The Code Book: The Evolution of Secrecy from Mary, Queen of Scots to Quantum Cryptography

( 33 )


Codes have decided the fates of empires, countries, and monarchies throughout recorded history. Mary, Queen of Scots was put to death by her cousin, Queen Elizabeth, for the high crime of treason after spymaster Sir Francis Walsingham cracked the secret code she used to communicate with her conspirators. And thus the course of British history was altered by a few sheets of cryptic prose. This is just one link in humankind's evolutionary chain of secret communication, and just one of the fascinating incidents ...
See more details below
Available through our Marketplace sellers.
Other sellers (Hardcover)
  • All (94) from $1.99   
  • New (3) from $40.00   
  • Used (91) from $1.99   
Sort by
Page 1 of 1
Showing All
Note: Marketplace items are not eligible for any coupons and promotions
Seller since 2015

Feedback rating:



New — never opened or used in original packaging.

Like New — packaging may have been opened. A "Like New" item is suitable to give as a gift.

Very Good — may have minor signs of wear on packaging but item works perfectly and has no damage.

Good — item is in good condition but packaging may have signs of shelf wear/aging or torn packaging. All specific defects should be noted in the Comments section associated with each item.

Acceptable — item is in working order but may show signs of wear such as scratches or torn packaging. All specific defects should be noted in the Comments section associated with each item.

Used — An item that has been opened and may show signs of wear. All specific defects should be noted in the Comments section associated with each item.

Refurbished — A used item that has been renewed or updated and verified to be in proper working condition. Not necessarily completed by the original manufacturer.

New York, NY 1999 Hardcover Edition Not Stated. New in new dust jacket. A beautiful copy in a brodart dust jacket cover. Sewn binding. Cloth over boards. With dust jacket. 416 ... p. Contains: Illustrations. Audience: General/trade. Read more Show Less

Ships from: San Diego, CA

Usually ships in 1-2 business days

  • Canadian
  • International
  • Standard, 48 States
  • Standard (AK, HI)
  • Express, 48 States
  • Express (AK, HI)
Seller since 2015

Feedback rating:


Condition: New
Brand new.

Ships from: acton, MA

Usually ships in 1-2 business days

  • Standard, 48 States
  • Standard (AK, HI)
Seller since 2015

Feedback rating:


Condition: New
Brand new.

Ships from: acton, MA

Usually ships in 1-2 business days

  • Standard, 48 States
  • Standard (AK, HI)
Page 1 of 1
Showing All
Sort by
The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography

Available on NOOK devices and apps  
  • NOOK Devices
  • Samsung Galaxy Tab 4 NOOK 7.0
  • Samsung Galaxy Tab 4 NOOK 10.1
  • NOOK HD Tablet
  • NOOK HD+ Tablet
  • NOOK eReaders
  • NOOK Color
  • NOOK Tablet
  • Tablet/Phone
  • NOOK for Windows 8 Tablet
  • NOOK for iOS
  • NOOK for Android
  • NOOK Kids for iPad
  • PC/Mac
  • NOOK for Windows 8
  • NOOK for PC
  • NOOK for Mac
  • NOOK for Web

Want a NOOK? Explore Now

NOOK Book (eBook)
$13.99 price
This digital version does not exactly match the physical book displayed here.


Codes have decided the fates of empires, countries, and monarchies throughout recorded history. Mary, Queen of Scots was put to death by her cousin, Queen Elizabeth, for the high crime of treason after spymaster Sir Francis Walsingham cracked the secret code she used to communicate with her conspirators. And thus the course of British history was altered by a few sheets of cryptic prose. This is just one link in humankind's evolutionary chain of secret communication, and just one of the fascinating incidents recounted in The Code Book, written by bestselling author Simon Singh.

Combining a superb storyteller's sense of drama and a scientist's appreciation for technical perfection, Singh traces the evolution of secret writing from ancient Greek military espionage to the frontiers of computer science. The result is an epic tale of human ingenuity, with examples that range from the poignant to the peculiar to the world-historical.

There is the case of the Beale ciphers, which involves Wild West escapades, a cowboy who amassed a vast fortune, a buried treasure worth $20 million, and a mysterious set of encrypted papers describing its whereabouts—papers that have baffled generations of cryptanalysts and captivated hundreds of treasure hunters.

A speedier end to a bloody war was the only reward that could be promised to the Allied code breakers of World Wars I and II, whose selfless contributions altered the course of history; but few of them lived to receive any credit for their top-secret accomplishments. Among the most moving of these stories is that of the World War II British code breaker Alan Turing, who gave up a brilliant career in mathematics todevote himself to the Allied cause, only to end his years punished by the state for his homosexuality, while his heroism was ignored. No less heroic were the Navajo code talkers, who volunteered without hesitation to risk their lives for the Allied forces in the Japanese theater, where they were routinely mistaken for the enemy.

Interspersed with these gripping stories are clear mathematical, linguistic, and technological demonstrations of codes, as well as illustrations of the remarkable personalities—many courageous, some villainous, and all obsessive—who wrote and broke them.

All roads lead to the present day, in which the possibility of a truly unbreakable code looms large. Singh explores this possibility, and the ramifications of our increasing need for privacy, even as it begins to chafe against the stated mission of the powerful and deeply secretive National Security Agency. Entertaining, compelling, and remarkably far-reaching, this is a book that will forever alter your view of history, what drives it, and how private that e-mail you just sent really is.

Included in the book is a worldwide Cipher Challenge—a $15,000 award will be given by the author to the first reader who cracks the code successfully. Progress toward the solution will be tracked on The Code Book website.
Read More Show Less

Editorial Reviews

Joshua Kosman

Toward the end of August, an international team of computer scientists succeeded in breaking a 155-digit number into its two prime factors. The feat was significant because public-key cryptography -- the system of encryption that ostensibly guards the privacy of most Internet traffic today -- depends on the difficulty of factoring a very large number. True, it took 292 computers seven months to factor that number. But the mere fact that the problem was solvable in a finite period -- as opposed to, say, 43 times the age of the universe -- was enough to show that the current level of security can, and ultimately will, be penetrated.

This latest blow in the struggle between code makers and code breakers comes as a timely epilogue to The Code Book, Simon Singh's fascinating and remarkably accessible history of cryptography. Tracing the development of secret writing from the fifth century B.C. to the present and beyond, Singh recounts a series of theoretical and practical breakthroughs, each followed by a matching counterstroke in an ongoing intellectual tennis match. The "evolution" of his subtitle, in fact, is analogous to the biological arms race that develops over time between predators and their prey, or pathogens and their hosts. Each time a technological advance makes a new level of secrecy in encrypted writing possible, the code makers have the upper hand; but eventually the code breakers locate a flaw in the new system, making secure communications an iffy proposition again.

Singh begins his story with the simple alphabetic cipher, a letter-by-letter encoding that lives on today in the humble cryptogram. (It's amazing to consider that what is now an amusement in the daily newspaper was used as recently as the Renaissance to conceal top-level diplomatic correspondence.) Cryptograms, of course, can be easily broken by "frequency analysis" -- assuming, for instance, that the most common letter in a long English message stands for E. Singh goes on to the Vigenere cipher, hailed in the 19th century as "the indecipherable cipher," which improved on that system by using several different cipher alphabets in rotation, but it, too, ultimately proved fallible. He then proceeds to describe the penetration of the Germans' Enigma code during World War II and, ultimately, with the rise of the computer and electronic communications, the 1970s development of public-key cryptography. He also includes a compelling detour into the great achievements in historical code breaking: the decipherings of the Rosetta Stone and the Linear B inscriptions of the Minoan civilization.

Singh, the British science journalist who wrote the popular Fermat's Enigma, has a gift for explaining the nuts and bolts of even the most intricate cryptographic systems; it is nothing short of astonishing to watch the Enigma cipher crumble before your eyes through a series of logical deductions that a lay reader can easily follow. At the end of the book, in a sort of promotional-gimmick-cum-final-exam, Singh offers a $15,000 prize to the first reader who can crack a series of coded messages -- one in each of the increasingly sophisticated encryption schemes he details in the book. (It's a measure of just how clear his explanations are that the challenge seems well within the realm of possibility.)

Singh goes beyond the technical details of cryptography to profile the people behind the codes; his book is full of enlivening biographical details and deft portraits of some of the quirkier figures in the history of mathematics, computer science, archaeology and diplomacy. He is scrupulous, too, about giving credit not just to the marquee names but to the lesser-known figures in the story of cryptography as well: His account of the Enigma decoding, for instance, recognizes the work of the British intelligence service and the brilliant mathematician Alan Turing, but also explicates the essential foundations laid by an obscure Polish statistician named Marian Rejewski.

The book's lone false note comes at the end, when Singh contemplates the cryptographic advances based on quantum physics that may appear in the 21st century. He seems to take seriously the likelihood that a truly unbreakable cipher is on the horizon -- this after 300 pages detailing the history of just such a fantasy. It's possible, of course, that complete privacy may yet be achievable. But nothing in The Code Book supports the idea.

Publishers Weekly - Publisher's Weekly
In an enthralling tour de force of popular explication, Singh, author of the bestselling Fermat's Enigma, explores the impact of cryptography--the creation and cracking of coded messages--on history and society. Some of his examples are familiar, notably the Allies' decryption of the Nazis' Enigma machine during WWII; less well-known is the crucial role of Queen Elizabeth's code breakers in deciphering Mary, Queen of Scots' incriminating missives to her fellow conspirators plotting to assassinate Elizabeth, which led to Mary's beheading in 1587. Singh celebrates a group of unsung heroes of WWII, the Navajo "code talkers," Native American Marine radio operators who, using a coded version of their native language, played a vital role in defeating the Japanese in the Pacific. He also elucidates the intimate links between codes or ciphers and the development of the telegraph, radio, computers and the Internet. As he ranges from Julius Caesar's secret military writing to coded diplomatic messages in feuding Renaissance Italy city-states, from the decipherment of the Rosetta Stone to the ingenuity of modern security experts battling cyber-criminals and cyber-terrorists, Singh clarifies the techniques and tricks of code makers and code breakers alike. He lightens the sometimes technical load with photos, political cartoons, charts, code grids and reproductions of historic documents. He closes with a fascinating look at cryptanalysts' planned and futuristic tools, including the "one-time pad," a seemingly unbreakable form of encryption. In Singh's expert hands, cryptography decodes as an awe-inspiring and mind-expanding story of scientific breakthrough and high drama. Agent, Patrick Walsh. (Oct.) FYI: The book includes a "Cipher Challenge," offering a $15,000 reward to the first person to crack that code. Copyright 1999 Cahners Business Information.
Library Journal
Singh, Cambridge-educated physicist, has written a provocative study of code, the way in which humans hide the inherent meanings of messages by substituting words and or characters in a text. Author of the popular Fermat's Enigma, he broadly portrays the evolution of cryptography throughout the centuries. In essence, efforts of those wishing for secrecy and others who attempt to break it is a story of intrigue of the highest form. Employing a smooth narrative style, Singh tells of secrecy, fascinating events, and people, starting with Mary Queen of Scots and ending with recent attempts by quantum theorists to construct an unbreakable code. This is the history of technology at its best and serves as an excellent addition to David Kahn's mammoth work on cryptography, The Codebreakers (Scribner, 1996). Highly recommended for all public and academic libraries. [Previewed in Prepub Alert, LJ 5/1/99.]--Dayne Sherman, Southeastern Louisiana Univ., Hammond Copyright 1999 Cahners Business Information.
From The Critics
During the late 19th century, private citizens and businesses began to rely less on the dependable but slow postal system, and more on a new method of transmitting and receiving messages, news and financial data. The breakthrough technology was the telegraph, and almost as soon as people started using it, they began to think of ways to safeguard private communications from prying eyes.

One writer in England's Quarterly Review described the problem in 1853: "The clerks of the English Telegraph Company are sworn to secrecy, but we often write things that would be intolerable to see strangers read before our eyes. This is a grievous fault in the telegraph, and it must be remedied by some means or other."

A simple solution to snooping telegraph operators was to encrypt messages before handing them over to transmit, a practice that became common for individuals and companies alike. A hundred years later, we are in the midst of another telecommunications transformation, and concern over privacy is more intense than ever. As our private e-mail messages and credit card numbers ricochet around the world at dizzying speed, encryption remains the cornerstone of our security.

Of course, as author Simon Singh explains in The Code Book, our methods of encryption have evolved along with our communications technologies. In a sweeping overview, Singh traces the evolution of secret writing from the time of Herodotus to the present day. Along the way, he tells tales of the treasonous, though simply coded communications of Mary, Queen of Scots; Louis XIV's Great Cipher, which went unsolved for two centuries; and Charles Babbage's 1850s deciphering of the supposedly uncrackable polyalphabetic Vigenere Cipher. He also details the World War II-era work of Navajo code-talkers and the cracking of the German Enigma machine, as well as the United States' and England's nearly simultaneous discovery of public-key cryptography in the 1970s.

Author of the 1997 bestseller Fermat's Enigma, Singh casts the relationship between codemaking and codebreaking in evolutionary terms: Like strains of infectious bacteria, ciphers grow stronger because, as the weak are deciphered, necessity demands that more difficult-to-crack codes take their place.

Although Singh fashions a compelling history, as well as a skillful explanation of the analytical underpinnings of cryptographs, the most dramatic moments in the book come in the last three chapters. As the book draws to a close, the author walks readers through such events of the past 20 years as the invention of public-key cryptography and recent experiments to employ quantum mechanics in the quest for the unbreakable code.

The public-key method - the first cryptographic system in history that doesn't require both parties in a transaction to share a secret key - is considered the most important advance in codemaking within the past 2,000 years. Public-key encryption makes possible familiar computer transactions like secure e-mail and e-commerce, without which using a credit card on the Web would be no more secure than leaving a wallet on the bus.

Public-key cryptography also helped revive a debate over encryption that pits citizen privacy against government security. As Singh commented at a recent book reading in San Francisco, "I could send you a message encrypted through free software on the Net, and the combined forces of the GCHQ, the NSA, the CIA and the FBI wouldn't be able to crack that code. And if they did manage to," he added, "I could just re-encrypt with Version 2.0."

Singh understands an essential truth about secrets: You can crack a code if you ask the right questions, but sometimes the answers evolve themselves out of existence. -- Maria De La O

Brian Rotman
[A] very readable and skillfully told history of crypthography.
London Review of Books
Read More Show Less

Product Details

  • ISBN-13: 9780385495318
  • Publisher: Doubleday Publishing
  • Publication date: 9/7/1999
  • Edition description: 1ST
  • Edition number: 1
  • Pages: 416
  • Product dimensions: 6.50 (w) x 9.55 (h) x 1.34 (d)

Read an Excerpt

On the morning of Wednesday, 15 October 1586, Queen Mary entered the crowded courtroom at Fotheringhay Castle. Years of imprisonment and the onset of rheumatism had taken their toll, yet she remained dignified, composed and indisputably regal. Assisted by her physician, she made her way past the judges, officials and spectators, and approached the throne that stood halfway along the long, narrow chamber. Mary had assumed that the throne was a gesture of respect towards her, but she was mistaken. The throne symbolised the absent Queen Elizabeth, Mary's enemy and prosecutor. Mary was gently guided away from the throne and towards the opposite side of the room, to the defendant's seat, a crimson velvet chair.

Mary Queen of Scots was on trial for treason. She had been accused of plotting to assassinate Queen Elizabeth in order to take the English crown for herself. Sir Francis Walsingham, Elizabeth's Principal Secretary, had already arrested the other conspirators, extracted confessions, and executed them. Now he planned to prove that Mary was at the heart of the plot, and was therefore equally culpable and equally deserving of death.

Walsingham knew that before he could have Mary executed, he would have to convince Queen Elizabeth of her guilt. Although Elizabeth despised Mary, she had several reasons for being reluctant to see her put to death. First, Mary was a Scottish queen, and many questioned whether an English court had the authority to execute a foreign head of state. Second, executing Mary might establish an awkward precedent -- if the state is allowed to kill one queen, then perhaps rebels might have fewer reservations about killing another, namely Elizabeth. Third,Elizabeth and Mary were cousins, and their blood tie made Elizabeth all the more squeamish about ordering her execution. In short, Elizabeth would sanction Mary's execution only if Walsingham could prove beyond any hint of doubt that she had been part of the assassination plot.

The conspirators were a group of young English Catholic noblemen intent on removing Elizabeth, a Protestant, and replacing her with Mary, a fellow Catholic. It was apparent to the court that Mary was a figurehead for the conspirators, but it was not clear that she had actually given her blessing to the conspiracy. In fact, Mary had authorised the plot. The challenge for Walsingham was to demonstrate a palpable link between Mary and the plotters.

On the morning of her trial, Mary sat alone in the dock, dressed in sorrowful black velvet. In cases of treason, the accused was forbidden counsel and was not permitted to call witnesses. Mary was not even allowed secretaries to help her prepare her case. However, her plight was not hopeless because she had been careful to ensure that all her correspondence with the conspirators had been written in cipher. The cipher turned her words into a meaningless series of symbols, and Mary believed that even if Walsingham had captured the letters, then he could have no idea of the meaning of the words within them. If their contents were a mystery, then the letters could not be used as evidence against her. However, this all depended on the assumption that her cipher had not been broken.

Unfortunately for Mary, Walsingham was not merely Principal Secretary, he was also England's spymaster. He had intercepted Mary's letters to the plotters, and he knew exactly who might be capable of deciphering them. Thomas Phelippes was the nation's foremost expert on breaking codes, and for years he had been deciphering the messages of those who plotted against Queen Elizabeth, thereby providing the evidence needed to condemn them. If he could decipher the incriminating letters between Mary and the conspirators, then her death would be inevitable. On the other hand, if Mary's cipher was strong enough to conceal her secrets, then there was a chance that she might survive. Not for the first time, a life hung on the strength of a cipher.

The Evolution of Secret Writing

Some of the earliest accounts of secret writing date back to Herodotus, 'the father of history' according to the Roman philosopher and statesman Cicero. In The Histories, Herodotus chronicled the conflicts between Greece and Persia in the fifth century bc, which he viewed as a confrontation between freedom and slavery, between the independent Greek states and the oppressive Persians. According to Herodotus, it was the art of secret writing that saved Greece from being conquered by Xerxes, King of Kings, the despotic leader of the Persians.

The long-running feud between Greece and Persia reached a crisis soon after Xerxes began constructing a city at Persepolis, the new capital for his kingdom. Tributes and gifts arrived from all over the empire and neighbouring states, with the notable exceptions of Athens and Sparta. Determined to avenge this insolence, Xerxes began mobilising a force, declaring that 'we shall extend the empire of Persia such that its boundaries will be God's own sky, so the sun will not look down upon any land beyond the boundaries of what is our own'. He spent the next five years secretly assembling the greatest fighting force in history, and then, in 480 bc, he was ready to launch a surprise attack.

However, the Persian military build-up had been witnessed by Demaratus, a Greek who had been expelled from his homeland and who lived in the Persian city of Susa. Despite being exiled he still felt some loyalty to Greece, so he decided to send a message to warn the Spartans of Xerxes' invasion plan. The challenge was how to dispatch the message without it being intercepted by the Persian guards. Herodotus wrote:

As the danger of discovery was great, there was only one way in which he could contrive to get the message through: this was by scraping the wax off a pair of wooden folding tablets, writing on the wood underneath what Xerxes intended to do, and then covering the message over with wax again. In this way the tablets, being apparently blank, would cause no trouble with the guards along the road. When the message reached its destination, no one was able to guess the secret, until, as I understand, Cleomenes' daughter Gorgo, who was the wife of Leonides, divined and told the others that if they scraped the wax off, they would find something written on the wood underneath. This was done; the message was revealed and read, and afterwards passed on to the other Greeks.

As a result of this warning, the hitherto defenceless Greeks began to arm themselves. Profits from the state-owned silver mines, which were usually shared among the citizens, were instead diverted to the navy for the construction of two hundred warships.

Xerxes had lost the vital element of surprise and, on 23 September 480 bc, when the Persian fleet approached the Bay of Salamis near Athens, the Greeks were prepared. Although Xerxes believed he had trapped the Greek navy, the Greeks were deliberately enticing the Persian ships to enter the bay. The Greeks knew that their ships, smaller and fewer in number, would have been destroyed in the open sea, but they realised that within the confines of the bay they might outmanoeuvre the Persians. As the wind changed direction the Persians found themselves being blown into the bay, forced into an engagement on Greek terms. The Persian princess Artemisia became surrounded on three sides and attempted to head back out to sea, only to ram one of her own ships. Panic ensued, more Persian ships collided and the Greeks launched a full-blooded onslaught. Within a day, the formidable forces of Persia had been humbled.

Demaratus' strategy for secret communication relied on simply hiding the message. Herodotus also recounted another incident in which concealment was sufficient to secure the safe passage of a message. He chronicled the story of Histaiaeus, who wanted to encourage Aristagoras of Miletus to revolt against the Persian king. To convey his instructions securely, Histaiaeus shaved the head of his messenger, wrote the message on his scalp, and then waited for the hair to regrow. This was clearly a period of history that tolerated a certain lack of urgency. The messenger, apparently carrying nothing contentious, could travel without being harassed. Upon arriving at his destination he then shaved his head and pointed it at the intended recipient.

Secret communication achieved by hiding the existence of a message is known as steganography, derived from the Greek words steganos, meaning 'covered', and graphein, meaning 'to write'. In the two thousand years since Herodotus, various forms of steganography have been used throughout the world. For example, the ancient Chinese wrote messages on fine silk, which was then scrunched into a tiny ball and covered in wax. The messenger would then swallow the ball of wax. In the fifteenth century, the Italian scientist Giovanni Porta described how to conceal a message within a hard-boiled egg by making an ink from a mixture of one ounce of alum and a pint of vinegar, and then using it to write on the shell. The solution penetrates the porous shell, and leaves a message on the surface of the hardened egg albumen, which can be read only when the shell is removed. Steganography also includes the practice of writing in invisible ink. As far back as the first century ad, Pliny the Elder explained how the 'milk' of the thithymallus plant could be used as an invisible ink. Although transparent after drying, gentle heating chars the ink and turns it brown. Many organic fluids behave in a similar way, because they are rich in carbon and therefore char easily. Indeed, it is not unknown for modern spies who have run out of standard-issue invisible ink to improvise by using their own urine.

The longevity of steganography illustrates that it certainly offers a modicum of security, but it suffers from a fundamental weakness. If the messenger is searched and the message is discovered, then the contents of the secret communication are revealed at once. Interception of the message immediately compromises all security. A thorough guard might routinely search any person crossing a border, scraping any wax tablets, heating blank sheets of paper, shelling boiled eggs, shaving people's heads, and so on, and inevitably there will be occasions when the message is uncovered.

Hence, in parallel with the development of steganography, there was the evolution of cryptography, derived from the Greek word kryptos, meaning 'hidden'. The aim of cryptography is not to hide the existence of a message, but rather to hide its meaning, a process known as encryption. To render a message unintelligible, it is scrambled according to a particular protocol which is agreed beforehand between the sender and the intended recipient. Thus the recipient can reverse the scrambling protocol and make the message comprehensible. The advantage of cryptography is that if the enemy intercepts an encrypted message, then the message is unreadable. Without knowing the scrambling protocol, the enemy should find it difficult, if not impossible, to recreate the original message from the encrypted text.

Although cryptography and steganography are independent, it is possible to both scramble and hide a message to maximise security. For example, the microdot is a form of steganography that became popular during the Second World War. German agents in Latin America would photographically shrink a page of text down to a dot less than 1 millimetre in diameter, and then hide this microdot on top of a full stop in an apparently innocuous letter. The first microdot to be spotted by the FBI was in 1941, following a tip-off that the Americans should look for a tiny gleam from the surface of a letter, indicative of smooth film. Thereafter, the Americans could read the contents of most intercepted microdots, except when the German agents had taken the extra precaution of scrambling their message before reducing it. In such cases of cryptography combined with steganography, the Americans were sometimes able to intercept and block communications, but they were prevented from gaining any new information about German spying activity. Of the two branches of secret communication, cryptography is the more powerful because of this ability to prevent information from falling into enemy hands.

In turn, cryptography itself can be divided into two branches, known as transposition and substitution. In transposition, the letters of the message are simply rearranged, effectively generating an anagram. For very short messages, such as a single word, this method is relatively insecure because there are only a limited number of ways of rearranging a handful of letters. For example, three letters can be arranged in only six different ways, e.g. cow, cwo, ocw, owc, wco, woc. However, as the number of letters gradually increases, the number of possible arrangements rapidly explodes, making it impossible to get back to the original message unless the exact scrambling process is known. For example, consider this short sentence. It contains just 35 letters, and yet there are more than 50,000,000,000,000,000,000,000,000,000,000 distinct arrangements of them. If one person could check one arrangement per second, and if all the people in the world worked night and day, it would still take more than a thousand times the lifetime of the universe to check all the arrangements.
Read More Show Less

Table of Contents

Chapter 1: The Cipher of Mary Queen of Scots
Chapter 2: Le Chiffre Indechiffrable
Chapter 3: The Mechanisation of Secrecy
Chapter 4: Cracking the Enigma
Chapter 5: The Language Barrier
Chapter 6: Alice and Bob Go Public
Chapter 7: Pretty Good Privacy
Chapter 8: A Quantum Leap into the Future
The Cipher Challenge
Further Reading
Read More Show Less

Customer Reviews

Average Rating 4.5
( 33 )
Rating Distribution

5 Star


4 Star


3 Star


2 Star


1 Star


Your Rating:

Your Name: Create a Pen Name or

Barnes & Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation


  • - By submitting a review, you grant to Barnes & and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Terms of Use.
  • - Barnes & reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously
See All Sort by: Showing 1 – 20 of 33 Customer Reviews
  • Posted November 12, 2009

    more from this reviewer

    How cipher-men won the wars and were generally awesome

    Quite a good job at making crypto accessible, with fascinating anecdotes on everything from lost civilizations to fainting frenchmen. And, as with Fermat's Last Theorem, Singh has a knack of bringing out the depth and color of the people and crises in espionage and modern tech.

    The book mostly follows wars, and is not shy to report the more gruesome fates befalling those who trusted their spy code tricks. The geniuses and the subterfuge they wreak are actually fun to follow and Singh gently explains how their magic actually worked.

    Criticisms: Some of the claims about perfect security in the last chapter seemed premature. The flow between some chapters is disjointed, but it's entertaining and covers a very broad subject in satisfying depth.

    My day job is modifying security software and it was very cool to read the story behind DH key exchange. DH was completely mind-blowing when I first understood it. Singh put me in the room as the college kids were discovering it. And that was thrilling to me.

    Almost every chapter in this book weaves a good story, connecting you to the protagonists and spectating over their epic battles of mind against mind. Singh has put a lot of time and research into this book and it shows admirably.

    I liked it.

    1 out of 1 people found this review helpful.

    Was this review helpful? Yes  No   Report this review
  • Anonymous

    Posted September 25, 2014


    I had always wondered how they did these things and the book was supremely informative. I am not a mathematician or a linguist but the methodology was explained so thoroughly and clearly that it was like reading a crime novel. Also, I had always been baffled about Linear B and had wondered if there was a Linear A (which there is). I would recommend the book to those that like to resolve crossword puzzles and that type of problems.

    Was this review helpful? Yes  No   Report this review
  • Anonymous

    Posted May 28, 2012

    Cool Book

    This book is pretty good and told me about a lot of fun encyrption codes.

    Was this review helpful? Yes  No   Report this review
  • Posted March 1, 2012

    highly Recommended

    If you are interested in cryptography definitely check it out even though you are not you'll find it quite interesting, it's well written and perfectly understandable, this book will give you a good insight on the subject from code makers to code breakers.

    Was this review helpful? Yes  No   Report this review
  • Anonymous

    Posted December 24, 2011

    Stories about code breaking.... nuff said.

    Interesting read, full of good info about code making and breaking history. Written in an entertaining way, it was hard to put down.

    Was this review helpful? Yes  No   Report this review
  • Anonymous

    Posted December 14, 2011

    Incredibly interesting

    Who would have thought a book about cryptography and cryptanalysis could be so interesting. Singh brings a fantastic historical perspective into the battle between code makers and code breakers. The unsung heroes of wars, the deciphering of ancient languages, and the breakthroughs in science and mathematics that make secure communications and electronic commerce possible are made approachable through Singh's great work in this book. A great historical look into the use of ciphers and how they were cracked. For the geek at heart... this one is for you.

    Was this review helpful? Yes  No   Report this review
  • Anonymous

    Posted October 11, 2011

    Highly Recommended

    Highly Recommended - Great Author

    Was this review helpful? Yes  No   Report this review
  • Posted April 16, 2011

    highly recommended

    Fascinating historical and mathematical progression in relation to "codes" and "codebreaking". I enjoyed how he tied in ancient languages. Overall, highly recommended.

    Was this review helpful? Yes  No   Report this review
  • Posted April 8, 2010

    more from this reviewer

    Excellent Cryptogrophy book

    This is an excellent overview of Cryptogrophy through the ages. It goes over the underlining princibles of cyphers by time period, then explains how the cyphers can be broken.

    Most of the informations seems to be between entry level and mid-level.

    Was this review helpful? Yes  No   Report this review
  • Anonymous

    Posted January 12, 2007

    Awesome, yet a little confusing.

    The book goes into great detail about the past, present, and future of codes and cryptography. When he talks about the actual process of the different machines and ways to make codes, it gets a little confusing. Great book though.

    Was this review helpful? Yes  No   Report this review
  • Anonymous

    Posted June 23, 2004

    Perfect place to start

    Excellent book, the author obviously has a strong understanding for the history. The explainations are simple to understand and provide a intresting detailed history. I would highly recomend this book to any one intrested in the subject. It is a great starting point to build from.

    Was this review helpful? Yes  No   Report this review
  • Anonymous

    Posted June 6, 2003

    Not a coffee table book

    I am a high school student and I have successfully learned cryptanalysis (a tool for deciphering secret messages), the history and downfall of the Enigma Machine, and even quantum encryption from simple examples such as the Beale Cipher and Alice, Bob, and Eve's key distribution problem from this excellent book. If you want to delve into a more advanced piece of literature than your childhood A=1 B=2 C=3 code book, then you should read this. This is not a coffee table book, although its class supercedes any ordinary one.

    Was this review helpful? Yes  No   Report this review
  • Anonymous

    Posted March 15, 2002

    Makes it all clear

    I enjoyed reading this book. It is informative and entertaining, and made difficult concepts easy to understand. For the first time I could know what is behind the public key, private key encription. The historical anecdotes are also delightful.

    Was this review helpful? Yes  No   Report this review
  • Anonymous

    Posted October 30, 2001

    I agree with the other reviews - can't put it down!

    I just echo what the other reviewers said. This isn't a math book, it is a history book. I read this after thoroughly enjoying 'Fermat's Enigma' by the same author.

    Was this review helpful? Yes  No   Report this review
  • Anonymous

    Posted January 14, 2001

    At last a book to make you think

    This book is one of those rare breeds: a non-fiction book that you just cannot put down. It is gripping to find your imagination piqued by the types of minds that tackle problems of this magnitude. References to enigma codebreaking by the allies in WW2 and the Navajo language used in the Pacific arena are no less mind-boggling than Mary Queen of Scots losing her head as her treason is uncovered form a coded letter. I loved this book. Well done, Simon Singh!

    Was this review helpful? Yes  No   Report this review
  • Anonymous

    Posted January 2, 2001

    Great Historical Perspective

    The Code Book is an enjoyable read that covers a fairly decent range of history regarding codes and cryptography. However, it is not all encompassing and does not cover all aspects of history or modern innovations. I found the history of Germany's Enigma and the efforts to defeat it quite detailed and very interesting.

    Was this review helpful? Yes  No   Report this review
  • Anonymous

    Posted February 24, 2001

    Great Book!

    This was a great book because it was not only educational and stimulating, but also was very easy to understand. It inspired a love for codemaking and breaking in me and I now have an unquenchable thirst for information about cryptography and cryptanal

    Was this review helpful? Yes  No   Report this review
  • Anonymous

    Posted December 20, 2000


    This book was amazing!!! I recently bought it for my uncle as a Christmas present, thinking he might enjoy it, but as I flipped through it, I realized I had to keep it for myself! I read the entire thing in 2 days. It is so intriguing and fascinating. There are even codes in the back you can break. I got the first one, and don't plan on stopping yet! This is a must have for anyone who has ever thought in passing, 'Codes are kinda cool' or anyone interested in a very intellectually stimulating book. It's great!

    Was this review helpful? Yes  No   Report this review
  • Anonymous

    Posted September 3, 2000

    Very Frank Look at our world and our data, thoughts and ideas

    I work with computers and sensitive data day in and day out. Having been a student of codes and ciphers as a youth, I was reminded sharply of the needs for protection of data in our modern world. My company's customers work with sensitive data that must be shared with their customers and regulatory and public agencies. After reading this book, I foresee a need for process and plant data to be protected by some sort of secure transaction layer.

    Was this review helpful? Yes  No   Report this review
  • Anonymous

    Posted July 17, 2011

    No text was provided for this review.

See All Sort by: Showing 1 – 20 of 33 Customer Reviews

If you find inappropriate content, please report it to Barnes & Noble
Why is this product inappropriate?
Comments (optional)