...JAIIQ.COM...


The Code Book - Encryption/Decryption

Encoding and decoding of messages, both in times of war and peace have been in existence since the time human beings began writing.And the story of codes and ciphers is the age old battle between code makers and code breakers. In this battle only the fittest can survive.This aspect have been extensively dealt with By Mr Simon Singh in his book "The Code Book". You may remember him,as recently his Pound 10,000 offer for cracking a secret code was solved by a group of Swedish Programmers using super computers and struggling over a year.

Now the story of Mary Queen of Scotts of the 16th century.The protestant nobles rose against her, compelling her to abdicate.Her presence in England gave rise to countless plots and after the Babington conspiracy in 1586, she was executed.Sir Fransis Walsingham secretary of state for Queen Elizabeth was very much involved in this episode.developing a complex system of espionage at home and abroad.Mary queen was let down by the double crossing of Gifford and found guilty of planning to assasinate the Queen Elizabeth.At the root of this was a improper usage of a cipher in their secret plan which was easily cracked by the Queen's advisors.In that year, a French mathematcian Viginere wrote about secret writing based on polyalphabetic encryption. A few decades later, the Cryptographers of Louis 15 invented 'Great Cipher' which could not be cracked for two centuries.

Later Charles Babbage a British mathematcian,Arthur Conan and Edgar Alan pursued the secret ciphers which revealed some treasure troves.With the invention of radio by Marcony in the 19th century created a drastic change.Anybody could break into a wireless communication and cryptographers had a new challenge.The famous Zimmermann telegram sent to the German Ambassador in Mexico, outling an encrypted proposal to draw the US into th war was cracked which altered the course of history.Then there is Holy Grail of cryptography known as the one time-pad.It relied on a random key, the same length of a message and was never repeated.At this point of time Germans invented 'Enigma' which became a formidable system of encryption.During world war 2, Germans pressed 30000 enigmas with ironclad security. However Alan Turing of Britain cracked the 'enigma' which helped in the Allied victory in war.

Then there are many other fascinating stories of ancient civilization's use of cryptography.Finally the author discusses the present digital revolution in encryption and decryption.With the exchange of digital information becoming an integral part of life, encryption has a leading role in protecting the confidentiality of Business transactions and privacy of citizens.Details of various techniques used in secret coding, digital signatures used to authenticate documents sent over cyberspace are all discussed. In the last chapter futuristic ideas on security coding which may guarantee absolute privacy are given.

In future, when quantum computers are released secure communication may be possible. Till then the present available softwares could be used.Have you upgraded the Internet Explorer to 128 bit security ? If not please do if you handle financial transactions over the net. Finally, are you curious about the Encrypted Puzzle put forward by Mr Simon Singh, please refer to his book.It is beyond small folks like me.

If interested in more of the book, log on to www.simonsingh.com

If interested in the solution to the 512 bit Encryption, checkup at http://codebook.org/codebook-solution.html.


  1. Hypography Sci-Tech: Cryptography
    A Hypography of the Week special on the history and applications of cryptography.
    www.hypography.com 

  2. Powerful Cryptography - Steganos Suite
    ZDNet:"A powerful set of security utilities." PC Home: "An essential buy." Tucows: "Complete security solution." Protect your privacy. Secure your documents. Free trial!
    www.centurionsoft.com 

  3. EasyCrypt: File/Image Encryption Utility
    Get your free trial of easycrypt. The easiest DES encryption tool ever! A DES cryptographic software tool that makes image, file and folder encryption as easy as possible.
    www.easycrypt.co.uk 

  4. Cypost.Com: Cryptography
    Find information on cryptography including links to related sites, latest news from the world of encryption, glossary of common terms, as well as recent reviews of Navaho Lock.
    www.cypost.com 

  5. Gatekeeper 1024bit RSA encryption system
    GateKeeper is a smart card based file and e-mail encryption system - 1024 bit RSA, RC4 and Triple - DES (3DES) - affordable solution for home and business users.
    www.armadillousa.com 

  6. ABI - Software Development
    Providing encryption software and source code. Visit us and try our free encryption software or download our C+ encryption package.
    www.abisoft.net 

  7. Kryptel: The Easy Way to Data Security
    We offer a complete solution for file encryption. Whether you need to send your files over the Internet, or just want to keep them securely - our programs handle those tasks excellently.
    www.filecryption.com 

  8. Cryptography
    BuyBuddy will help you find the lowest price on the CDs, tapes, soundtracks, and other music products that you are looking for from retailers all across the Internet.
    www.buybuddy.com 

  9. Cryptography: The Study of Encryption
    Directory of organizations, publications and newsgroups on cryptography, encryption, and privacy.
    world.std.com 

  10. Ronald L. Rivest : Cryptography and Security
    Comprises of a list of web pages dealing with cryptography and security including publications and conferences.
    theory.lcs.mit.edu 

  11. Cryptography Research -- Home Page
    Offers cryptographic research and system design. Learn about various products and conferences.
    www.cryptography.com 

  12. Welcome To RSA Security Inc. -- The Most Trusted Name in e-Security
    RSA Security present this detailed, searchable FAQ on all aspects of cryptography. Read it online or download the whole thing in Acrobat format.
    www.rsa.com 

  13. Cryptography FAQ Index
    Cryptography FAQ cryptography-faq/part01 Subject: Cryptography FAQ (01/10: Overview) Maintainer: [email protected] Last Posted: 04 Nov 2000 09:45:29 GMT Last-modified: 1999/06/27 cryptography-faq/part02 Subject: Cryptography FAQ (02/10: N
    www.cis.ohio-state.edu 

  14. Handbook of Applied Cryptography
    This site provides order information, updates, errata, supplementary information, chapter bibliographies, and other information for the 1996 CRC Handbook of Applied Cryptography by Menezes, van Oorschot and Vanst
    www.cacr.math.uwaterloo.ca 

  15. CDT Encryption Issues Page
    Details of policies and issues on encryption technology and exporting. Also links to articles on legal and social issues.
    www.cdt.org 

  16. EPIC Archive - Cryptography Policy
    Electronic Privacy Information Center furnishes links to recent cryptography legislation, news and regulations.
    www.epic.org 

  17. Cryptography Archive
    TIME Magazine - The Privacy Thieves Bovine RC5 Cracking Effort Headquarters Browser Security Information on Kevin McCleavey's home page. Ciphers by Ritter Clipper Crypto-Anarchists Overview Cryptographic FTP Sites Netherlands Un
    www.austinlinks.com 

  18. SSH - Tech Corner
    Provides resources dealing with encryption, decryption, cryptanalysis and steganography. Find software and related tools.
    www.ssh.fi 

  19. Counterpane Internet Security, Inc.
    Minneapolis, Minn.-based consulting firm specializing in cryptography and computer security.
    www.counterpane.com 

  20. avs Online: European Cryptography
    Go to http://www.apparatus.org/~avs/cryptolinks/index.phtml avs Online: European Cryptography
    www.modeemi.cs.tut.fi 

  21. F-Secure Cryptography Products
    F-Secure WWW Server, F-Secure: Integrated Solutions for Enterprise Security..
    www.datafellows.com 

  22. North American Cryptography Archives
    Strong cryptographic software, libraries, and information about cryptography, data security, and privacy.
    www.cryptography.org 

  23. SSH - Tech Corner
    Front Page Products Partners Tech Corner IETF Archive IPsec Testing Zone White Papers Cryptography A-Z Support Company Info Download Sales Site Search CRYTOGRAPHY A-Z Introduction Algorithms Protocols & Standards References Links Cr
    www.cs.hut.fi 

  24. GILC -- Cryptography and Liberty
    Global Internet Liberty Campaign offers a report on its international survey of encryption policy. Find out how various countries rate.
    www.gilc.org 

  25. Matt Blaze's cryptography resource on the web - crypto.com
    Check out information and news about cryptography related legislation in the United States. Provides a pro-crypto slant.
    www.crypto.com 

  26. Netsurfer Focus on Cryptography and Privacy
    ON CRYPTOGRAPHY AND PRIVACY Wednesday, August 21, 1995 * - Volume 01, Issue 03 "God is in the details" ? TABLE OF CONTENTS Crypto 001 - Intro to Cryptography Squeamish Ossifrages - Cracking the Code In ? We Trust - Key Certification Postcards from
    www.netsurf.com 

  27. Handbook of Applied Cryptography
    This site provides order information, updates, errata, supplementary information, chapter bibliographies, and other information for the 1996 CRC Handbook of Applied Cryptography by Menezes, van Oorschot and Vanst
    www.dms.auburn.edu 

  28. Beginners' Guide to Cryptography
    This website introduces the beginner to the wonders of cryptography.
    www.ftech.co.uk 

  29. The Cryptography Project
    The Cryptography Project Note: This page is no longer being maintained. Go to my home page for current pages. The Cryptography Project focuses on encryption policy, but some technology is also covered. This page provides links to papers that I h
    www.cosc.georgetown.edu 

  30. Quantum Computation/Cryptography at Los Alamos
    Quantum Computation/Cryptography at Los Alamos "Where a calculator on the Eniac is equipped with 18000 vacuum tubes and weighs 30 tons, computers in the future may have only 1000 tubes and weigh only 1 1/2 tons" Popular Mechanics, March 1949 This
    qso.lanl.gov 

  31. RSA Laboratories | Cryptography FAQ
    RSA Laboratories' Frequently Asked Questions About Today's Cryptography, Version 4.1 Section Index Foreword Chapter 1 Introduction Chapter 2 Cryptography Chapter 3 Techniques in Cryptography Chapter 4 Applications of Crypto
    www.rsasecurity.com 

  32. Address failed
    The Information, Computer and Communications Policy home page has been given a new look. Don't forget to redo your bookmarks. Alternatively, you may enter by the front door , or go to our search page . Adress failed
    www.oecd.org 

  33. Java Cryptography Architecture
    Java TM Cryptography Architecture API Specification & Reference Last Modified: 19 December 1997 Acknowledgements Introduction Design Principles Architecture Concepts Core Classes and Interfaces The Provider Class How Provider Implementa
    java.sun.com 

  34. Cryptography
    Discusses issues relating to Web security and provides a list of free privacy tools available on the Internet.
    axion.physics.ubc.ca 

  35. IEEE P1363: Standard Specifications For Public Key Cryptography
    The IEEE P1363 Home Page Standard Specifications For Public-Key Cryptography Overview The IEEE P1363 project has as its goal the issuance of Standard Specifications For Public-Key Cryptography. This is accomplished via a series of standa
    www.manta.ieee.org 

  36. Oxford Quantum Computation Group
    We have moved! The Oxford Quantum Computation and Cryptography Group is now part of the Centre for Quantum Computation. Our new address is: http://www.qubit.org Oxford Quantum Computation Group
    eve.physics.ox.ac.uk 

  37. Cryptography FAQ Index
    Cryptography FAQ cryptography-faq/part01 Subject: Cryptography FAQ (01/10: Overview) Maintainer: [email protected] Last Posted: 04 Nov 2000 09:45:29 GMT Last-modified: 1999/06/27 cryptography-faq/part02 Subject: Cryptography FAQ (02/10: N
    www.faqs.org 

  38. Financial Cryptography '00
    International conference on financial data security and digital commerce.
    www.fc00.ai 

  39. Ritter's Crypto Glossary and Dictionary of Technical Cryptography
    Learn the terminology of cryptography. Find an alphabetical dictionary and a list of terms and descriptions.
    www.io.com