Loading ...
Sorry, an error occurred while loading the content.

REVIEW: "Cryptanalysis", Helen Fouche Gaines

Expand Messages
  • Rob, grandpa of Ryan, Trevor, Devon & Han
    BKCRPTAN.RVW 20091015 Cryptanalysis , Helen Fouche Gaines, 1939, 978-0-486-20097-2, U$9.95/C$14.95 %A Helen Fouche Gaines %C 31 E. 2nd St, Mineola, NY
    Message 1 of 1 , Nov 23, 2010
    View Source
    • 0 Attachment
      BKCRPTAN.RVW 20091015

      "Cryptanalysis", Helen Fouche Gaines, 1939, 978-0-486-20097-2,
      U$9.95/C$14.95
      %A Helen Fouche Gaines
      %C 31 E. 2nd St, Mineola, NY 11501
      %D 1939
      %G 978-0-486-20097-2 0-486-20097-3
      %I Dover Publications, Inc
      %O U$9.95/C$14.95 www.doverpublications.com
      %O http://www.amazon.com/exec/obidos/ASIN/0486200973/robsladesinterne
      http://www.amazon.co.uk/exec/obidos/ASIN/0486200973/robsladesinte-21
      %O http://www.amazon.ca/exec/obidos/ASIN/0486200973/robsladesin03-20
      %O Audience i+ Tech 3 Writing 2 (see revfaq.htm for explanation)
      %P 237 p.
      %T "Cryptanalysis: A Study of Ciphers and Their Solution"

      Written in 1939, and republished since, this work does not, of course,
      address modern cryptography and algorithms. It is primarily valuable
      as an interesting guide to some of the history of cryptography. It
      also provides some general conceptual points, and gives practical
      examples of the basic operations and principles of cryptanalysis.
      Cracking modern algorithms is complicated, mathematically intensive,
      and tutorially impractical, but it does use the same ideas and
      approaches which are addressed in a more accessible fashion here.

      Chapter one is a general introduction to the ciphers, codes, and the
      requirements which existed at the time the work was written. Some of
      the subsequent chapters, such as those on concealment and general
      transposition ciphers, are also basic introductions, and therefore of
      little use to a modern professional, although probably of greater
      interest to hobbyists. Once Gaines gets into specific ciphers (for
      example Nihilist Transposition, in chapter four) she also starts
      delivering detailed procedures for breaking the encryption, and
      recovering both plaintext and keys. Following the procedures requires
      some application, but her explanation of (for example) the strip
      piecing attack against columnar transposition is much clearer than
      that given by David Kahn in "Codebreakers" (cf. BKCDBRKS.RVW): even
      though Kahn considered himself a cryptanalyst, he never matched the
      level of exegesis that Gaines provides. (Not all of the material is
      from Gaines herself: she also includes essays and exercises from
      members of the American Cryptogram Society.) The decryption of
      substitution ciphers is often the more complex exercise, turning on a
      combination of frequency analysis and guessing at probable words.

      While this work will be of limited help in understanding modern
      complex ciphers, the fundamental concepts illustrated may be of some
      use. More interesting are the examples of the convoluted ways that
      people have tried to hide their information over the years--and the
      equally ornate means others evolved in order to break those codes.

      copyright Robert M. Slade, 2010 BKCRPTAN.RVW 20091015


      ====================== (quote inserted randomly by Pegasus Mailer)
      rslade@... slade@... rslade@...
      No one can make you feel inferior without your consent.
      - Eleanor Roosevelt
      victoria.tc.ca/techrev/rms.htm blog.isc2.org/isc2_blog/slade/index.html
      http://blogs.securiteam.com/index.php/archives/author/p1/
      http://www.infosecbc.org/links http://twitter.com/rslade
    Your message has been successfully submitted and would be delivered to recipients shortly.