|
During the publication run of the Computer Supplement,
subscribers were provided with the following list of references.
CRYPTOGRAPHIC BIBLIOGRAPHY
Updated 2 Sep 89
Textbooks Which Include BASIC Programs:
Note: "CS" refers to ACA Computer Supplement.
|
Andreassen, Karl, CRYPTOLOGY AND THE PERSONAL COMPUTER
Aegean Park Press #47, 1986. 157pp.
ISBN 0 89412 144 8
(Beginners level). (Review in CS#4).
|
|
Andreassen, Karl, COMPUTER CRYPTOLOGY - Beyond Decoder Rings
Prentice-Hall, 1986, 243pp.
Introductory/intermediate. Includes many programs which
are also available on disk. (Review in CS#7).
|
|
Bennett, W.R, SCIENTIFIC & ENGINEERING PROBLEM SOLVING WITH THE COMPUTER
Prentice-Hall, 1976.
ISBN 0-13-795807-2
Intermediate. (Chap 4 is very strong on computer
analysis of language, Voynich, etc. Many refs.)
|
|
Bosworth, Bruce, CODES, CIPHERS AND COMPUTERS
Hayden Books, New Jersey,
#5149. 1982
(Elementary).
|
|
Deavours, C.A, CRYPTANALYTIC PROGRAMS FOR THE IBM PC.
Aegean Park Press
#29. 1987. 44p plus floppy disk.
Not available outside USA/Canada.
(Advanced).
|
|
Foster, Caxton, CRYPTANALYSIS FOR MICROCOMPUTERS
Hayden Books, New Jersey.
#5174 1983, 333 pages.
ISBN 0-8104-5174-3
(Pgms, tables, 10 refs). Intermediate. (Errata in
CS#5,6,9). Highly recommended for the solution of all ACA ciphers.
|
|
Lauer, Rudolph F, COMPUTER SIMULATION OF CLASSICAL SUBSTITUTION
CRYPTOGRAPHIC SYSTEMS
Aegean Park Press, PO Box 2837, Laguna Hills, CA
92654. C-32 1981, 111 pages.
ISBN 0-89412-050-6
(Pgms, ENIGMA, Hagelin, etc. 72 refs).
Intermediate. (Errata in CS#6,7).
|
|
Sassoon, George, THE RADIO HACKER'S CODE BOOK
Duckworth, 1986, 239pp.
ISBN 0 7156 2068 1
Intermediate. Very good on RSA ciphers, many programs and refs. (Review in
CS#2; Errata in CS#6).
|
|
Sinkov, Abraham, ELEMENTARY CRYPTANALYSIS - A Mathematical Approach
Mathematical Association of America, 1529 18th St NW, Washington DC 20036,
1980, 222 pages.
Intermediate/advanced. (3rd edition; earlier editions do
not include programs). (Errata in CS# 6).
|
Recent Articles Containing Ciphering/Deciphering Programs
Anderson, John M, DATA SECURITY FOR YOUR PERSONAL COMPUTER, Oncomputing,
Winter '80, pp63-66. (Transposition/substitution with 2 keywords).
Beidler, John. ON SOLVING ALPHAMETRICS, Creative Computing,
November/December 1978, pp 110-113. (Additive cryptarithm solving, FORTRAN
programs, 6 refs).
Block, David, BREAKING THE CODE, Creative Computing, March 1982, pp172-176.
(Transposition and Vigenere pgms, incl sol of ref Noah).
Block, David, CNHY VF QRNQ, Microcomputing, May 1984, pp86-91.
(Polyalphabetic solutions, incl sol of ref Prisco).
Demberger, James T, I HAVE A SECRET, 80 Micro, Oct 1982, pp296-302. (Vernam
pgm.).
Frey, Peter, MACHINE PROBLEM SOLVING PT II - Directed search using
cryptarithmetic, Byte, Oct 1980, pp266-272. (Additive Cryptarithmetic BASIC
program).
Hines, T et al, CIPHER VIA COMPUTER - THE ONE-TIME PAD, Byte, Sept 1983 p403.
(Random cipher).
Keefer, Bob, ANAGRAM SOLVING IN PASCAL, Byte, July 1986.
Lauer, Rudolph, WAILS FROM THE CRYPT, (Letter to Editor re ref Noah).
Creative Computing, July 1981, p12. (Solution for ref Noah).
Morgan, James P, CODE CRACKER, 80 Microcomputing, Aug 1980, pp110-115.
(Random Caesars).
Noah, C.W, PROTECT THOSE DATA FILES,
Creative Computing, March 1981, pp184-186. (Security and XOR substitutions. See refs Block and Lauer).
Prisco, R.F, THE BAZERIES CYLINDER - a Cryptographic Challenge, Byte, June
1983, pp353-360. (Bazeries program; see ref Block)
Ritchie, G., THE SECRET CODE MACHINE, Creative Computing, May 1983, pp166-
174. (Playfair).
Sclawy, Alan, CP/M ENCRYPTION PRESCRIPTION, Microcomputing, Nov 1980, pp42-
46. (Vernam with 3 keywords).
Wheeler D.D and Peeri E, BASIC CRYPTOGRAPHY: SBOEPN DJQIFST, Creative
Computing, May 1983, pp178-184. (Random ciphers for Atari, PC, TRS80 and
Apple).
The following articles discuss ciphers not normally within the range of
pencil-and-paper solution:
Block, David, THE TRAPDOOR ALGORITHM, Creative Computing, May 1983, pp189-
195. (A public key method. BASIC programs, no refs).
Burton, C.E, RSA: A PUBLIC KEY CRYPTOGRAPHY SYSTEM, PARTS 1 AND 2, Dr.
Dobb's Journal, March and April 1984.
Burton, C.E., AN ENHANCED ADFGVK CIPHER SYSTEM, Dr Dobb's Journal, February
1985, pp 48-70. (An alternative to public key encryption, programs in C
language, 4 refs).
de Laubenfels, J, FACTORING WITH S1, Byte, June 1985, p26. (Solution for
ref Smith).
Kirchavel, G.D, SUPERHYPER, Byte, July 1985. (Solution for ref Smith).
Kluepfel, Charles, IMPLEMENTING CRYPTOGRAPHIC ALGORITHMS ON MICROCOMPUTERS,
Byte, October 1984, p126. (Public key with up to 200-digit keys using
muMATH/muSIMP programs, 4 refs).
Leining, Richard B, FACTORING WITH HYPER, Byte, March 1985, pp396-402.
(Solution for ref Smith).
Reardon, George, SECRET CIPHERS, 80 Micro, March 1983, pp208-216. (Simple
public key system; TRS80 models 1-2-3-4).
Smith, John, PUBLIC KEY CRYPTOGRAPHY, Byte, Jan 1983, pp198-218. (Prime
number and encryption pgms. 5 refs). (See refs de Laubensfels, Kirchavel
and Leining).
(Note: Many of the above programs have been transcribed onto disks in
various formats. Contact the ACA for what is available).
Additional Reading
Dewdney, A.K, COMPUTER RECREATIONS (column), Scientific American, Oct 1988
p144; Nov 1988 p142; Feb 1989 p111 ("On Making And Breaking Codes"); June
1989 (text generation update).
Gass, Fred, SOLVING A JULES VERNE CRYPTOGRAM, Mathematics Magazine, Feb
1986. 9p 15 refs. (Gronsfeld solution).
Hawker,P, ELECTRONIC CRYPTOGRAPHY, Wireless World, Sept 1980, pp44-49.
(Security. 6 refs.).
Hodgart,M.S, A REVOLUTION IN CRYPTOGRAPHY - PRIVACY & AUTHENTICATION,
Communications Engineering, Nov-Dec 1979, pp32-39.
(Introductory/descriptive. 5 refs).
MacKinnon,N.R.F, THE DEVELOPMENT OF SPEECH ENCIPHERMENT, Radio and
Electronic Engineer, Vol 50 No 4, April 1980, pp147-155. (Scramblers. 16
refs).
Raab, Frederick, A CIPHERING TECHNIQUE, Creative Computing, April 1981, pp
116-124. (Product ciphers, shift register generators. 3 refs).
Stover, John, ORDERING VIA RECURSIVE ROUTINES, 80 Micro, June 1983, p300.
(BASIC permuting program).
Wasserman, Kenneth, POPPING AND PUSHING PERMUTATIONS IN BASIC,
Microcomputing, December 1981, pp50-51. (A BASIC permuting/anagramming
program).
Hayes, Brian, COMPUTER RECREATIONS (column), Scientific American, Nov 1983
p18.
Kenner, H and O'Rourke, J, A TRAVESTY GENERATOR FOR MICROS, Byte, Nov 1984,
p129. (Pascal pgms, 4 refs).
Wayner, Peter, BUILD A TRAVESTY TREE, Byte, Sept 1985, p183. (BASIC pgms).
Tankard, Jim, THE LITERARY DETECTIVE, Byte, Feb 1986, p231. (Apple pgms, 6
refs).
(The last four refs deal with computer generated text - the Monkey problem.
Updated programs and many other text analysis programs are available as
part of the 17-disk package "The Electronic Holmes Companion" $49.95 from
Psylogic Systems, PO BOX 315 , Tolland, CT 06084).
Magazines carrying regular computer/cipher articles:
"Cryptologia", Rose-Hulman Institute of Technology, Terre Haute, Indiana
47803. Publ quarterly, $28.00 p.a. ($36.00 outside USA). (Advanced).
"The Cryptogram", American Cryptogram Association, 18789 West Hickory St,
MUNDELEIN, IL 60060, USA. Publ bi-monthly, $15.00 p.a. (Intermediate).
"The ACA Computer Supplement" publ 3 times a year, $7.50 p.a, contains
computer oriented articles, software reviews, etc. Editor, 5052 Chestnut
Ave, Pierrefonds, Quebec, Canada H8Z 2A8.
"Cryptosystems" journal + floppy disk for IBMs and clones. $35 p.a from
Editor, 9755 Oatley Lane, BURKE, VA 22015, USA. (Advanced, non-ACA
ciphers).
Specialist Publisher
The Aegean Park Press, PO Box 2837, Laguna Hills, California 92654
publishes numerous books on cryptography. New titles are continually being
added, amongst which may be found computer material.
(bbs-bibliog)
| |