Technical code of Julius Caesar through Champollion and hieroglyphics, the German Enigma code machine of the Nazis during the Second World War and more contemporary asymmetric encryption techniques are among others exposed with clarity. With the eternal race between data protection through encryption processes increasingly complex and ingenuity to decrypt the data from unauthorized third parties. Details of quantum cryptography are clear. Only prospects are perhaps not extensive enough for encryption experts and recent attacks against asymmetric encryption algorithms are not described.
This comprehensive book is a translation of "code book" written 10 years ago. Its principles remain more relevant than ever topical to the time where we would particularly protect Internet transactions including.