Advertisement
Membership
Login
ACCU Buttons
Search in Book Reviews
Search is a simple string search in either book title or book author. The full text search is a search of the text of the review.
During WW II my father was an RAF meteorological officer. He was seconded to the British Army for the West African campaign. Each morning the German encrypted met. information broadcast was intercepted and relayed to London for decryption. The decrypted version was sent back mid-afternoon. As a competent mathematician, my father had actually decrypted the broadcasts within about half an hour of their reception. However, the open procedure had to be continued so that the German Command would not realise that the British were using German data to produce their forecasts.
In other words, it is not only necessary to conceal messages, but also to conceal your ability to decrypt them. It also highlights that good enough encryption is the major target. Volatile data such as met. data only needs protecting for a few hours. The Germans knew we could decode their broadcasts, but it did not matter if we could not do so in less than eight hours.
This book starts with examples from ancient history and finishes with a chapter on quantum cryptography. It is a pleasant read, though with nothing like the technical content of the next book.