ACCU Home page ACCU Conference Page
Search Contact us ACCU at Flickr ACCU at GitHib ACCU at Facebook ACCU at Linked-in ACCU at Twitter Skip Navigation

Search in Book Reviews

The ACCU passes on review copies of computer books to its members for them to review. The result is a large, high quality collection of book reviews by programmers, for programmers. Currently there are 1949 reviews in the database and more every month.
Search is a simple string search in either book title or book author. The full text search is a search of the text of the review.
    View all alphabetically
Code Book
Simon Singh
1 85702 889 9
Fourth Estate
Francis Glassborow
cryptography; security
Appeared in:
This book has been a well deserved best seller. It provides a highly readable over-view of the broad subject of secret communication. This includes both encryption/decryption and message hiding. The latter is so often forgotten by the advocates of government access to encryption keys. Any halfway competent user of cryptography knows that an important element is the concealment of messages (steganography) that need to be secret. As an aside and an example of this kind of issue:

During WW II my father was an RAF meteorological officer. He was seconded to the British Army for the West African campaign. Each morning the German encrypted met. information broadcast was intercepted and relayed to London for decryption. The decrypted version was sent back mid-afternoon. As a competent mathematician, my father had actually decrypted the broadcasts within about half an hour of their reception. However, the open procedure had to be continued so that the German Command would not realise that the British were using German data to produce their forecasts.

In other words, it is not only necessary to conceal messages, but also to conceal your ability to decrypt them. It also highlights that good enough encryption is the major target. Volatile data such as met. data only needs protecting for a few hours. The Germans knew we could decode their broadcasts, but it did not matter if we could not do so in less than eight hours.

This book starts with examples from ancient history and finishes with a chapter on quantum cryptography. It is a pleasant read, though with nothing like the technical content of the next book.