Status
Call number
Collection
Publication
Description
Computer Technology. Mathematics. Technology. Young Adult Nonfiction. HTML:"As gripping as a good thriller." �The Washington Post Unpack the science of secrecy and discover the methods behind cryptography�the encoding and decoding of information�in this clear and easy-to-understand young adult adaptation of the national bestseller that's perfect for this age of WikiLeaks, the Sony hack, and other events that reveal the extent to which our technology is never quite as secure as we want to believe. Coders and codebreakers alike will be fascinated by history's most mesmerizing stories of intrigue and cunning�from Julius Caesar and his Caeser cipher to the Allies' use of the Enigma machine to decode German messages during World War II. Accessible, compelling, and timely, The Code Book is sure to make readers see the past�and the future�in a whole new way. "Singh's power of explaining complex ideas is as dazzling as ever." �The Guardian.… (more)
User reviews
At the end of the book there is also some alledgedly very difficult code to break and the author is (was?) offering a reward for
The only downside here is not the fault of the book--it was published in 1999 and is feeling dated. I found myself skimming the last 1/3 or so of the book, which focuses on computer encryption, concerned that I'd confuse myself (I'm a Web developer by trade) with respect to the encryption technologies I use now. I would pay Singh cold hard cash to release an updated version of this sui generis survey of this fascinating subject. I'd love to keep reading the story from where he left off.
Singh series of challenges is included, based on the approaches to cryptography detailed throughout the book. While I haven't attempted them (yet), they look to be an interesting opportunity to put theory into practice.
“Despite its strengths, the Navaho code still suffered from two significant flaws. First, words that were neither in the natural Navaho vocabulary nor in the list of 274 authorized codewords had to be spelled out using the special alphabet. This was time-consuming, so it was decided to add another 234 common terms to the lexicon. For example, nations were given Navaho nicknames: ‘Rolled Hat’ for Australia, ‘Bounded by Water’ for Britain, ‘Braided Hair’ for China, ‘Iron Hat’ for Germany, ‘Floating Land’ for the Philippines, and ‘Sheep Pain’ for Spain.”
The author explains various code and cipher methods by examining famous codes throughout history, including the Mary Queen of Scots conspiracy, Enigma, and modern internet security. This is the kind of thing that I love, only I SUCK at math so I usually pick up books
Grade: A
Recommended: To people who think Godel, Esher, and Bach looks interesting, but can never make it past the second chapter.
109 182 6 11 88 214 74 77 153 177 109 195 76 37 188
There are two things in particular that Singh does very well. First, he masterfully layers the increasingly complex codes one on top of the other. This allows him to take the time to explain each idea clearly, and then use the prior codes to introduce the new ones. It is easy to imagine an author losing the audience very quickly in a work like this. If one does not understand the notion of a 'key' in some of the earlier substitution ciphers, then the RSA encryption standard will be utterly incomprehensible. That is, even if the central idea of RSA was explained clearly, it still rests on the ideas that came before it. Losing the readers at any stage along the way could have resulted in an overly complicated second half.
Singh hits a pitch perfect pace. He typically provides an initial explanation of idea in cryptographic terms, before using simply toy analogies, before returning to the more complex explanation. As a result, the toy analogies are frequently illuminating (the reader knows what to look for). It was also never plodding. There was no point in the text where I found the ideas or explanations difficult to follow, and the questions I had were based on the subject matter, and not Singh's presentation of it. This is a book that any reader will learn a great deal from.
The second thing that Singh does very well is situate the codes historically. Each of these codes is tied to an interesting story - whether a treasure hunt or the execution of a monarch. Singh is able to weave these stories into the tale of the codes, which makes for compelling reading at two levels. I have a great interest in Turing in my professional work, and I was delighted to see his moving story recounted here. The high stakes of codebreaking adds a real sense of urgency to the more technical discussions covering the back and forth between codemakers and codebreakers to develop ever better codes.
Indeed, the only chapter that did not quite hold up to the same quality as the rest of the book was his coverage of the political debates surrounding encryption. It is indeed a really interesting issue whether encryption is a bastion of free speech, or a tool to enable illegal and violent acts. Singh wants to stay above the fray, and just outline the two positions. All we end up getting is a rather simple overview of the conflict. This is a philosophical and moral question, and requires a different approach. Indeed, I would have preferred Singh to take a stance on the question. It would have helped him get into the details of the arguments, which would have been more illuminating (even if the reader disagrees) than the "one side says x, one says x" approach he adopts.
Despite my quibbles with this chapter, I found this to be an admirable work of pop science and history. Singh tells a fascinating story in a way that does not oversimplify. At the same time, he is able to explain the subject matter clearly. Any reader with an interest in history, puzzles or codes will find a lot to enjoy in The Code Book.
Subjects
Awards
Language
Original publication date
Physical description
ISBN
DDC/MDS
652.8 |