Skip to main content

Using Short Programs to Make and Break Historical Ciphers

  • Chapter
What Is Computer Science?

Part of the book series: Undergraduate Topics in Computer Science ((UTICS))

  • 3280 Accesses

Abstract

Introductory books on cryptography often start by studying a range of historical ciphers. This is attractive for two reasons: first, because there is some interesting related history (their success or failure is often aligned with an important event), and, second, because they are simple enough to understand without a significant background in Mathematics.

This chapter has a similar premise. The goal is to demonstrate the two sides of cryptography: the constructive side where new schemes (in this case for encryption) are designed and used, and the destructive side where said schemes are attacked and broken. By using simple programs available on every UNIX-based computer, the chapter demonstrates how historical cryptanalysts were able to decrypt messages their sender would probably have thought as secure.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 16.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Page, D., Smart, N. (2014). Using Short Programs to Make and Break Historical Ciphers. In: What Is Computer Science?. Undergraduate Topics in Computer Science. Springer, Cham. https://doi.org/10.1007/978-3-319-04042-4_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-04042-4_6

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-04041-7

  • Online ISBN: 978-3-319-04042-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics