
Cryptology is an academic discipline which has implications for the security of life and property, and thus there is a vast literature on the subject, often highly technical in nature. Much of the research is secret and unpublished. The following are just a few of the many books and journal articles available. The history of codes and codebreaking is especially interesting. The best book on this subject is David Kahn's The Codebreakers (the bound edition is recommended). Among the following works those marked with an asterisk are more historical than technical and tend to be somewhat easier reading. Those marked "#" contain commentary on some contemporary political aspects of the civilian use of cryptography.Andreassen, K.: Computer Cryptology, PrenticeHall.
Angluin, D. and Lichtenstein, D.: Provable Security in Cryptosystems, Yale University, 1983.
#Bamford, J.: The Puzzle Palace, Penguin Books.
#Barlow, J. P.: "Decrypting the Puzzle Palace", Communications of the ACM, July 1992, pp. 2531.
*Barker, W. G.: History of Codes and Ciphers in the U.S., several volumes, Aegean Park Press, P. O. Box 2837, Laguna Hills, CA 92654.
Beker, H. and Piper, F.: Cipher Systems, Wiley, 1982.
Bennett, J.: "Analysis of the Encryption Algorithm Used in the WordPerfect Word Processing Program", Cryptologia 11(4), pp. 206210, 1987.
Bergen, H. A. and Caelli, W. J.: "File Security in WordPerfect 5.0", Cryptologia 15(1), pp. 5766, January 1991.
Biham, E. and Shamir, A.: "Differential cryptanalysis of DESlike cryptosystems", Journal of Cryptology, vol. 4, #1, pp. 372, 1991.
*Boyd, C.: "Anguish under Siege: HighGrade Japanese Signal Intelligence and the Fall of Berlin", Cryptologia 8(3), July 1989, pp. 193209.
Brassard, G.: Modern Cryptology, SpringerVerlag, 1988.
Deavours, C. A. and Kruh, L.: Machine Cryptography and Modern Cryptanalysis, Artech House, 610 Washington St., Dedham, MA 02026, 1985.
DeLaurentis, J. M.: "A Further Weakness in the Common Modulus Protocol in the RSA Cryptoalgorithm", Cryptologia, 8(3), July 1984, pp. 253259.
Denning, D.: Cryptography and Data Security, AddisonWesley, 1982.
*Diffie, W.: "The first ten years of public key cryptography", IEEE proceedings, 76(5), 560577, 1988.
 and Hellman, M.: "Privacy and authentication: an introduction to cryptography", IEEE proceedings, 67(3), 397427, 1979.
Feistel, H.: "Cryptography and Computer Privacy", Scientific American, 228(5), pp. 1523, 1973.
*Flicke, W. F.: War Secrets in the Ether, Volumes 1 & 2, Aegean Park Press.
*Friedman, W. F.: Solving German Codes in World War I, Aegean Park Press.
* and Mendelsohn, C. J.: The Zimmermann Telegram of 1917 and its Cryptographic Backround, Aegean Park Press.
Gaines, H. F.: Cryptanalysis, Dover, 1956.
Garon, G. and Outerbridge, R.: "DES watch: an examination of the sufficiency of the Data Encryption Standard for financial institutions in the 1990's", Cryptologia 15(3), 1991, pp. 177193.
*Hinsley, F. H. et al.: British Intelligence in the Second World War, Cambridge U. P., volumes 1  4.
* and Stripp, A. (eds.): Codebreakers: The Inside Story of Bletchley Park, Oxford U.P., 1993.
Held, G.: Top Secret Data Encryption Techniques, Sams Publishing, 1993.
Hellman, M.: "The mathematics of public key cryptography", Scientific American, pp. 130139, 1979.
*Kahn, D.: The Codebreakers, Macmillan, 1967.
*: Seizing the Enigma, Houghton Mifflin, 1991.
Kochanski, M.: "A Survey of Data Insecurity Packages", Cryptologia 11(1), pp. 115, 1987.
: "Another Data Insecurity Package", Cryptologia 12(3), pp.165177, July 1988.
Konheim, A. G.: Cryptography: A Primer, John Wiley, 1981.
#Kruh, L.: "The Control of Public Cryptography and Freedom of Speech  A Review", Cryptologia 10(1), January 1986, pp. 29.
Lysing, H.: Secret Writing, Dover, 1974.
Marotta, M.: The Code Book, Loompanics, 1987.
Massey, J.: "An Introduction to Contemporary Cryptology", IEEE Proceedings, 76(5), pp. 533549, May 1988.
Meyer, C. H., and Matyas, S. M.: Cryptography, John Wiley, 1982.
#Pierce, K. J.: "Public Cryptography, Arms Export Controls, and the First Amendment: A Need for Legislation", Cornell International Law Journal, Vol. 17, No. 3 (Winter 1984), pp. 197236.
Rivest, R. L., Shamir, A. and Adelman, L.: "A Method for Obtaining Digital Signatures and Publickey Cryptosystems," Communications of the ACM, February 1979.
Salomaa, A.: Public Key Cryptography, SpringerVerlag, 1990.
Schneier, B.: "Untangling Public Key Cryptography", Dr Dobb's Journal, May 1992, pp. 1628.
: "The IDEA Encryption Algorithm", Dr Dobb's Journal, December 1993, pp. 5056.
: Applied Cryptography : Protocols, Algorithms, and Source Code in C, 2nd edition, John Wiley & Sons, 1995
Simmons, G. (ed.): Contemporary Cryptology: the Science of Information Integrity, IEEE Press, 1991.
Smith, L. D.: Cryptography, Dover, 1955.
*Weber, R. E.: United States Diplomatic Codes and Ciphers 17751938, Precedent, 1979.
Welsh, D.: Codes and Cryptography, Claredon Press, 1988.
*Yardley, H. O.: The American Black Chamber, Ballantine, 1981.
An Introduction to the Use of Encryption 
Hermetic Systems Home Page 