Professor Fred Piper was appointed Professor of Mathematics at the University of London in 1975 and has worked in information security since 1979. In 1985, he formed a company, Codes & Ciphers Ltd, which offers consultancy advice in all aspects of information security. He has acted as a consultant to over 80 companies including a number of financial institutions and major industrial companies in the UK, Europe, Asia, Australia, South Africa and the USA.
The consultancy work has been varied and has included algorithm design and analysis, work on EFTPOS and ATM networks, data systems, security audits, risk analysis and the formulation of security policies. He has lectured worldwide on information security, both academically and commercially, has published more than 100 papers and is joint author of Cipher Systems (1982), one of the first books to be published on the subject of protection of communications, Secure Speech Communications (1985), Digital Signatures - Security & Controls (1999) and Cryptography: A Very Short Introduction (2002).
Fred has been a member of a number of DTI advisory groups. He has also served on a number of Foresight Crime Prevention Panels and task forces concerned with fraud control, security and privacy. He is currently a member of the Board of Trustees for Bletchley Park and the Board of the Institute of Information Security professionals. He is also a member of (ISC)2's European Advisory Board, the steering group of the DTI's Cyber Security KTN, ISSA's advisory panel and the BCS's Information Security Forum.
In 2002, he was awarded an IMA Gold Medal for "services to mathematics" and received an honorary CISSP for "leadership in Information Security". In 2003, Fred received an honorary CISM for "globally recognised leadership" and "contribution to the Information Security Profession".
In 2005 he was elected to the ISSA Hall of Fame. He was named Professional of the Year at the Communications in Business Awards 2005. In 2008 he was elected to be a Fellow of (ISC)2. In 2008 he was the first person to be elected to the InfoSecurity Europe Hall of Fame. In 2008 he was elected to the International Advisory Board of IMPACT (the International Multilateral Programme Against Cyber Threats).
I'll get to straight to the point. This book isn't really for beginners or laymen. The first couple chapters were illuminating, interesting, and understandable. But if you've never had any exposure to cryptography (especially the technical terms and acronyms/abbreviations), the last half of this book will be completely unintelligible to you. I was disappointed.
I'll start with the good stuff though. The basics of cryptography as well as the descriptions and explanations of various ciphers throughout history were really well explained and interesting. And the explanation of binary calculations at the beginning of the book was excellent too! At the very end of the book, there are some notes of resources (including websites) for furthers reading. That's cool too.
My main complaint is that things started to get complicated after the third chapter, and each acronym is defined exactly once. All the abbreviations seemed to be introduced at the same time. It was overwhelming. So I still understand nothing about cryptography and its algorithms as they're used practically today. I consider myself a persistent, thoughtful reader, and I have a light computer science background, but I couldn't make sense of hardly anything after the descriptions of basic ciphers.
I think this book is best for people with a strong computer science background who already know a thing or two about security. If you're completely new to cryptography and cyber security, you can still enjoy parts of this book, but it isn't an all-around good introduction.
What I got out of this book: *Cryptography isn't about keeping outsiders from getting sensitive info, it's about making sure they can't understand what they see. *The goal isn't always to make a system as secure as possible - just "secure enough". *"Perfect secrecy" is when the number of messages and chances of guessing correctly are equal (the number of messages and number of keys are equal). *Prime numbers are important in contemporary cyber security. *An understanding of basic ciphers (e.g. the Caesar Cipher, homophonic coding, polyalphabetic coding, the Vernam Cipher) *An understanding of binary calculations
I liked what was there, but I think book is 20+ years old and it definitely probably needs to be updated to account for us closing in on quantum computing, cryptocurrency, AI, etc. So good (4 stars) minus 1 star for age and lack of update. Still no regrets, it gave a nice survey of cryptography from a few decades back.
Description: This book is a clear and informative introduction to cryptography and data protection--subjects of considerable social and political importance. It explains what algorithms do, how they are used, the risks associated with using them, and why governments should be concerned. Important areas are highlighted, such as Stream Ciphers, block ciphers, public key algorithms, digital signatures, and applications such as e-commerce. This book highlights the explosive impact of cryptography on modern society, with, for example, the evolution of the internet and the introduction of more sophisticated banking methods.
Was expecting this to be dry - was in fact quite good. Very practical as well - in the age of the internet, it pays to know how your information is being kept safe. The book is based on a university course aimed at trainee IT professionals, although it is getting to be out of date (2002).
Chapter 1: Introduction Chapter 2: Understanding cryptography Chapter 3: Historical algorithms: simple examples Chapter 4: Unbreakable ciphers? Chapter 5: Modern algorithms Chapter 6: Practical security Chapter 7: Uses of cryptography Chapter 8: Key management Chapter 9: Cryptography in everyday life
This is an excellent and short introduction (155 pages!) into the world of Cryptography. Cryptography is the name of the science that concerns itself with secret coding (or encryption) of information to be protected from loss of confidentiality, integrity and authenticity. It is one the oldest sciences that nations and military used to concern themselves with as it is such a crucial and vital element of the war or even running governments.
To give you an example, breaking the Enigma cipher played a huge role in giving the Allied forces and the UK an upper hand in the war against Germany and it is believed it shortened the war by at least 2 years.
Lately, if you have not been keeping up with the news you would be very familiar with the NSA leaks by an ex-NSA employee named Edward Snowden. Security and privacy are becoming essential in the dawn of Mass Surveillance or the rise of Personal Information and Identity thefts online.
This book is not meant to be a technical primer. It is meant as an introduction that covers most aspects of encryption and the modern application of cryptography.
Chapter 1: Introduction Chapter 2: Understanding cryptography Chapter 3: Historical algorithms: simple examples Chapter 4: Unbreakable ciphers? Chapter 5: Modern algorithms Chapter 6: Practical security Chapter 7: Uses of cryptography Chapter 8: Key management Chapter 9: Cryptography in everyday life
It was fun to read and also to listen to on Audible. I have so far read it twice or 3 times. Very short snippets of technical details which you can safely skip when needed without compromising your overall understanding of the subject.
As a Cyber Security specialist, I give it an easy 5 star as it made a daunting subject every newcomer avoids (like Maths) an easy and digestible subject and I was inclined to read the book multiple times without getting bored.
Since I like puzzles, a friend asked me if I had ever touched upon cryptography, which, as he called it, is the ultimate game of puzzle solving. I had not considered this point of view, but did acquiesce immediately that at the very least it must be important to learn about computer security in some detail, as all people can, on average, benefit from improving their computer security, and I'm not immune to the law of averages (or from bad password choices). The subject though, seemed intimidating to me, but the first few chapters are accessible to anyone. To go further,if you need illustrated examples and exercises like me (to grasp mathematical concepts, at least), it would help to use Khan Academy, which has excellent short videos and programs you can tinker with to see how the input and output changes. These are in the Computer Science section, under "Information theory". I've also recently seen EdX courses that might help the layperson like me, and both resources are free. It has also helped me to know, in recent years, that if you have a question, you can ask it on Quora. Overall, if you employ all resources at your disposal to learn more about a topic, success will follow.
Excellent introduction to cryptography and related aspects such as key management and public key infrastructure/certificate authorities. I especially liked that the authors tried to cover the entire subject in a holistic fashion instead of just focusing on one narrow application (such as encrypting messages). It is a non-technical book that nevertheless is easier to read if you have at least some basic knowledge of computers and maths.
My favorite part were the small exercises which made you think about different encryption mechanisms in a deep and meaningful way. Definitely recommend this book to anyone who's interested in the subject!
Short Simple book about Cryptography and its different algorithms since the dawn of time till the modern day :p From Caesar Cipher to modern block chains and certificates it was a great read and not that specific too mostly in layman terms without major math which was O.K but not giving you the whole picture on the subject which is not that bad as an introduction. For more in depth study you can find courses on Coursera or Edx on the subject which I recommend to dive more into it and the different algorithms out there to encrypt data and have an understanding on how the modern world works and how it give the illusion of anonymity on the web and in life in general. Good read!
Really enjoyed this book, was a good introduction to cryptography and not too high level (some basic maths facts and work which made it helpful and interesting). Didn鈥檛 realise how old it was so probably outdated in parts but a good enough introduction.
Finished this very quickly as I thought the chapters were just the perfect length without going too detailed.
Would feel a second read through to be beneficial as the acronyms being defined just once makes it tricky to remember鈥� but since this isn鈥檛 a text book I鈥檓 memorising from that is just fine.
Zastaral谩 kniha. V 膷esk茅m p艡ekladu (jen v 膷esk茅m?) p艡ekladu jsou nav铆c chyby v bin谩rn铆ch 膷铆slech. Nap艡. na stran臎 73 je pro 膷铆slo 9dec hodnota 11dec (1011bin). Na dal拧铆ch str谩nk谩ch jsou 拧patn臎 v媒sledky operace XOR. V媒razy jako "煤tok 膷lov臎ka uprost艡ed" jen dokresluj铆, jak p艡ekladatel o problematice asi nic nev铆.
Good and concise (133 pages) intro to some cryptography fundamentals that is always good to review. All with quite interesting historical remarks (the confederates using a Vigen猫re cipher during the American civil war when was already broken!) and practical examples (GSM, ATMs, etc).
Bought this book after visiting Bletchley park. Good introduction to the topic, the authors make an effort to keep it simple and for me it was an easy read, however, it is important to point out that I have training in computer science and maths.
The first half of the book is quite good but the second half is not that great. The algorithms are poorly explained and could really use some additional illustrations. It's also pretty dated at this point, being almost two decades old.
I think it would be hard to follow for someone who didn't already know something about these topics, but glossed over details that would be interesting to someone who does.
If I were asked for a recommendation for an introduction to cryptography, especially a Very Short one, then yes, I would recommend this book. I didn't know anything about cryptography when I started, and now I feel I have a basic sense of what they mean by 128-bit encryption, a one-time pad, hash functions, and key management. By that measure, this book accomplished its goal.
However, there are still some pretty serious problems with the presentation of material. The writers are experts on the subject matter, and without their expertise this could have been worse. But with another round of editing (or another editor?) it also could have been better. A few key points:
1. Chapter 3 has its own appendix. I've seen plenty of books with appendices at the end of the book, after all the chapters, but I've never seen a chapter with its own appendix. I realize there are times when it's appropriate to break with convention - those cases where it will help the reader to understand or to use the material. In this case, it's an explanation of binary numbers and modular arithmetic. I went over it again after finishing the book and I don't think it contributed anything by placing it in the middle. I think it should have been placed at the end, and its location in the middle of the book is solely due to poor planning and editing. In the grand scheme of things, it's not such a big deal, but it irks me because it's unnecessary and looks like a glaring "fix me" sign to your average editor.
2. The Acknowledgements specifically thanks two readers for "saving us from embarrassment by correcting some of our exercises," but they apparently missed a big one. In fact, they missed the only true exercise in the book - the big cryptogram on page 30. Note only do they provide no helpful hints to the struggling reader, there is no answer key provided anywhere (not upside-down on the next page, not buried in the back). Sorry readers, you're entirely on your own this time. If you want to try it yourself, I won't ruin your fun by giving you the key here, but I must warn you: there is a major typo and a few minor ones. The word SCPKQ on line 8 is repeated. Even if you're never cracked a code or solved a puzzle, you'll probably accept that there are very, very few grammatically correct sentence in English where a word is used twice in a row. Add that to a missing space and a missing punctuation mark and you have some sloppy editing. "Hey man, they made a mistake, so what? It's a cryptogram - it's confusing and must have been hard to check anyway, right?" Yes, except for the fact the whole point of the book is about deciphering messages, and this was the single exercise in it. I considered that maybe they made these minor mistakes to add to the challenge, but there was no discussion of this in the text. Given this and the overall issues with editing, I'm inclined to take this as sloppy work.
3. Being that this is a, ahem, cryptic topic, most readers are going to need the material to be presented in a fairly straightforward fashion, with little assumed and frequent reminders (as in, "Remember this, from page 26? This is where it comes in handy.") Instead the writers opted for the tone of "It should be clear that..." and "Of course..." and other such introductory lines that turn off your average reader who just wants a, well, a very short introduction, not a reminder of how insanely remedial this chapter. There's a lot of that throughout. I don't think they did this to insult the audience (let's hope not). I think the writers were just a bit out of touch with who is likely to read this cover-to-cover. With that said, there is an Index (mercifully placed at the end), but it doesn't contain all the terms you would hope for and contains more than a few you could never care about. For example, a good Index header is "Key Search" with sub-headers "Exhaustive" and "Internet," things you'd probably be interested on the topic of key searches (note: there are different pointers listed under the Index header "Exhaustive Key Search", so why not just have "See Exhaustive Key Search"?). But it contains headers for people mentioned only in passing (ex: Queen Elizabeth I, Simon Singh) but no headers for ECB, standing for Electronic Code Book; instead you'd have to look for as a sub-header of Mode of Operation. Um yeah, wonder why I didn't think to look there the first time. So again, it's not like the writers set out to impress or deliberately confuse the readers as much as they didn't have a good feel for them.
I know I sometimes write these really long entries for middle-of-the-road books. But I think it's warranted in cases like this. The book did accomplish its purpose in that I now have a substantially better understanding of, and respect for, cryptography. But I can't overlook the fact that with a bit more effort and the help of a good editing staff this book could have been much better.