The Code Book

The secreet History of Codes & Code-breaking

Paperback, 402 pages

English language

Published Feb. 17, 2000 by Fourth Estate Limited.

ISBN:
978-0-00-763574-0
Copied ISBN!
OCLC Number:
52534625

View on OpenLibrary

4 stars (54 reviews)

The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography is a book by Simon Singh, published in 1999 by Fourth Estate and Doubleday. The Code Book describes some illustrative highlights in the history of cryptography, drawn from both of its principal branches, codes and ciphers. Thus the book's title should not be misconstrued as suggesting that the book deals only with codes, and not with ciphers; or that the book is in fact a codebook.

31 editions

Review of 'The Code Book' on 'Goodreads'

5 stars

Almost everything about this book is great. Simon Singh is a wonderful story teller. He manages to get through the science without dumbing it down. From ancient monoalphabetic codes to quantum cryptography, the book is an enthralling read. Why "almost"? At this point the book is over 20 years old, and things move fast in the computer cryptography world. For example the use of DES has long been discouraged. But that's not the book's fault of course.

Review of 'The Code Book' on 'Goodreads'

5 stars

This book is incredible. It walks you through the entire history of cryptography, while teaching the reader about how every important cipher works in detail, along with the methodology for decryption.

My only disappointment with this book is that it was published in the late 90's before the Internet as we know it was fully implemented. An updated edition would be very helpful.

Review of 'The Code Book' on 'Goodreads'

5 stars

This book is a very good review of the history on encryption and explains the basic principles involved. It is a lot like David Kahn's The Code Breakers, but is available for a good deal less. Beginning with Herodotus and some secrecy measures from The Persian Wars, it then moves forward with Arab scholars, medieval developments, and right up to asymmetric public key encryption used today. Highly recommended for anyone who wants to get an overview of what the issues are, but is not looking to dive into the mathematics.

avatar for cincodenada@bookwyrm.cincodenada.com

rated it

4 stars
avatar for Ellemir

rated it

4 stars
avatar for teo

rated it

3 stars
avatar for BenCotterill

rated it

4 stars
avatar for Lavinia

rated it

4 stars
avatar for mcchots

rated it

5 stars
avatar for pauln99

rated it

5 stars
avatar for mjmenger

rated it

3 stars
avatar for knizer

rated it

5 stars
avatar for cincodenada@bookwyrm.cincodenada.com

rated it

4 stars
avatar for felubra

rated it

5 stars
avatar for secretGeek

rated it

5 stars
avatar for Michael

rated it

5 stars
avatar for jumpinggrendel

rated it

5 stars
avatar for reverse

rated it

4 stars
avatar for arclight

rated it

3 stars
avatar for paulralph

rated it

3 stars
avatar for Griddle

rated it

4 stars
avatar for prashmohan

rated it

5 stars
avatar for niclindh

rated it

4 stars
avatar for dewgreengrass

rated it

5 stars
avatar for dfings

rated it

5 stars
avatar for TimmyMac

rated it

4 stars
avatar for brstf

rated it

4 stars
avatar for LRx

rated it

5 stars
avatar for lacop

rated it

4 stars
avatar for darkejokero

rated it

5 stars
avatar for Jaldert

rated it

4 stars
avatar for deathgrindfreak

rated it

5 stars
avatar for fakelvis

rated it

4 stars
avatar for Express7686

rated it

4 stars
avatar for BojanB

rated it

5 stars
avatar for Psvensson

rated it

5 stars
avatar for Eldaerenth

rated it

5 stars
avatar for nerd.picnic

rated it

4 stars
avatar for jolson

rated it

3 stars
avatar for sellout

rated it

3 stars
avatar for johnnycastrup

rated it

4 stars