 11:24NicLewis 
419 Jun 2013 - 14:53ThomasMisa 
322 Mar 2013 - 10:22NicLewis 
225 Feb 2013 - 10:14NicLewis 
121 Feb 2013 - 08:25NicLewis 

Render style:     Context:

 History: r7 < r6 < r5 < r4 < r3
[X] Hide this message.
Notice: On June 30, 2016, UMWiki service will be decommissioned. If you have information in UMWIki that needs to be preserved, you should make plans to move it before that date. Google Sites is anticipated to be the most popular and appropriate alternative for users because it offers a more modern and user-friendly interface and unlimited capacity. To learn more about the features of Google Sites and other alternatives, and to identify which one best fits your needs, see the University’s Website Solution Selection Guide. If you have concerns or would like help regarding this change and your options, please contact Technology Help at help@umn.edu
You are here: UMWiki>CBI_ComputerSecurity Web>Publications>PubCodeBreakers (22 Oct 2013, ThomasMisa)

Current Activitieslock Who is Who?lock People Programs Publications CSHW_2014 Systems Events Mechanisms

The Codebreakers - The Story of Secret Writing (David Kahn)


Kahn, David. The Codebreakers: The Story of Secret Writing. New York: Macmillan, 1967. 1164 pp. Revised edition New York: Scribner, 1996.

The Codebreakers: The Story of Secret Writing is a 1967 history of cryptography, providing in-depth analysis of its development, and its importance in world history from ancient Egypt to the book's publication. The book begins with a discussion on the role of cryptography in the attack on Pearl Harbor, providing background on the development of cryptography in the interwar years, and its critical role during World War II, with the American success in breaking Japanese coding schemes. Due to its original publication date in the 1960s, the book did not cover the breaking of the Enigma code or the efforts of Alan Turing, which were classified until the 1970s. Following his discussion on Pearl Harbor, the author presents the history of cryptography--the methods in which codes and ciphers are created and broken--from its earliest known usage, found in an ancient Egyptian tomb dated to 1900 B.C.E, through the subsequent millennia, appearing in various forms in India, Assyria, Rome, Greece, and elsewhere.(1)

The first examples of cryptanalysis appeared in the Arab world of the seventh century with the development of character-frequency analysis, allowing the decryption of character-substitution forms of encoding. The book then follows the development of political cryptography in Europe, then in the United States, following numerous details and anecdotes about the characters and events contributing to the narrative of cryptography. Kahn describes the early lead in cryptography gained by England and France, continuing into World War I, with Germany and the United States catching up during wartime, with events such as the 1917 intercept of the Zimmerman telegram (the German message tempting Mexico to join it). The book devotes four chapters to the cryptographic history of World War II, leading up to the rise of cryptography in the early Cold War.

David Kahn's book was widely considered the best account of the history of cryptography up to that time. Author Simon Singh, in his popular The Code Book (1999), calls it "the definitive story of crytography up until the 1950s." (2) The book was updated in 1996 to include some of the events that took place after its first publication.(3)


1 , 3 : https://www.cia.gov/library/center-for-the-study-of-intelligence/kent-csi/vol12i3/html/v12i3a09p_0001.htm

2 : Simon Singh, The Code Book (New York: Doubleday, 1999), quote p. 397.

Topic revision: r7 - 22 Oct 2013 - 12:37:17 - ThomasMisa
Signed in as lewi0740 (NicLewis) | Sign out
UMWiki UMWiki
This site is powered by FoswikiCopyright © by the contributing authors. All material on this collaboration platform is the property of the contributing authors.
Ideas, requests, problems regarding UMWiki? Send feedback