Encoding and decoding of messages, both in times of war and peace have been in existence since the time human beings began writing.And the story of codes and ciphers is the age old battle between code makers and code breakers. In this battle only the fittest can survive.This aspect have been extensively dealt with By Mr Simon Singh in his book "The Code Book". You may remember him,as recently his Pound 10,000 offer for cracking a secret code was solved by a group of Swedish Programmers using super computers and struggling over a year.
Now the story of Mary Queen of Scotts of the 16th century.The protestant nobles rose against her, compelling her to abdicate.Her presence in England gave rise to countless plots and after the Babington conspiracy in 1586, she was executed.Sir Fransis Walsingham secretary of state for Queen Elizabeth was very much involved in this episode.developing a complex system of espionage at home and abroad.Mary queen was let down by the double crossing of Gifford and found guilty of planning to assasinate the Queen Elizabeth.At the root of this was a improper usage of a cipher in their secret plan which was easily cracked by the Queen's advisors.In that year, a French mathematcian Viginere wrote about secret writing based on polyalphabetic encryption. A few decades later, the Cryptographers of Louis 15 invented 'Great Cipher' which could not be cracked for two centuries.
Later Charles Babbage a British mathematcian,Arthur Conan and Edgar Alan pursued the secret ciphers which revealed some treasure troves.With the invention of radio by Marcony in the 19th century created a drastic change.Anybody could break into a wireless communication and cryptographers had a new challenge.The famous Zimmermann telegram sent to the German Ambassador in Mexico, outling an encrypted proposal to draw the US into th war was cracked which altered the course of history.Then there is Holy Grail of cryptography known as the one time-pad.It relied on a random key, the same length of a message and was never repeated.At this point of time Germans invented 'Enigma' which became a formidable system of encryption.During world war 2, Germans pressed 30000 enigmas with ironclad security. However Alan Turing of Britain cracked the 'enigma' which helped in the Allied victory in war.
Then there are many other fascinating stories of ancient civilization's use of cryptography.Finally the author discusses the present digital revolution in encryption and decryption.With the exchange of digital information becoming an integral part of life, encryption has a leading role in protecting the confidentiality of Business transactions and privacy of citizens.Details of various techniques used in secret coding, digital signatures used to authenticate documents sent over cyberspace are all discussed. In the last chapter futuristic ideas on security coding which may guarantee absolute privacy are given.
In future, when quantum computers are released secure communication may be possible. Till then the present available softwares could be used.Have you upgraded the Internet Explorer to 128 bit security ? If not please do if you handle financial transactions over the net. Finally, are you curious about the Encrypted Puzzle put forward by Mr Simon Singh, please refer to his book.It is beyond small folks like me.
If interested in more of the book, log on to www.simonsingh.com
If interested in the solution to the 512 bit Encryption, checkup at http://codebook.org/codebook-solution.html.
Hypography Sci-Tech: Cryptography A Hypography of the
Week special on the history and applications of
cryptography. www.hypography.com
Powerful Cryptography - Steganos Suite ZDNet:"A
powerful set of security utilities." PC Home: "An essential buy." Tucows:
"Complete security solution." Protect your privacy. Secure your documents.
Free trial! www.centurionsoft.com
EasyCrypt: File/Image Encryption Utility Get your free
trial of easycrypt. The easiest DES encryption tool ever! A DES cryptographic
software tool that makes image, file and folder encryption as easy as
possible. www.easycrypt.co.uk
Cypost.Com: Cryptography Find information on
cryptography including links to related sites, latest news from the world of
encryption, glossary of common terms, as well as recent reviews of Navaho
Lock. www.cypost.com
Gatekeeper 1024bit RSA encryption system GateKeeper is
a smart card based file and e-mail encryption system - 1024 bit RSA, RC4 and
Triple - DES (3DES) - affordable solution for home and business
users. www.armadillousa.com
ABI - Software Development Providing encryption
software and source code. Visit us and try our free encryption software or
download our C+ encryption package. www.abisoft.net
Kryptel: The Easy Way to Data Security We offer a
complete solution for file encryption. Whether you need to send your files
over the Internet, or just want to keep them securely - our programs handle
those tasks excellently. www.filecryption.com
Cryptography BuyBuddy will help you find the lowest
price on the CDs, tapes, soundtracks, and other music products that you are
looking for from retailers all across the
Internet. www.buybuddy.com
Cryptography: The Study of Encryption Directory of
organizations, publications and newsgroups on cryptography, encryption, and
privacy. world.std.com
Cryptography FAQ Index Cryptography FAQ
cryptography-faq/part01 Subject: Cryptography FAQ (01/10: Overview)
Maintainer: [email protected] Last Posted: 04 Nov 2000 09:45:29 GMT
Last-modified: 1999/06/27 cryptography-faq/part02 Subject: Cryptography FAQ
(02/10: N www.cis.ohio-state.edu
Handbook of Applied Cryptography This site provides
order information, updates, errata, supplementary information, chapter
bibliographies, and other information for the 1996 CRC Handbook of Applied
Cryptography by Menezes, van Oorschot and
Vanst www.cacr.math.uwaterloo.ca
CDT Encryption Issues Page Details of policies and
issues on encryption technology and exporting. Also links to articles on legal
and social issues. www.cdt.org
EPIC Archive - Cryptography Policy Electronic Privacy
Information Center furnishes links to recent cryptography legislation, news
and regulations. www.epic.org
Cryptography Archive TIME Magazine - The Privacy
Thieves Bovine RC5 Cracking Effort Headquarters Browser Security Information
on Kevin McCleavey's home page. Ciphers by Ritter Clipper Crypto-Anarchists
Overview Cryptographic FTP Sites Netherlands
Un www.austinlinks.com
SSH - Tech Corner Provides resources dealing with
encryption, decryption, cryptanalysis and steganography. Find software and
related tools. www.ssh.fi
Counterpane Internet Security, Inc. Minneapolis,
Minn.-based consulting firm specializing in cryptography and computer
security. www.counterpane.com
avs Online: European Cryptography Go to
http://www.apparatus.org/~avs/cryptolinks/index.phtml avs Online: European
Cryptography www.modeemi.cs.tut.fi
North American Cryptography Archives Strong
cryptographic software, libraries, and information about cryptography, data
security, and privacy. www.cryptography.org
SSH - Tech Corner Front Page Products Partners Tech
Corner IETF Archive IPsec Testing Zone White Papers Cryptography A-Z Support
Company Info Download Sales Site Search CRYTOGRAPHY A-Z Introduction
Algorithms Protocols & Standards References Links
Cr www.cs.hut.fi
GILC -- Cryptography and Liberty Global Internet
Liberty Campaign offers a report on its international survey of encryption
policy. Find out how various countries rate. www.gilc.org
Netsurfer Focus on Cryptography and Privacy ON
CRYPTOGRAPHY AND PRIVACY Wednesday, August 21, 1995 * - Volume 01, Issue 03
"God is in the details" ? TABLE OF CONTENTS Crypto 001 - Intro to Cryptography
Squeamish Ossifrages - Cracking the Code In ? We Trust - Key Certification
Postcards from www.netsurf.com
Handbook of Applied Cryptography This site provides
order information, updates, errata, supplementary information, chapter
bibliographies, and other information for the 1996 CRC Handbook of Applied
Cryptography by Menezes, van Oorschot and
Vanst www.dms.auburn.edu
The Cryptography Project The Cryptography Project Note:
This page is no longer being maintained. Go to my home page for current pages.
The Cryptography Project focuses on encryption policy, but some technology is
also covered. This page provides links to papers that I
h www.cosc.georgetown.edu
Quantum Computation/Cryptography at Los Alamos Quantum
Computation/Cryptography at Los Alamos "Where a calculator on the Eniac is
equipped with 18000 vacuum tubes and weighs 30 tons, computers in the future
may have only 1000 tubes and weigh only 1 1/2 tons" Popular Mechanics, March
1949 This qso.lanl.gov
RSA Laboratories | Cryptography FAQ RSA Laboratories'
Frequently Asked Questions About Today's Cryptography, Version 4.1 Section
Index Foreword Chapter 1 Introduction Chapter 2 Cryptography Chapter 3
Techniques in Cryptography Chapter 4 Applications of
Crypto www.rsasecurity.com
Address failed The Information, Computer and
Communications Policy home page has been given a new look. Don't forget to
redo your bookmarks. Alternatively, you may enter by the front door , or go to
our search page . Adress failed www.oecd.org
Java Cryptography Architecture Java TM Cryptography
Architecture API Specification & Reference Last Modified: 19 December 1997
Acknowledgements Introduction Design Principles Architecture Concepts Core
Classes and Interfaces The Provider Class How Provider
Implementa java.sun.com
Cryptography Discusses issues relating to Web security
and provides a list of free privacy tools available on the
Internet. axion.physics.ubc.ca
IEEE P1363: Standard Specifications For Public Key
Cryptography The IEEE P1363 Home Page Standard Specifications For
Public-Key Cryptography Overview The IEEE P1363 project has as its goal the
issuance of Standard Specifications For Public-Key Cryptography. This is
accomplished via a series of standa www.manta.ieee.org
Oxford Quantum Computation Group We have moved! The
Oxford Quantum Computation and Cryptography Group is now part of the Centre
for Quantum Computation. Our new address is: http://www.qubit.org Oxford
Quantum Computation Group eve.physics.ox.ac.uk
Cryptography FAQ Index Cryptography FAQ
cryptography-faq/part01 Subject: Cryptography FAQ (01/10: Overview)
Maintainer: [email protected] Last Posted: 04 Nov 2000 09:45:29 GMT
Last-modified: 1999/06/27 cryptography-faq/part02 Subject: Cryptography FAQ
(02/10: N www.faqs.org
Financial Cryptography '00 International conference on
financial data security and digital commerce. www.fc00.ai