Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Codes, ciphers and spies : tales of military intelligence in World War I
Dooley J., Copernicus, New York, NY, 2016. 280 pp. Type: Book (978-3-319294-14-8)
Date Reviewed: Oct 27 2016

The invention of asymmetric key cryptography by Diffie and Hellman in 1976 [1] is generally accepted as the milestone that defines the boundary between classic and modern cryptography. Before 1976, cryptography was more of an art than a science, but creating ciphers and cracking codes was not a bit less important than nowadays, especially when the lives of many were at stake.

Every cryptography aficionado knows the story of Enigma and how the guys at Bletchley Park, led by Alan Turing, helped the Allies win World War II by deciphering German messages. On the contrary, the nuances of espionage and counterespionage, invisible ink, codebooks, and other sophisticated cryptology tools used in World War I are not that very well known.

In this book, Dooley presents the reader with a delightfully written history of the US Military Intelligence Division during World War I based on a series of unpublished articles written by John Matthews Manly in 1927. First, readers are introduced to the figure of Manly (a person worth knowing), and then his articles are put in context. Dooley explains how unprepared the Americans were when they entered WWI and concentrates on telling the story of the progress of American cryptology during WWI at the hands of Manly.

Readers will find in this book the story of the American Expeditionary Force (AEF) and the MI-8 during WWI, and they will also have their share of suspense with intricate plots of espionage, German efforts to sabotage American supply operations, and meeting the German spy Madame Marie de Victoria.

This is a book on the history of American cryptology during WWI that could be read by any educated person. The technical content is minimal and well explained when necessary with a clear and detailed style. The book will be the delight of anyone interested in history and cryptology and might serve to make visible the figure of John M. Manly and the important role that Americans played in the last part of WWI. In summary, this is a must-read for anyone interested in WWI and the history of cryptology.

More reviews about this item: Amazon

Reviewer:  Agusti Solanas Review #: CR144876 (1702-0090)
1) Diffie, W.; Hellman, M. E. New directions in cryptography. IEEE Transactions on Information Theory IT-22, 6(1976), 644–654.http://www.cyberterrorism-project.org/.
Bookmark and Share
  Reviewer Selected
Featured Reviewer
 
 
Data Encryption (E.3 )
 
 
Military (J.1 ... )
 
 
Number-Theoretic Computations (F.2.1 ... )
 
 
Numerical Algorithms And Problems (F.2.1 )
 
 
Administrative Data Processing (J.1 )
 
Would you recommend this review?
yes
no
Other reviews under "Data Encryption": Date
ESA/390 integrated cryptographic facility
Yeh P., Ronald M. S. IBM Systems Journal 30(2): 192-205, 1991. Type: Article
Feb 1 1992
Design and implementation of an RSA cryptosystem using multiple DSP chips
Er M., Wong D., Sethu A., Ngeow K. Microprocessors & Microsystems 15(7): 369-378, 1991. Type: Article
Nov 1 1993
An introduction to cryptography
Diffie W. (ed), Hellman M., John Wiley & Sons, Inc., New York, NY, 1984. Type: Book (9780471262336)
Feb 1 1986
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy