Basic Concepts and Historical Overview

Cryptography is the science of transforming, or encoding, information into a form non-comprehensible for anyone who does not know an appropriate key. In such forms information can be securely transferred via any communication channel or stored in data archives with its access restricted or even forbidden (for one reason or another). Cryptography is a part of a broader discipline called cryptology, which includes also so-called cryptanalysis—the art of breaking codes (ciphers), i.e., regaining the content of encrypted messages without an authorized access to the decryption keys.

[1]  J. Weizenbaum From Computer Power and Human Reason From Judgment to Calculation , 2007 .

[2]  Marian Rejewski,et al.  How Polish Mathematicians Broke the Enigma Cipher , 1981, Annals of the History of Computing.

[3]  Andrew Hodges,et al.  Alan Turing: The Enigma , 1983 .

[4]  A. Miller The assault on privacy : computers, data banks, and dossiers , 1972 .

[5]  T. Forester,et al.  Computer ethics: Cautionary tales and ethical dilemmas in computing , 1990 .

[6]  Simon Singh,et al.  Book Review: The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography , 2003, ACM Queue.

[7]  Ralph Erskine The Poles Reveal their Secrets: Alastair Denniston's Account of the July 1939 Meeting at Pyry , 2006, Cryptologia.

[8]  Judith A. Perrolle,et al.  Computers and social change: information, property, and power , 1987 .

[9]  M. Rejewski How Polish Mathematicians Deciphered the Enigma , 1981 .

[10]  Ronald L. Rivest,et al.  Introduction to Algorithms , 1990 .

[11]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[12]  Steven Levy,et al.  Crypto: How the Code Rebels Beat the Government--Saving Privacy in the Digital Age , 2001 .

[13]  Manindra Agrawal,et al.  PRIMES is in P , 2004 .

[14]  Jean Stengers Enigma, the French, the Poles and the British 1931 -1940 , 2004 .

[15]  Eugene H. Spafford,et al.  Computer Viruses: Dealing with Electronic Vandalism and Programmed Threats , 1989 .

[16]  D. Kahn The Codebreakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet , 1967 .

[17]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..