Skip to main content

Cryptology, Mathematics, and Technology

  • Chapter
  • First Online:
Technology and Mathematics

Part of the book series: Philosophy of Engineering and Technology ((POET,volume 30))

  • 429 Accesses

Abstract

Cryptology furnishes an ideal example of the synergy between mathematics and technology. This is illustrated by events before, during, and after World War II: manual methods of encryption were replaced by faster and more secure methods of machine encryption; these methods were then attacked during the war by mathematicians using a combination of mathematics and machines; and after the war machine encryption was in turn eventually supplanted by computers and computer-based encryption algorithms. Random number generation illustrates one aspect of this: physical randomization has been completely replaced by the use of pseudo-random number generators. A particularly striking example of the impact of mathematics on cryptography is the development of public key encryption.

Tracing developments in cryptology can pose interesting challenges for the historian because of a desire for secrecy, but it is occasionally possible to see behind the veil; the last section of this chapter discusses some interesting instances of this.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 139.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 179.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 179.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  • Banks, D. L. (1996). A conversation with I. J. Good. Statistical Science, 11, 1–19.

    Article  Google Scholar 

  • Borisov, I. S., et al. (2001). Aleksandr Alekseevich Borovkov (on his 70th birthday). Russian Mathematical Surveys, 56, 1009–1012.

    Article  Google Scholar 

  • Borovkov, A. A. (2004) Kolmogorov and boundary problems of probability theory. Russian Mathematical Surveys, 59, 91–102.

    Article  Google Scholar 

  • Brückner, H.-D. (2005). Germany’s first cryptanalysis on the Western Front: Decrypting British and French naval ciphers in World War I. Cryptologia, 29, 1–22.

    Article  Google Scholar 

  • Budiansky, S. (2000). Battle of wits: The complete story of codebreaking in World War II. New York: Free Press.

    Google Scholar 

  • Copeland, B. J. (Ed.). (2006). Colossus: The secrets of Bletchley Park’s codebreaking computers. Oxford: Oxford University Press.

    Google Scholar 

  • Feistel, H. (1973). Cryptography and computer privacy. Scientific American, 228(5), 15–23.

    Article  Google Scholar 

  • Fienberg, S. E. (1971). Randomization and social affairs: The 1970 draft lottery. Science, 171, 255–261.

    Article  Google Scholar 

  • Friedman, W. F. (1938–1941). Military cryptanalysis. Washington, DC: US Government Printing Office. [Several subsequent editions, later expanded in collaboration with Lambros D. Callimahos, under the title Military Cryptanalytics.].

    Google Scholar 

  • Good, I. J. (1950). Probability and the weighing of evidence. New York: Hafner Publishing Company.

    Google Scholar 

  • Good, I. J. (1976). Early work on computers at Bletchley. Cryptologia, 3, 65–77. Reprinted with an addendum in Annals of the History of Computing, 1, (1979), 38–48.

    Article  Google Scholar 

  • Good, I. J. (1979). Studies in the history of probability and statistics. XXXVII A. M. Turing’s statistical work in World War II. Biometrika, 66, 393–296.

    Article  Google Scholar 

  • Good, I. J. (1993). Enigma and Fish. In Hinsley and Stripp (1993) (pp. 149–166).

    Google Scholar 

  • Good, I. J. (2000). Turing’s anticipation of Empirical Bayes in connection with the cryptanalysis of the Naval Enigma. Journal of Statistical Computing and Simulation, 66, 101–111.

    Article  Google Scholar 

  • Good, I. J. (2001). Introductory remarks for the article in Biometrika, 66 (1979). A. M. Turing’s Statistical Work in World War II. In J. L. Britton (Ed.), Collected works of A. M. Turing (Vol. 2, pp. 211–223). Elsevier.

    Google Scholar 

  • Good, I. J. (2006). From Hut 8 to the Newmanry. In Copeland (2006) (pp. 204–222).

    Google Scholar 

  • Greenberg, J. (2014). Gordon Welchman: Bletchley Park’s architect of Ultra intelligence. London: Frontline Books.

    Google Scholar 

  • Haynes, J. E., & Klehr, H. (2000). Venona: Decoding Soviet espionage in America. New Haven: Yale University Press.

    Google Scholar 

  • Hinsley, F. H. (1979–1990). British intelligence in the Second World War (5 Vols.). London: Her Majesty’s Stationery Office.

    Google Scholar 

  • Hinsley, F. H., & Stripp, A. (1993). Codebreakers: The inside story of Bletchley Park. Oxford: Oxford University Press.

    Google Scholar 

  • Kahn, D. (1967). The codebreakers: The comprehensive history of secret communication from ancient times to the Internet. New York: Macmillan.

    Google Scholar 

  • Kahn, D. (2004). The reader of gentlemen’s mail: Herbert O. Yardley and the birth of American codebreaking. New Haven: Yale University Press.

    Google Scholar 

  • Knuth, D. E. (1997). The art of computer programming (Volume 1: Fundamental algorithms, 3rd ed.). Reading: Addison-Wesley.

    Google Scholar 

  • Kraft, J. S., & Washington, L. C. (2014). An introduction to number theory with cryptography. Boca Raton: CRC Press.

    Google Scholar 

  • Moore, J. M. (1975). Aristotle and Xenophon on democracy and oligarchy. University of California Press.

    Google Scholar 

  • Pearson, E. S. (1990). ‘Student’: A statistical biography of William Sealey Gosset. Oxford: Oxford University Press/Clarendon Press.

    Google Scholar 

  • Pratt, F. (1939). Secret and urgent: The story of codes and ciphers. New York: Bobbs-Merrill.

    Google Scholar 

  • Pröse, M. (2006). Chiffriermaschinen und Entzifferungsgeräte im Zweiten Weltkrieg: Technikgeschichte und informatikhistorische Aspekte. Munich: Martin Meidenbauer Verlagsbuchhandlung.

    Google Scholar 

  • Rand. (1955). A million random digits with 100,000 normal deviates. Illinois: Rand Corporation. Reissued 2001.

    Google Scholar 

  • Reeds, J., et al. (2015). Breaking teleprinter ciphers at Bletchley Park: An edition of I.J. Good, D. Michie and G. Timms: General report on Tunny with emphasis on statistical methods (1945). Piscataway: IEEE Press.

    Google Scholar 

  • Rejewski, M. (1981). How Polish mathematicians deciphered the Enigma. Annals of the History of Computing, 3, 213–234.

    Article  Google Scholar 

  • Rivest, R., Shamir, A., & Adelman, L. (1978). A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 21, 120–126.

    Article  Google Scholar 

  • Rowlett, F. B. (1998). The story of Magic: Memoirs of an American cryptologic pioneer. Laguna Hills: Aegean Park Press.

    Google Scholar 

  • Samuels, M. (2016). Ludwig Föppl: A Bavarian cryptanalyst on the Western front. Cryptologia, 40, 355–373.

    Article  Google Scholar 

  • Sinkov, A. (1968). Elementary cryptanalysis: A mathematical approach. New York: New Mathematical Library, Random House.

    Google Scholar 

  • Stigler, S. M. (1999). The statistics on the table: The history of statistical concepts and methods. Cambridge: Harvard University Press.

    Google Scholar 

  • Turing, A. M. (2015). The applications of probability to cryptography. unpublished paper, c. 1941. UK National Archives, HW 25/37, 2012. For a typeset version, see Ian Taylor, arXiv:1505.04714v2 [math.HO].

    Google Scholar 

  • Weierud, F., & Zabell, S. (2018). German mathematicians and cryptology during World War II. Submitted to Cryptologia.

    Google Scholar 

  • Welchman, G. (1982). The Hut six story: Breaking the Enigma codes. New York: McGraw-Hill.

    Google Scholar 

  • Welchman, G. (1986). From Polish bomba to British bombe: The birth of Ultra. Intelligence and National Security, 1, 71–110.

    Article  Google Scholar 

  • Winterbotham, F. W. (1974). The Ultra secret. London: Weidenfeld and Nicolson.

    Google Scholar 

  • Yardley, H. O. (1931). The American Black Chamber. Indianapolis: Bobbs-Merrill.

    Google Scholar 

  • Zabell, S. L. (2012). Commentary on Alan M. Turing: The applications of probability to cryptography. Cryptologia, 36, 191–214.

    Article  Google Scholar 

  • Zabell, S. L. (2015). Statistics at Bletchley Park. In Reeds et al. (2015) (pp. lxxv–ci).

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sandy Zabell .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG, part of Springer Nature

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Zabell, S. (2018). Cryptology, Mathematics, and Technology. In: Hansson, S. (eds) Technology and Mathematics. Philosophy of Engineering and Technology, vol 30. Springer, Cham. https://doi.org/10.1007/978-3-319-93779-3_7

Download citation

Publish with us

Policies and ethics