You are on page 1of 3

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/3330837

The code book: the science of secrecy from ancient egypt to quantum
cryptography [Book Review]

Article  in  IEEE Annals of the History of Computing · May 2002


DOI: 10.1109/MAHC.2002.1010078 · Source: IEEE Xplore

CITATIONS READS

3 2,832

1 author:

Virginia Franke Kleist


West Virginia University
22 PUBLICATIONS   133 CITATIONS   

SEE PROFILE

All content following this page was uploaded by Virginia Franke Kleist on 01 December 2015.

The user has requested enhancement of the downloaded file.


on his research, Hugill ably draws the reader Hugill tackled a significant and difficult his-
through the history of modern communications torical problem—that of determining the real
technology. Chapter two covers the broader impact of communications technology and
developments of global telegraphy, in particular information processing on military and national
submarine telegraph cables, prior to World War strategy in two world wars and throughout the
I. In chapter three, Hugill argues that the success 20th century. Laudable and impressive as his
of effective, reliable long-distance telephony in effort is, however, it suffers because there must
the US resulted from the political unity and size be further archival research and analysis of the
of the continent. In chapters four and five, Hugill topic by historians before the kinds of broad con-
covers the emergence of radio, first for wireless clusions Hugill draws can be formulated and sub-
telegraphy and then later for voice transmission. stantiated. Nevertheless, while his arguments
The subsequent two chapters are extended may appeal chiefly to geographers and propo-
discussions of the use of wireless communica- nents of a world systems theory, his examination
tions for command and control of military of the evolution and importance of communi-
forces in the 1914–1945 period. In chapter six, cations technology to world affairs is a useful
Hugill argues that the search for renewed mobil- contribution to this underexplored topic.
ity followed the failure of trench warfare by Jonathan Winkler
1915 and, on land, led to the adaptation of Yale University
existing wireless systems to aircraft, particularly jonathan.winkler@yale.edu
for use as artillery spotters. Chapter seven is an
impressive exploration of the origins of radar in Jonathan Winkler is a PhD candidate in US diplomat-
Britain’s pre-World War II commercial television ic and international history at Yale University. Recently
and shortwave wireless telegraphy industries. a Smithsonian Fellow at the National Museum of
The final chapter is a survey of the evolution American History, he is conducting research on his dis-
of communications technology since World War sertation, an examination of US foreign policy with
II, notably in the realm of satellites, interna- regard to international submarine telegraph cables and
tional phone cables, and fiber optic cables. Here radio circuits between 1900 and World War II.
he tries to explain how the rise of the US to glob-
al predominance stemmed mostly from its Simon Singh, The Code Book: The Science of
communications position. Hugill describes com- Secrecy From Ancient Egypt to Quantum
munications technology as the “key technology Cryptography, Doubleday, New York, 1999,
for hegemonic power in this period of the world $24.95, 402 pp., ISBN 0-385-49531-5.
economy,” (page 223) but tempers that with the Warfare, espionage, commerce, and affairs
proposition that in the future no single power of the heart create the need for secret commu-
will be able to control the cables and satellites nications. Singh traces the escalation in com-
the way that Britain and the US had in the past. plexity between encryption and unauthorized
Hugill’s work is expansive and one of the few decryption techniques over time.
attempts to explain this topic over such a broad From the simple ciphers of early times to the
sweep of history. However, he has relied chiefly on elegant computer-based algorithms used today,
secondary literature that now needs to be updat- most private communications techniques use
ed with archival research rather than a regurgita- “keys” to encrypt plaintext into ciphertext. As The
tion of memoirs and contemporary literature, and Code Book shows, some of the history of code
this has inhibited his analysis. For example, he crit- breaking parallels the history of early computing
icizes the US government decision in 1922 to leave devices. Singh begins with ancient codes, traces
short-wave bands for amateur work. Aside from the background of the Rosetta stone and Linear B
the fact that he attributes the decision to the (languages hidden from us but unraveled in much
Federal Communications Commission 12 years the same way as secretly encoded messages), and
before the FCC was created, it was not until 1924 carries the reader through a balanced treatment of
that Guglielmo Marconi’s own successful experi- secret codes used in World Wars I and II, finishing
ments (and those of the US Navy at the same time) up with coverage of newer codes such as RSA and
demonstrated the practical value of that end of the the Zimmerman Pretty Good Privacy (PGP) code.
spectrum, and both US and British firms rapidly The book includes the story of the Enigma
retooled to take advantage of that spectrum. At the machines and the British electromechanical
same time, he omits discussion of the significance “bombes,” precursors to the early computers that
of the 1927 Washington Radio Conference, where came out of World War II. Where most accounts
international adoption of the US system of fre- focus on the British role in deciphering German
quency allocation was a major step toward US pre- Enigma messages, Singh examines Rejewski’s
dominance in the global field. pre-war Polish mathematical and mechanical

April–June 2002 97
Reviews

contributions to the ultimately successful effort job of outlining the issues in developing digi-
in breaking the coding device’s grip on Europe. tal libraries, the technology involved, and the
Singh’s description of the wiring of the Enigma human issues that these new libraries present.
machine and the simplified schematic of how It begins with a discussion of the idea of the
the scrambling device works is reason enough to information infrastructure. It then presents
read the book. Even more fascinating is his dis- some of the new technology for libraries and
cussion of the popular Bletchley Park “bombes,” probes some of the reasons that these tech-
and Turing’s role in their design across the latter nologies might be difficult for some to use.
part of World War II. Finally, it ends with a vision for how librarians
Other contributions of this book are its should be thinking about the future. It is well
exposition of facts behind popular figures in written and researched and should be a valu-
the development of codes and codebreaking. able tool.
For example, although Babbage is well known For the moment, the book will probably be
for his design of the first tabulating computer, of most interest to those who are working with
his role in solving the fairly sophisticated community or secondary school libraries. For
Vigenere cipher is less well known. Another such individuals, the book is a welcome re-
point of interest is that the British developed a source, providing not only ideas for how to
version of the RSA coding long before develop a library but also to convince library
Americans, but this was kept secret by the boards and civic visitors of the benefits of the
English government for security reasons. new technologies. For the readers of this jour-
In summary, this book compares favorably nal, the greatest value of the book may come
with other books on cryptography, yet adds a 10 or 15 years hence, when we turn to it to see
new and vital perspective. how the Internet changed the nature of
Virginia Franke Kleist libraries.
West Virginia University David Alan Grier
vfkleist@mail.wvu.edu George Washington University
grier@gwu.edu
Virginia Franke Kleist is an assistant professor of
management of information systems at West Virginia
University, where she teaches courses on electronic Donald E. Knuth, Selected Papers on Analysis of
commerce and data communications, including Algorithms, CSLI Lecture Notes, no. 102,
material about the historical roots of today’s cryp- Center for the Study of Language and
tography and coding techniques. Innovation, Stanford Univ., Stanford, Calif.,
2000, $27.95, (paperback), ISBN 1-57586-
212-3, $74.95, (hardback), ISBN 1-57586-
Christine L. Borgman, From Gutenberg to the 211-5. This book is distributed by Cambridge
Global Information Infrastructure: Access to Univ. Press, Port Chester, N.Y.
Information in the Networked World, MIT This book, fourth in a series of eight
Press, Cambridge, Mass., 2000, 340 pp., planned volumes containing selected scientif-
ISBN 026202473X. ic papers of Donald E. Knuth, collects 34 of
The technology of libraries is changing so Knuth’s papers on analysis of algorithms. The
rapidly that it seems likely that this book will articles cover a wide range of topics, including
be read in very different ways as time progress- data structures, optimization, arithmetic, and
es. For the moment, it will be read as a descrip- complexity theory.
tion of the modern digital library, the sort of Knuth is well known for his contributions to
library currently available to the more sophis- computer science, which range from program-
ticated users of network resources. At a time, ming languages to the design of TeX and
not very long in the future, it will probably be Metafont, which, with various extensions, are
viewed as a quaint and slightly outmoded now de facto typesetting standards in many
vision, held by the librarians of the year 2000. areas of science. His series of textbooks have
Finally, historians will turn to the book as a par- served many people, including this reviewer, as
tial record of the way libraries evolved from their introduction to algorithmic design and
print and paper to screens and bits. analysis. Knuth had coined the term “analysis
The book is targeted at students of library of algorithms” in his invited address to the 1970
science, primarily those students who do not International Congress of Mathematicians in
have much experience with the tools of the Nice and views this area as his “life’s work.”
information age. The author, a professor of Most of the book’s papers present the trans-
Library Science at UCLA, has done an excellent lation of a problem into precise mathematical

98 IEEE Annals of the History of Computing

View publication stats

You might also like