Annotated Cryptographic Resources And References
CLASSICAL CRYPTOGRAPHY COURSE
BY LANAKI
20 MARCH 1997
Revision 3
COPYRIGHT 1997
ALL RIGHTS RESERVED
ANNOTATED CRYPTOGRAPHIC RESOURCES
AND REFERENCES
-----------
Notes:
o Some cipher families are referenced as a group
(ex. [TRAN] for Transposition Ciphers:
Columnar, Incomplete Columnar, Tramp, Skipping
Tramp, etc.)
o The Cryptogram, is the bimonthly publication of
the American Cryptogram Association. These
references are both scholarly and cipher
specific. I have updated them through 1996.
They are available through the ACA Treasurer at
the address in the front of this book or Volume
I of my course.
o Cryptographic resources presented explore all
phases of involvement with cryptography:
cryptanalysis, history, legal, social,
classical, modern, NSA, mathematical
techniques, recreational, intelligence,
tactical, strategic, nuclear, National Defense,
INFOSEC: Offensive and Defensive, Hardware, and
Software. Enjoy.
o Public - Key Cryptography references have
additional annotations and may have some
overlap with reference [NIST90], Lecture 19 on
Law and Lectures 20 - 25 on modern issues
surrounding cryptography. These references
represent state-of the-art 1990 -1993.
o About 100 web links to cryptographic sources
have been added under the section Web Sources.
A wealth of information on all levels is
available.
o Pertinent cases involving cryptographic issues
are cited by primary court.
o Senate and House bills are referenced by year
and number, if appropriate.
----------
[3627] H. R. 3627, "A Bill to Amend the Export
Administration Act of 1979 with respect to the
control of computer and related equipment," 1993.
[ABRA] Abrams, F., 1993, Big Brother's Here and --Alas
-- We Embrace Him, New York Times Magazine, March
21, 1993, pp. 36-37.
[ABA ] American Bankers Association, 1979, Management
and Use of Personal Identification Numbers, ABA
Bank Card Statement, ABA, Catalog No. 207213,
1979.
[ACA] ACA and You, "Handbook For Members of the
American Cryptogram Association," ACA
publications, 1995.
[ACA1] Anonymous, "The ACA and You - Handbook For Secure
Communications", American Cryptogram Association,
1994.
[ACME] "ACME Complete Seven Figure Code", Acme Code Co.,
507 West 33 rd St., NYC, NY. No 6015, 1 January
1934.
[ACLU] Statement of the American Civil Liberties Union
in "Cryptographic Issue Statements Submitted to
the Computer System Security and Privacy Advisory
Board," by NIST, 27 May 1993, pp. 195-199.
[ACM] Association For Computing Machinery, "Codes, Keys
and Conflicts: Issues in U.S. Crypto Policy,"
Report of a Special Panel of ACM U. S. Public
Policy Committee (USACM), June 1994.
[AD79] L. Adleman, "A subexponential algorithm for the
discrete logarithm problem with applications to
Cryptography," in 20th Annual Symposium on
Foundations of Computer Science, San Juan, Puerto
Rico, October 29-31, 1979, pp. 55-60. Silver
Spring, MD: IEEE Computer Society Press, 1979.
[AD82] L. M. Adleman, "On breaking the iterated Merkle-
Hellman public-key cryptosystems," in D. Chaum,
R. L. Rivest, and A. T. Sherman, Eds., Advances
in Cryptology: proceedings of CRYPTO 82, a
Workshop on the Theory and Application of
Cryptographic Techniques, Santa Barbara, CA,
August 23-25, 1982,
pp. 303-308. New York: Plenum Press, 1983.
[AD86] L. M. Adleman and K. S. McCurley, "Open problems
in number theoretic complexity," in D. S.
Johnson, T. Nishizeki, A. Nozaki, and H. S.
Wilf, Eds., Discrete Algorithms and Complexity,
proceedings of the Japan-US Joint Seminar, Kyoto,
Japan, June 4- 6, 1986, pp. 237-262. Orlando, FL:
Academic Press, 1987.
[AD83] L. M. Adleman, C. Pomerance, and R. S. Rumely,
"On distinguishing prime numbers from composite
numbers," Annals of Mathematics, Vol. 117, 1983,
pp. 173-206.
[ADFG] ASTROLABE, "ADFGVX Cipher - The German Field
Cipher of 1918," AS53, The Cryptogram, American
Cryptogram Association, 1953.
[AFM] - 100-80, Traffic Analysis, Department of the Air
Force, 1946.
[AK83] S. G. Akl, "Digital signatures: a tutorial
survey," Computer, Vol. 16, No. 2, February 1983,
pp. 15-24.
[AK84] S. G. Akl and H. Meijer, "A fast pseudo random
permutation generator with applications to
cryptology," in G. R. Blakley and D. Chaum,
Eds., Lecture Notes in Computer Science Vol. 196:
Advances in Cryptology: Proceedings of CRYPTO 84,
a Workshop on the Theory and Application of
Cryptographic Techniques, Santa Barbara, CA,
August 19-22, 1984, pp. 269-275. Berlin/New
York: Springer- Verlag, 1985.
[ALAN] Turing, Alan, "The Enigma", by A. Hodges. Simon
and Schuster, 1983.
[ALBA] Alberti, "Treatise De Cifris," Meister
Papstlichen, Princeton University Press,
Princeton, N.J., 1963.
[ALEX] Alexander, D. A., "Secret codes and Decoding,"
Padell Book Co., New York, 1945.
[ALGE] MINIMAX, "Introduction To Algebraic
Cryptography," FM51, The Cryptogram, American
Cryptogram Association, 1951.
[ALKA] al-Kadi, Ibrahim A., Origins of Cryptology: The
Arab Contributions, Cryptologia, Vol XVI, No. 2,
April 1992, pp. 97-127.
[ALP1] PICCOLA, "Lining Up the Alphabets," AM37, The
Cryptogram, American Cryptogram Association,
1937.
[ALP2] PICCOLA, "Recovering a Primary Number Alphabet,"
JJ37, The Cryptogram, American Cryptogram
Association, 1937.
[ALP3] CLEAR SKIES, "Method For Recovering Alphabets,"
AM46, The Cryptogram, American Cryptogram
Association, 1946.
[ALP4] PICCOLA, "Lining Up the Alphabets," AM37, The
Cryptogram, American Cryptogram Association,
1937.
[ALP5] MACHIAVELLI,"Recovery of Incomplete Cipher
Alphabets," SO78, The Cryptogram, American
Cryptogram Association, 1978.
[ALP6] BOZO,"Recovery of Primary Alphabets I," JJ35, The
Cryptogram, American Cryptogram Association,
1935.
[ALP7] BOZO,"Recovery of Primary Alphabets II," AS35,
The Cryptogram, American Cryptogram Association,
1935.
[ALP8] ZYZZ,"Sinkov - Frequency-Matching," JA93, The
Cryptogram, American Cryptogram Association,
1993.
[AMS1] RED E RASER,"AMSCO," ON51, The Cryptogram,
American Cryptogram Association, 1951.
[AMS2] PHOENIX,"Computer Column: Amsco Encipherment,"
SO84, The Cryptogram, American Cryptogram
Association, 1984.
[AMS3] PHOENIX,"Computer Column: Amsco Decipherment,"
MA85, The Cryptogram, American Cryptogram
Association, 1985.
[AMS4] PHOENIX,"Computer Column: Amsco Decipherment,"
MJ85, The Cryptogram, American Cryptogram
Association, 1985.
[AMS5] PHOENIX,"Computer Column: Amsco Decipherment,"
JA85, The Cryptogram, American Cryptogram
Association, 1985.
[AMS6] GUNG HO,"Solving the Amsco," MJ92, The
Cryptogram, American Cryptogram Association,
1992.
[AN85] American National Standard X9.17-1985, Financial
Institution Key Management (Wholesale), American
Bankers Association, Washington, DC, 1985.
[AN87] M. Annaratone, E. Arnould, T. Gross, H. T. Kung,
M. Lam, O. Menzilcioglu, and J. A. Webb, "The
Warp computer: architecture, implementation and
performance," IEEE Transactions on Computers,
Vol. C-36, No. 12, December 1987, pp. 1523-1538.
[ANDE] D. Andelman, J. Reeds, On the cryptanalysis of
rotor and substitution-permutation networks. IEEE
Trans. on Inform. Theory, 28(4), 578--584, 1982.
[ANDR] Andrew, Christopher, "For The President's Eyes
Only," Harper Collins, New York, 1995.
[ANGL] D. Angluin, D. Lichtenstein, Provable Security in
Crypto-systems: a survey. Yale University,
Department of Computer Science, #288, 1983.
[AND1] Andree, Josephine, "Chips from the Math Log," Mu
Alpha Theta, 1966.
[AND2] Andree, Josephine, "More Chips from the Math
Log," Mu Alpha Theta, 1970.
[AND3] Andree, Josephine, "Lines from the O.U.
Mathematics Letter," Vols. I,II,III, Mu Alpha
Theta, 1971, 1971, 1971.
[AND4] Andree, Josephine and Richard V., "RAJA Books: a
Puzzle Potpourri," RAJA, 1976.
[AND5] Andree, Josephine and Richard V., "Preliminary
Instructors Manual for Solving Ciphers," Project
CRYPTO, Univ of Oklahoma, Norman, OK, 1977.
[AND6] Andree, Josephine and Richard V., "Teachers
Handbook For Problem Solving and Logical
Thinking," Project CRYPTO, Univ of Oklahoma,
Norman, OK, 1979.
[AND7] Andree, Josephine and Richard V., "Preliminary
Instructors Manual for Cryptarithms," Project
CRYPTO, Univ of Oklahoma, Norman, OK, 1976.
[AND8] Andree, Josephine and Richard V., "Sophisticated
Ciphers: Problem Solving and Logical Thinking,"
Project CRYPTO, Univ of Oklahoma, Norman, OK,
1978.
[AND9] Andree, Josephine and Richard V., "Logic Unlocs
Puzzles," Project CRYPTO, Univ of Oklahoma,
Norman, OK, 1979.
[ANDR] Andrew, Christopher, 'Secret Service', Heinemann,
London 1985.
[ANFI] "American National Standard for Financial
Institution Key Management (Wholesale)," ANSI
X9.17, Washington Publishing Company, P.O. Box
203, Chardon, OH 44024-0203, telephone (800) 334-
4912.
[ANK1] Andreassen, Karl, "Cryptology and the Personal
Computer, with Programming in Basic," Aegean Park
Press, 1986.
[ANK2] Andreassen, Karl, "Computer Cryptology, Beyond
Decoder Rings," Prentice-Hall 1988.
[ANNA] Anonymous., "The History of the International
Code.", Proceedings of the United States Naval
Institute, 1934.
[ANN1] Anonymous., " Speech and Facsimile Scrambling and
Decoding," Aegean Park Press, Laguna Hills, CA,
1981.
[AO93] Administrative Office of the United States
Courts, 1993, Report on Applications for Orders
Authorizing or Approving the Interception of
Wire, Oral, or Electronic Communications (Wiretap
Report) 1993.
[ARI1] OZ,"The Construction of Medium - Difficulty
Aristocrats," MA92, The Cryptogram, American
Cryptogram Association, 1992.
[ARI2] HELCRYPT,"Use of Consonant Sequences for
Aristocrats," ON51, The Cryptogram, American
Cryptogram Association, 1951.
[ARI3] HELCRYPT,"Use of Tri-Vowel Sequences for
Aristocrats," JJ52, The Cryptogram, American
Cryptogram Association, 1952.
[ARI4] AB STRUSE, "Equifrequency Crypts," JF74, The
Cryptogram, American Cryptogram Association,
1974.
[ARI5] HOMO SAPIENS,"End-letter Count for Aristocrats,"
FM45, The Cryptogram, American Cryptogram
Association, 1945.
[ARI6] S-Tuck, "Aristocrat Affixes," ON45, The
Cryptogram, American Cryptogram Association,
1945.
[ARNE] Arnell, A. (1990). "Handbook of Effective
Disaster Recovery Planning: A Seminar Workshop
Approach". McGraw-Hill (New York). ISBN 0-07-
002394-8. xxix + 333. Index.
[ASA ] "The Origin and Development of the Army Security
Agency 1917 -1947," Aegean Park Press, 1978.
Collections 190/37/7/1, Box 799, F: 2292, pp 468.
[ASA1] Army Security Agency (1948) Historical and
Cryptologic Summary of Cryptosystems; ASAG 23;
Vol 1.
[ASSA] Army Signal Security Agency (1946) History Of
Converter M-134-C (Sigaba) Vol I, II And III:
available from the US National Archives and
Records Administration (NARA); NSA Historical
[ASHT] Ashton, Christina, "Codes and Ciphers: Hundreds
of Unusual and Secret Ways to Send Messages,"
Betterway Books, 1988.
[ASIR] Anonymous, Enigma and Other Machines, Air
Scientific Institute Report, 1976.
[ATKI] Atkins, Derek, et. al., "Internet Security:
Professional Reference," New Riders,
Indianapolis, 1996.
[AUG1] D. A. August, "Cryptography and Exploitation of
Chinese Manual Cryptosystems - Part I:The
Encoding Problem", Cryptologia, Vol XIII, No. 4,
October 1989.
[AUG2] D. A. August, "Cryptography and Exploitation of
Chinese Manual Cryptosystems - Part II:The
Encrypting Problem", Cryptologia, Vol XIV, No. 1,
August 1990.
[AUT1] PICCOLA,"Autokey Encipherment,"DJ36, The
Cryptogram, American Cryptogram Association,
1936.
[AUT2] PICCOLA,"More about Autokeys,"FM37, The
Cryptogram, American Cryptogram Association,
1937.
[AUT3] ISKANDER,"Converting an Autokey to a Periodic,"
"JJ50, The Cryptogram, American Cryptogram
Association, 1950.
[AUT4] UBET,"Auto-Transposition Cipher," SO62, The
Cryptogram, American Cryptogram Association,
1962.
[AUT5] BARGE,"Decrypting the Auto-Transposition Cipher,"
ND63, The Cryptogram, American Cryptogram
Association, 1963.
[Ban ] Banisar, D., 1993, Statistical Analysis of
Electronic Surveillance, presentation at the
National Institute of Standards and Technology,
Computer System Security and Privacy Advisory
Board, June 3, 1993.
[BA82] S. K. Banerjee, "High speed implementation of
DES," Computers & Security, Vol. 1, No. 3,
November 1982, pp. 261-267.
[BA63] T. C. Bartee and D. I. Schneider, "Computation
with Finite Fields," Information and Control,
Vol. 6, 1963, pp. 79-98.
[BA80] K. E. Batcher, "Design of a massively parallel
processor," IEEE Transactions on Computers, Vol.
C-29, No. 9, September 1980, pp. 836-840.
[BAC1] SHMOO,"Quicker Baconian Solutions," ND80, The
Cryptogram, American Cryptogram Association,
1980.
[BAC2] XERXES,"Sir Francis Bacon Cipher," AS36, The
Cryptogram, American Cryptogram Association,
1936.
[BAC3] AB STRUSE,"Solving a Baconian," JJ48, The
Cryptogram, American Cryptogram Association,
1948.
[BAC4] B.NATURAL,"Tri-Bac Cipher," JA69, The Cryptogram,
American Cryptogram Association, 1969.
[BAC5] Anonymous, "Numerical Baconian," JF62, The
Cryptogram, American Cryptogram Association,
1962.
[BAC6] FIDDLE,"Extended Baconian," SO69, The Cryptogram,
American Cryptogram Association, 1969.
[BADE] Badeau, J. S. et. al., The Genius of Arab
Civilization: Source of Renaissance. Second
Edition. Cambridge: MIT Press. 1983.
[BAMF] Bamford, James, "The Puzzle Palace: A Report on
America's Most Secret Agency," Boston, Houghton
Mifflin, 1982.
[BANI] Banisar, Dave. CPSR Alert. 13 Jan.1994: n.p.
USENET: comp.society.privacy.
[BARL] Barlow, John Perry. "Bill O' Rights." Mondo
2000. January, 1994:17-19.
[BARB] Barber, F. J. W., "Archaeological Decipherment: A
Handbook," Princeton University Press, 1974.
[B201] Barker, Wayne G., "Cryptanalysis of The Simple
Substitution Cipher with Word Divisions," Course
#201, Aegean Park Press, Laguna Hills, CA. 1982.
[BALL] Ball, W. W. R., Mathematical Recreations and
Essays, London, 1928.
[BAR1] Barker, Wayne G., "Course No 201, Cryptanalysis
of The Simple Substitution Cipher with Word
Divisions," Aegean Park Press, Laguna Hills, CA.
1975.
[BAR2] Barker, W., ed., History of Codes and Ciphers in
the U.S. During the Period between World Wars,
Part II, 1930 - 1939., Aegean Park Press, 1990.
[BAR3] Barker, Wayne G., "Cryptanalysis of the Hagelin
Cryptograph, Aegean Park Press, 1977.
[BAR4] Barker, Wayne G., "Cryptanalysis of the
Enciphered Code Problem - Where Additive Method
of Encipherment Has Been Used," Aegean Park
Press, 1979.
[BAR5] Barker, W., ed., History of Codes and Ciphers in
the U.S. Prior To World War I," Aegean Park
Press, 1978.
[BAR6] Barker, W., " Cryptanalysis of Shift-Register
Generated Stream Cipher Systems," Aegean Park
Press, 1984.
[BAR7] Barker, W., ed., History of Codes and Ciphers in
the U.S. During the Period between World Wars,
Part I, 1919-1929, Aegean Park Press, 1979.
[BAR8] Barker, W., ed., History of Codes and Ciphers in
the U.S. During World War I, Aegean Park Press,
1979.
[BARK] Barker, Wayne G., "Cryptanalysis of The Simple
Substitution Cipher with Word Divisions," Aegean
Park Press, Laguna Hills, CA. 1973.
[BARK2] Barker, Wayne G., "Cryptanalysis of The Double
Transposition Cipher," Aegean Park Press, Laguna
Hills, CA. 1995.
[BARR] Barron, John, '"KGB: The Secret Work Of Soviet
Agents," Bantom Books, New York, 1981.
[BATE] Bates, R. J., Jr (1992). "Disaster Recovery
Planning: Networks, Telecommunications, and Data
Communications". McGraw-Hill (New York). ISBN 0-
07-004128-8. 156 + xv. Index, glossary.
[BAT1] Bates, R. J., Jr (1994). "Disaster Recovery for
LANs: A Planning and Action Guide". McGraw-Hill
(New York). ISBN 0-07-004194-6. x + 254.
Index.
[BAUD] Baudouin, Captain Roger, "Elements de
Cryptographie," Paris, 1939.
[BAZE] Bazeries, M. le Capitaine, " Cryptograph a 20
rondelles-alphabets," Compte rendu de la 20e
session de l' Association Francaise pour
l'Advancement des Scienses, Paris: Au secretariat
de l' Association, 1892.
[BAZ1] Bazeries, les chiffrees secrets devoiles, Paris,
1901.
[BAZ1] OZ,"Bazeries Cipher," MA59, The Cryptogram,
American Cryptogram Association, 1959.
[BAZ2] ALII KIONA,"Bazeries Cipher," F35, The
Cryptogram, American Cryptogram Association,
1935.
[BAZ3] ZANAC,"A Poker Player's Method to Solve Bazeries
Ciphers," JF82, The Cryptogram, American
Cryptogram Association, 1982.
[BAZ4] HI-FI,"Bazeries Ciphers Revisited," SO64, The
Cryptogram, American Cryptogram Association,
1964.
[BAZ5] MACHIAVELLI,"Bazeries Cipher - Dutch," ND71, The
Cryptogram, American Cryptogram Association,
1971.
[BAZ6] MACHIAVELLI,"Bazeries Cipher - English," JF71,
The Cryptogram, American Cryptogram Association,
1971.
[BAZ7] MACHIAVELLI,"Bazeries Cipher - French," JF71, The
Cryptogram, American Cryptogram Association,
1971.
[BAZ8] MACHIAVELLI,"Bazeries Cipher - German," MA71, The
Cryptogram, American Cryptogram Association,
1971.
[BAZ9] MACHIAVELLI,"Bazeries Cipher - Italian," JA71,
The Cryptogram, American Cryptogram Association,
1971.
[BAZA] MACHIAVELLI,"Bazeries Cipher - Portuguese," SO71,
The Cryptogram, American Cryptogram Association,
1971.
[BAZB] MACHIAVELLI,"Bazeries Cipher - Spanish," MJ71,
The Cryptogram, American Cryptogram Association,
1971.
[BAZC] MACHIAVELLI,"Bazeries Cipher - Unknown Language,"
MJ72, The Cryptogram, American Cryptogram
Association, 1972.
[BAZD] HANO,"Bazeries Cipher - Swedish," JA81, The
Cryptogram, American Cryptogram Association,
1981.
[BAZE] D. STRASSE,"Bazeries Cipher - Esperanto," SO74,
The Cryptogram, American Cryptogram Association,
1974.
[BAZ5] MACHIAVELLI, "Equivalents of 'e' in the Bazeries
Cipher" SO72, The Cryptogram, American Cryptogram
Association, 1972.
[BDKM] Brickell, E., Denning, D., Kent, S., Maher, D.
and Tuchman, W., 1993,``SKIPJACK Review: Interim
Report, The SKIPJACK Algorithm,'' July 28, 1993,
available electronically from cpsr.org.
[BEA1] S-TUCK, "Beaufort Auto-key," JJ46, The
Cryptogram, American Cryptogram Association,
1946.
[BEA2] PICCOLA, "Beaufort Ciphers," JJ36, The
Cryptogram, American Cryptogram Association,
1936.
[BEA3] LEDGE, "Beaufort Fundamentals (Novice Notes),"
ND71, The Cryptogram, American Cryptogram
Association, 1971.
[BEA4] SI SI, "Comparative Analysis of the Vigenere,
Beaufort and Variant Ciphers," JA80, The
Cryptogram, American Cryptogram Association,
1980.
[BEA5] O'PSHAW, "Porta, A special Case of Beaufort,"
MA91, The Cryptogram, American Cryptogram
Association, 1991.
[BECK] Becket, Henry, S. A., "The Dictionary of
Espionage: Spookspeak into English," Stein and
Day, 1986.
[BEKE] H. Beker, F. Piper, Cipher Systems. Wiley, 1982.
[BEES] Beesley, P., "Very Special Intelligence",
Doubleday, New York, 1977.
[BELL] Bell, E. T., Men of Mathematics, New York: Simon
and Shuster, 1937.
[BENN] Bennett, William, R. Jr., "Introduction to
Computer Applications for Non-Science Students,"
Prentice-Hall, 1976. (Interesting section on
monkeys and historical cryptography)
[BEN1] John Bennett, Analysis of the Encryption
Algorithm Used in the WordPerfect Word Processing
Program. Cryptologia 11(4), 206--210, 1987.
[BERG] H. A. Bergen and W. J. Caelli, File Security in
WordPerfect 5.0. Cryptologia 15(1), 57--66,
January 1991.
[BERN] Bernstein, T., A. B. Bhimani, E. Schultz, & C. A.
Siegel (1996). "Internet Security for Business".
John Wiley & Sons (New York). ISBN 0-471-13752-
9. xii + 452. Index.
[BERN] Berners-Lee, T. "Hypertext Markup Language
(HTML)", draft-ieft-iiir-html-01, June 1993.
(expired working draft)
[BERY] BERYL,"The Turning Grille," ND92, The Cryptogram,
American Cryptogram Association, 1992.
[BER1] BERYL,"The Diagrafid Cipher - Part II," ND93, The
Cryptogram, American Cryptogram Association,
1993.
[BETH] T. Beth, Algorithm engineering for public key
algorithms. IEEE Selected Areas of
Communication, 1(4), 458--466, 1990.
[BFS] Beth, T., Frisch, M. and Simmons, G. (Eds.),
1992, Public Key Cryptography: State of the Art
and Future Directions, Lecture Notes in Computer
Science, No. 578, Springer-Verlag, 1992.
[BIF1] ESP, "4-Square Method for C. M. Bifid," SO92, The
Cryptogram, American Cryptogram Association,
1992.
[BIF2] GALUPOLY, "6X6 Bifid," JA62, The Cryptogram,
American Cryptogram Association, 1962.
[BIF3] DR. CRYPTOGRAM, "Bifid and Trifid Cryptography,"
MJ59, The Cryptogram, American Cryptogram
Association, 1959.
[BIF4] TONTO, "Bifid Cipher," JJ45, The Cryptogram,
American Cryptogram Association, 1945.
[BIF5] GOTKY, "Bifid Cipher with Literal Indices Only,"
FM47, AM47, The Cryptogram, American Cryptogram
Association, 1947.
[BIF6] SAI CHESS, "Bifid-ian Timesaver," ON48, The
Cryptogram, American Cryptogram Association,
1948.
[BIF7] LABRONICUS, "Bifid Period by Pattern," ND89, The
Cryptogram, American Cryptogram Association,
1989.
[BIF8] TONTO, "Bifid recoveries," ON50, The Cryptogram,
American Cryptogram Association, 1950.
[BIF9] GIZMO, "Bifid Period Determination Using a
Digraphic Index of Coincidence," JF79, The
Cryptogram, American Cryptogram Association,
1979.
[BIFA] GALUPOLY, "Bifid with Conjugated Matrices," JF60,
The Cryptogram, American Cryptogram Association,
1960.
[BIFB] XAMAN EK, "Bifid Workshop, Part 1 - Encoding a
Bifid," MA93, The Cryptogram, American Cryptogram
Association, 1993.
[BIFC] XAMAN EK, "Bifid Workshop, Part 2 - Problem
Setup," MJ93, The Cryptogram, American Cryptogram
Association, 1993.
[BIFD] XAMAN EK, "Bifid Workshop, Part 3 - Tip
Placement," JA93, The Cryptogram, American
Cryptogram Association, 1993.
[BIFE] XAMAN EK, "Bifid Workshop, Part 4 - Solving a
Bifid," SO93, The Cryptogram, American Cryptogram
Association, 1993.
[BIFF] DUBIOUS and GALUPOLY, " Chi-Square Test for
Bifids," JA60, The Cryptogram, American
Cryptogram Association, 1960.
[BIFG] FIDDLE, "C. M. Bifid, Simplified Solution," MJ73,
The Cryptogram, American Cryptogram Association,
1973.
[BIFH] ZYZZ, "Conjugated Matrix Bifid, Modified Solving
Technique," SO92, The Cryptogram, American
Cryptogram Association, 1992.
[BIFI] X.GOTKY, "Delastelle Bifid Cipher," AS45, The
Cryptogram, American Cryptogram Association,
1945.
[BIFJ] D.MORGAN, "Finding the Period in a Bifid," JJ46,
The Cryptogram, American Cryptogram Association,
1946.
[BIFK] S-TUCK, "Finding the Period in a Bifid," AM46,
The Cryptogram, American Cryptogram Association,
1946.
[BIFL] S-TUCK, "Finding the Period in Bifids," ON44, The
Cryptogram, American Cryptogram Association,
1944.
[BIFM] ROGUE, "General Probabilities of Part Naturals in
Bifid, Trifid" JA70, The Cryptogram, American
Cryptogram Association, 1970.
[BIFN] B.NATURAL, "In Line Bifid Method," MA62, The
Cryptogram, American Cryptogram Association,
1962.
[BIFO] ABC, "Short Cut in a Bifid," SO61, The
Cryptogram, American Cryptogram Association,
1961.
[BIFP] ROGUE, "Specific Probabilities of Part Naturals
in Bifid, Trifid" SO70, The Cryptogram, American
Cryptogram Association, 1970.
[BIFQ] ROGUE, "Split Half Method For Finding A Period
of Bifid," MA71, The Cryptogram, American
Cryptogram Association, 1971.
[BIFR] ABC, "Twin Bifids - A Probable Word Method,"
JA62, The Cryptogram, American Cryptogram
Association, 1962.
[BIFS] GALUPOLY, "Twin Bifids," MJ60, JA60, The
Cryptogram, American Cryptogram Association,
1960.
[BIGR] PICCOLA, "Use of Bigram Tests" AS38, The
Cryptogram, American Cryptogram Association,
1938.
[BIGE] Bigelow, Robert P., Legal Issues in Computer
Security 1995 by Robert P. Bigelow.
[BIHS] E. Biham and A. Shamir, Differential
cryptanalysis of DES-like cryptosystems. Journal
of Cryptology, vol. 4, #1, 3--72, 1991.
[BiSh] Biham, E. and Shamir, A., 1993, Differential
Cryptanalysis of the Data Encryption Standard,
Springer-Verlag 1993.
[BISH] E. Biham, A. Shamir, Differential cryptanalysis
of Snefru, Khafre, REDOC-II, LOKI and LUCIFER. In
Proceedings of CRYPTO '91, ed. by J. Feigenbaum,
156--171, 1992.
[BL84] I. F. Blake, R. Fuji-Hara, R. C. Mullin, and S.
A. Vanstone, "Computing logarithms in finite
fields of characteristic two," SIAM Journal on
Algebraic and Discrete Methods, Vol. 5, No. 2,
June 1984, pp. 276-285.
[B84b] I. F. Blake, R. C. Mullin, and S. A. Vanstone,
"Computing logarithms in GF(2n)," in G. R.
Blakley and D. Chaum, Eds., Lecture Notes in
Computer Science Vol. 196: Advances in
Cryptology: Proceedings of CRYPTO 84, a Workshop
on the Theory and Application
of Cryptographic Techniques, Santa Barbara, CA,
August 19-22, 1984, pp. 73-82. Berlin/New York:
Springer-Verlag, 1985.
[BLAZ] Blaze, Matt. "Notes on key escrow meeting with
NSA." 2Feb. 1994. USENET: alt.privacy.clipper.
[BL83] G. R. Blakley, "A computer algorithm for
calculating the product AB modulo M," IEEE
Transactions on Computers, Vol. C-32, No. 5, May
1983, pp. 497-500.
[Blaz] Blaze, M., 1994, ``Protocol Failure in the
Escrowed Encryption Standard,'' May 31, 1994.
[Blum] Blum, H., 1993, Gangland: How the FBI Broke the
Mob, Simon & Schuster, New York 1993.
[BL84] M. Blum and S. Micali, "How to generate crypto-
graphically strong sequences of pseudo-random
bits," SIAM Journal on Computing, Vol. 13, No. 4,
November 1984, pp. 850-864.
[BLK] Blackstock, Paul W. and Frank L Schaf, Jr.,
"Intelligence, Espionage, Counterespionage and
Covert Operations," Gale Research Co., Detroit,
MI., 1978.
[BLOC] Bloch, Gilbert and Ralph Erskine, "Exploit the
Double Encipherment Flaw in Enigma", Cryptologia,
vol 10, #3, July 1986, p134 ff. (29)
[BLUE] Bearden, Bill, "The Bluejacket's Manual, 20th
ed., Annapolis: U.S. Naval Institute, 1978.
[BODY] Brown, Anthony - Cave, "Bodyguard of Lies",
Harper and Row, New York, 1975.
[BOLI] Bolinger, D. and Sears, D., "Aspects of
Language,"
3rd ed., Harcourt Brace Jovanovich,Inc., New
York, 1981.
[BOLO] Bologna, J. (1993). "Handbook on Corporate
Fraud: Prevention, Detection, Investigation".
Butterworth-Heinemann (Boston). ISBN 0-7506-
9243-X. xii + 308. Index.
[BORI] BORIQUA, " The Langosta Cipher," ND59, The
Cryptogram, American Cryptogram Association,
1959.
[BOSW] Bosworth, Bruce, "Codes, Ciphers and Computers:
An Introduction to Information Security," Hayden
Books, Rochelle Park, NJ, 1990.
[BOWE] Bowers, William Maxwell, "The Bifid Cipher,
Practical Cryptanalysis, II, ACA, 1960.
[BOW1] Bowers, William Maxwell, "The Trifid Cipher,"
Practical Cryptanalysis, III, ACA, 1961.
[BOW2] Bowers, William Maxwell, "The Digraphic
Substitution," Practical Cryptanalysis, I, ACA,
1960.
[BOW3] Bowers, William Maxwell, "Cryptographic ABC'S:
Substitution and Transposition Ciphers,"
Practical Cryptanalysis, IV, ACA, 1967.
[BOWN] Bowen, Russell J., "Scholar's Guide to
Intelligence Literature: Bibliography of the
Russell J. Bowen Collection," National
Intelligence Study Center, Frederick, MD, 1983.
[BO81] K. S. Booth, "Authentication of signatures using
public key encryption," Communications of the
ACM, Vol. 24, No. 11, November 1981, pp. 772-774.
[BOYA] J. Boyar, Inferring Sequences Produced by Pseudo-
Random Number Generators. Journal of the ACM,
1989.
[BP82] Beker, H., and Piper, F., " Cipher Systems, The
Protection of Communications", John Wiley and
Sons, NY, 1982.
[BR75] D. K. Branstad, "Encryption protection in
computer data communications," in Proceedings of
the 4th Data Communications Symposium, October 7-
9, 1975, pp. 8.1 -8.7. IEEE.
[BR79] G. Brassard, "A note on the complexity of
cryptography," IEEE Transactions on Information
Theory, Vol. IT-25, No. 2, March 1979, pp. 232-
233.
[B83a] G. Brassard, "Relativized cryptography," IEEE
Transactions on Information Theory, Vol. IT-29,
No. 6, November 1983, pp. 877- 894.
[BR88] G. Brassard, Lecture Notes in Computer Science
Vol. 325: Modern Cryptology: a Tutorial.
Berlin/New York: Springer-Verlag, 1988.
[BR83] R. P. Brent and H. T. Kung, "Systolic VLSI arrays
for linear-time GCD computation," in F. Anceau
and E. J. Aas, Eds., VLSI 83, proceedings of the
IFIP TC 10/WG 10.5 International Conference on
VLSI, Trondheim, Norway, August 16-19, 1983, pp.
145- 154. Amsterdam /New York: North-Holland,
1983.
[B83b] R. P. Brent, H. T. Kung, and F. T. Luk, "Some
linear-time algorithms for systolic arrays," in
R. E. A. Mason, Ed., IFIP Congress Series Vol.
9: Information Processing 83, proceedings of the
IFIP 9th World Congress, Paris, France, September
19-23, 1983, pp. 865-876. Amsterdam/New York:
North-Holland, 1983.
[BRIC] Brickell, E., et al., "SKIPJACK Review Interim
Report: The SKIPJACK Algorithm", 28 July 1993,
Posted on sci.crypt.
[Broa] Broad, W., 1992, ``Evading the Soviet Ear at Glen
Cove,'' Science, Vol. 217 (3), September, 1982,
pp 910-911.
[BR82] E. F. Brickell, "A fast modular multiplication
algorithm with application to two key
cryptography," in D. Chaum, R. L. rivest, and A.
T. Sherman, Eds., Advances in Cryptology:
proceedings of CRYPTO '82, a Workshop on the
Theory and Application of Cryptographic
Techniques, Santa Barbara, CA, August 23-25,
1982, pp. 51-60. New York: Plenum Press, 1983.
[B83c] E. F. Brickell, "Solving low density knapsacks,"
in D. Chaum, Ed., Advances in Cryptology:
proceedings of CRYPTO 83, a Workshop on the
Theory and Application of Cryptographic
Techniques, Santa Barbara, CA, August 22-24,
1983, pp. 25-37. New York: Plenum Press, 1984.
[BR84] E. F. Brickell, "Breaking iterated knapsacks," in
G. R. Blakley and D. Chaum, Eds., Lecture Notes
in Computer Science Vol. 196: Advances in
Cryptology: Proceedings of CRYPTO 84, a Workshop
on the Theory and Application of Cryptographic
Techniques, Santa Barbara, CA, August 19-22,
1984, pp. 342-358. Berlin /New York: Springer-
Verlag, 1985.
[BR89] E. F. Brickell, "A survey of hardware
implementations of RSA," in G. Brassard, Ed.,
Lecture Notes in Computer Science Vol. 435:
Advances in Cryptology -Proceedings of CRYPTO
'89, pp. 368- 370. Berlin/New York: Springer-
Verlag, 1990.
[BR88] E. F. Brickell and A. M. Odlyzko, "Cryptanalysis:
a survey of recent results," Proceedings of the
IEEE, Vol. 76, No. 5, May 1988, pp. 578-593.
[BR76] H. S. Bright and R. L. Enison, "Cryptography
using modular software elements," in S. Winkler,
Ed., AFIPS Conference Proceedings Vol. 45:
National Computer Conference, New York, NY, June
7-10, 1976, pp. 113-123. Montvale, NJ: AFIPS
Press, 1976.
[BRAG] G. Brassard, Modern Cryptology: a tutorial.
Spinger-Verlag, 1988.
[BRAS] Brasspounder, "Language Data - German," MA89, The
Cryptogram, American Cryptogram Association,
1989.
[BREN] Brennecke, J., "Die Wennde im U-Boote-
Krieg:Ursachen und Folgren 1939 - 1943," Herford,
Koehler, 1984.
[BRIK] E. Brickell, J. Moore, M. Purtill, Structure in
the S-boxes of DES. In Proceedings of CRYPTO '86,
A. M. Odlyzko ed., 3--8, 1987.
[BRIG] Brigman,Clarence S., "Edgar Allan Poe's
Contribution to Alexander's Weekly Messenger,"
Davis Press, 1943.
[BRIT] Anonymous, "British Army Manual of Cryptography",
HMF, 1914.
[BROG] Broglie, Duc de, Le Secret du roi: Correspondance
secrete de Louis XV avec ses agents diplomatiques
1752-1774, 3rd ed. Paris, Calmann Levy, 1879.
[BROO] Brook, Maxey, "150 Puzzles in Cryptarithmetic,"
Dover, 1963.
[BROP] L. Brown, J. P ieprzyk, J. Seberry, LOKI - a
cryptographic primitive for authentication and
secrecy applications. In Proceedings of AUSTCRYPT
90, 229--236, 1990.
[BROW] Brownell, George, A. "The Origin and Development
of the National Security Agency, Aegean Park
Press, 1981.
[BRO1] L. Brown, A proposed design for an extended DES,
Computer Security in the Computer Age. Elsevier
Science Publishers B.V. (North Holland), IFIP, W.
J. Caelli ed., 9--22, 1989.
[BRYA] Bryan, William G., "Practical Cryptanalysis -
Periodic Ciphers -Miscellaneous", Vol 5, American
Cryptogram Association, 1967.
[Bupc] Burrows, J. (Director, National Computer and
Telecommunications Laboratory, National Institute
of Standards and Technology), 1994, private
communication, March 11, 1994.
[BUGS] Anonymous, "Bugs and Electronic Surveillance,"
Desert Publications, 1976.
[BUON] Buonafalce, Augusto, "Giovan Battista Bellaso E
Le Sue Cifre Polialfabetiche," Milano, 1990
[BURL] Burling, R., "Man's Many Voices: Language in Its
Cultural Context," Holt, Rinehart & Winston, New
York, 1970.
[BWO] "Manual of Cryptography," British War Office,
Aegean Park Press, Laguna Hills, Ca. 1989.
reproduction 1914.
[Caba] Caba, S., 1994, ``FBI Nets Stanfa in Mob Sweep,''
Philadelphia Inquirer, March 18, 1994, Sec. A.
[CA87] T. R. Caron and R. D. Silverman, "Parallel
implementation of the quadratic scheme," Journal
of Supercomputing, Vol. 1, No. 3, 1987.
[CAD1] NIP N. BUD,"Cadenus - A Lesson in Practical
Cryptography," SO55, The Cryptogram, American
Cryptogram Association, 1955.
[CAD2] BERYL,"Cadenus Xenocrypt Note," SO91, The
Cryptogram, American Cryptogram Association,
1991.
[CAD3] PHOENIX,"Computer Column :Cadenus," SO89, The
Cryptogram, American Cryptogram Association,
1989.
[CAEL] H. Gustafson, E. Dawson, W. Caelli, Comparison
of block ciphers. In Proceedings of AUSCRYPT '90,
J. Seberry and J. Piepryzk eds., 208--220, 1990.
[CAMP] K. W. Campbell, M. J. Wiener, Proof the DES is
Not a Group. In Proceedings of CRYPTO '92, 1993.
[CAMN] Campen, A. D., D. H. Dearth, & R. T. Goodden,
eds. (1996). "Cyberwar: Security, Strategy, and
Conflict in the Information Age". AFCEA
International Press (Fairfax, VA). ISBN 0-
916159-26-4. vii + 296.
[CAND] Candela, Rosario, "Isomorphism and its
Application in Cryptanalytics, Cardanus Press,
NYC 1946.
[CARJ] John Carrol and Steve Martin, The Automated
Cryptanalysis of Substitution Ciphers.
Cryptologia 10(4), 193--209, 1986.
[CARL] John Carrol and Lynda Robbins, Automated
Cryptanalysis of Polyalphabetic Ciphers.
Cryptologia 11(4), 193--205, 1987.
[CAR1] Carlisle, Sheila. Pattern Words: Three to Eight
Letters in Length, Aegean Park Press, Laguna
Hills, CA 92654, 1986.
[CAR2] Carlisle, Sheila. Pattern Words: Nine Letters in
Length, Aegean Park Press, Laguna Hills, CA
92654, 1986.
[CASE] Casey, William, 'The Secret War Against Hitler',
Simon & Schuster, London 1989.
[CAVA] Cavazos, E. & G. Morin (1996). "Cyberspace and
the Law: Your Rights and Duties in the On-Line
World". MIT Press (Cambridge, MA). ISBN 0-262-
53123-2. 220 pp. Index.
[CCF] Foster, C. C., "Cryptanalysis for
Microcomputers", Hayden Books, Rochelle Park, NJ,
1990.
[CHAN] Chandler, J., D. Arrington, and L. Gill, "Issues
Regarding the Use of Cryptographic Technologies
in the Commercial Sector," George Washington
University, National Law Center, 1993.
[CHA1] Chandler, J., D. Arrington, and L. Gill,
"Foreign Encryption Technology Controls," George
Washington University, National Law Center, 1993.
[CHAP] Chapman, D. B. & E. D. Zwicky (1995). "Building
Internet Firewalls". O'Reilly & Associates
(Sebastopol, CA). ISBN 1-56592-124-0. xxvi +
517. Index.
[CHAU] Chaum, D., 'Achieving Electronic Privacy,'
Scientific American vol. 267, no. 2 (August
1992): 96-101.
[CHES] Cheswick, W. & S. Bellovin (1994). "Firewalls
and Internet Security: Repelling the Wily
Hacker". Addison Wesley (Reading, MA). ISBN 0-
201-63357-4. xiv + 306. Index.
[CHE1] ABAKUSAN, " A tip for Checkerboard Solution,"
AS40, The Cryptogram, American Cryptogram
Association, 1940.
[CHE2] X.GOTSKY, " On the Checkerboard, AS44,The
Cryptogram, American Cryptogram Association,
1944.
[CHE3] QUARTERNION, "Straddling Checkerboard, " MA76,
The Cryptogram, American Cryptogram Association,
1976.
[CHE4] PICCOLA, "The Checkerboard Alphabet, " DJ34, The
Cryptogram, American Cryptogram Association,
1934.
[CHE5] SI SI, "The Hocheck Cipher Examined, " JA90, The
Cryptogram, American Cryptogram Association,
1990.
[CHE5] SI SI, "The Checkerway Cipher Examined, " MJ90,
The Cryptogram, American Cryptogram Association,
1990.
[CHE6] GEMINATOR, "The Homophonic Checkerboard, " MA90,
The Cryptogram, American Cryptogram Association,
1990.
[CHE6] GEMINATOR, "The Checkerway Cipher, " JF90, The
Cryptogram, American Cryptogram Association,
1990.
[CHEC] CHECHEM,"On the Need for a Frequency Counter,"
AM48, The Cryptogram, American Cryptogram
Association, 1948.
[CHIP] "Chipping Away At Privacy?" Washington Post. 30
May, 1993 H1,H4. USENET: alt.security.clipper.
[CHOI] Interview with Grand Master Sin Il Choi.,9th DAN,
June 25, 1995.
[CHOM] Chomsky, Norm, "Syntactic Structures," The Hague:
Mouton, 1957.
[CROC] Crocker, S., 'Internet Privacy Enhanced Mail,'
The Third CPSR Cryptography and Privacy
Conference Source Book, 7 June 1993.
[CHUN] Chungkuo Ti-erh Lishih Tangankuan, ed "K'ang-Jih
chengmien chanch'ang," Chiangsu Kuchi
Ch'upansheh, 1987., pp. 993-1026.
[CCIT] CCITT, Draft Recommendation X.509: The Directory
-Authentication Framework. Gloucester, November
1987.
[CI] FM 34-60, Counterintelligence, Department of the
Army, February 1990.
[Cinq] Cinquegrana, A., 1989, ``The Walls (and Wires)
Have Ears: The Background and First Ten Years of
the Foreign Intelligence Surveillance Act of
1978,'' 137 University of Pennsylvania Law Review
793, 814-815 (1989).
[CO87] H. Cohen and A. K. Lenstra, "Implementation of a
new primality test," Mathematics of Computation,
Vol. 48, No. 177, January 1987, pp. 103-121.
[CO84] H. Cohen and H. W. Lenstra, Jr., "Primality
testing and Jacobi sums," Mathematics of
Computation, Vol. 42, No. 165, January 1984, pp.
297-330.
[CO80] Control Data Corporation, CDC CYBER 200 Model 205
Computer System. Minneapolis, MN, 1980.
[COP4] D. Coppersmith, "Fast evaluation of logarithms in
fields of characteristic two," IEEE Transactions
on Information Theory, Vol. IT-30, No. 4, July
1984, pp. 587-594.
[COP5] D. Coppersmith, "Another birthday attack," in H.
C. Williams, Ed., Lecture Notes in Computer
Science Vol. 218: Advances in Cryptology -
CRYPTO '85, proceedings of a Conference on the
Theory and Applications of Cryptographic
Techniques, Santa Barbara, CA, August 18-22,
1985, pp. 14-17. Berlin/New York: Springer-
Verlag, 1986.
[CO87] D. Coppersmith, "Cryptography," IBM Journal of
Research and Development, Vol. 31, No. 2, March
1987, pp. 244-248.
[CO86] D. Coppersmith, A. M. Odlyzko, and R. Schroeppel,
"Discrete logarithms in GF(p)," Algorithmica,
Vol. 1, No. 1, 1986, pp. 1-15.
[COBB] Cobb, S. T. (1995). "NCSA Guide to PC and LAN
Security". McGraw-Hill (New York). ISBN 0-07-
912168-3. xviii + 717. Index.
[CONS] S-TUCK and BAROKO, "Consonant-Line and Vowel-Line
Methods," MA92, The Cryptogram, American
Cryptogram Association, 1992.
[CONT] F.R.CARTER,"Chart Showing Normal Contact
Percentages," AM53, The Cryptogram, American
Cryptogram Association, 1953.
[CON1] S-TUCK."Table of Initial and Second-Letter
Contacts," DJ43, The Cryptogram, American
Cryptogram Association, 1943.
[COMM] Communications Security Establishment (1993).
"The Canadian Trusted Computer Product Evaluation
Criteria" Version 3.0e. Canadian System Security
Centre, CSE. Available from Criteria Coordinator
/ S5B InfoSec Standards and Evaluations /
Communications Security Establishment / P.O. Box
9703 Terminal / Ottawa K1G 3Z4. Tel. 613-991-
7331; fax 613-991-7323; e-mail
criteria@manitou.cse.dnd.ca
[COM1] Communications Security Establishment (1992).
"Trusted Systems Environment Guideline".
CID/09/17 (Ottawa). iii + 38.
[COUR] Courville, Joseph B., "Manual For Cryptanalysis
Of The Columnar Double Transposition Cipher, by
Courville Associates., South Gate, CA, 1986.
[CLAR] Clark, Ronald W., 'The Man who broke Purple',
Weidenfeld and Nicolson, London 1977.
[COLE] Collier, Jacot de Boinod et, "Marconi Master of
Space," 1935.
[COLF] Collins Gem Dictionary, "French," Collins Clear
Type Press, 1979.
[COLG] Collins Gem Dictionary, "German," Collins Clear
Type Press, 1984.
[COLI] Collins Gem Dictionary, "Italian," Collins Clear
Type Press, 1954.
[COLL] Collins Gem Dictionary, "Latin," Collins Clear
Type Press, 1980.
[COLP] Collins Gem Dictionary, "Portuguese," Collins
Clear Type Press, 1981.
[COLR] Collins Gem Dictionary, "Russian," Collins Clear
Type Press, 1958.
[COLS] Collins Gem Dictionary, "Spanish," Collins Clear
Type Press, 1980.
[COPP] Coppersmith, Don.,"IBM Journal of Research and
Development 38, 1994.
[CONJ] ZYZZ,"Conjugated Matrix Bifid: Modified Solving
Techniques," SO92, The Cryptogram, American
Cryptogram Association, 1992.
[COVT] Anonymous, "Covert Intelligence Techniques Of the
Soviet Union, Aegean Park Press, Laguna Hills,
Ca. 1980.
[CR80] Cray Research, Inc., Cray 1-S Series Hardware
Reference Manual. Mendota Heights, MN, June 1980.
[CR85] Cray Research, Inc., Cray X-MP Series of Computer
Systems. Mendota Heights, MN, August 1985.
[CREM] Cremer, Peter E.," U-Boat Commander: A Periscope
View of The Battle of The Atlantic," New York,
Berkley, 1986.
[CROC] Crocker, S., 'Internet Privacy Enhanced Mail,'
The Third CPSR Cryptography and Privacy
Conference Source Book, 7 June 1993.
[CRON] Cronin, D. J. (1986). "Microcomputer Data
Security: Issues and Strategies for Business".
Brady Books, Prentice-Hall (New York). ISBN 0-
89303-672-2. xvii + 281. Index.
[CROT] Winter, Jack, "Solving Cryptarithms," American
Cryptogram Association, 1984.
[CRO1] CROTALUS, "The Sidewinder Cipher," SO92, The
Cryptogram, American Cryptogram Association,
1992.
[CRYP] "Selected Cryptograms From PennyPress," Penny
Press, Inc., Norwalk, CO., 1985.
[CRY1] NYPHO'S ROBOT, "Cryptometry Simplified," DJ40,
FM41, AM41, The Cryptogram, published by the
American Cryptogram Association, 1940, 1941,
1941.
[CRY2] AB STRUSE, "Non-Ideomorphic Solutions," AM51, The
Cryptogram, published by the American Cryptogram
Association, 1951.
[CRY3] MINIMAX, "Problems in Cryptanalysis - A
Transposition that cannot be Anagrammed," MA60,
The Cryptogram, published by the American
Cryptogram Association, 1960.
[CRY4] FAUSTUS, "Science of Cryptanalysis," AS32, The
Cryptogram, published by the American Cryptogram
Association, 1932.
[CRY5] FAUSTUS, "Science of Cryptanalysis,The " JA91,
The Cryptogram, published by the American
Cryptogram Association, 1991.
[CRY6] BEAU NED, "Semi-Systems in Crypt-Cracking," FM36,
The Cryptogram, published by the American
Cryptogram Association, 1936.
[CRY7] Y.NOTT, "Systems Of Systems," ON35, The
Cryptogram, published by the American Cryptogram
Association, 1935.
[CULL] Cullen, Charles G., "Matrices and Linear
Transformations," 2nd Ed., Dover Advanced
Mathematics Books, NY, 1972.
[CUNE] CHECHACO, "The Decipherment of Cuneiform," JJ33,
The Cryptogram, published by the American
Cryptogram Association, 1933.
[DAGA] D'agapeyeff, Alexander, "Codes and Ciphers,"
Oxford University Press, London, 1974.
[DALT] Dalton, Leroy, "Topics for Math Clubs," National
Council of Teachers and Mu Alpha Theta, 1973.
[DAN] Daniel, Robert E., "Elementary Cryptanalysis:
Cryptography For Fun," Cryptiquotes, Seattle,
WA., 1979.
[DATA] Datapro, Inc., Datapro Report on Encryption
Devices, Delran, NJ, March 1993.
[DAVA] David, F. Games, Gods and Gambling, New York:
Haftner, 1962.
[DA83] D. W. Davies, "Applying the RSA digital signature
to electronic mail," Computer, Vol. 16, No. 2,
February 1983, pp. 55- 62.
[DA80] D. W. Davies and W. L. Price, "The application of
digital signatures based on public key
cryptosystems," NPL Report DNACS 39/80, National
Physics Laboratory, Teddington, Middlesex,
England, December 1980.
[DA83] J. A. Davis and D. B. Holdridge, "Factorization
using the quadratic sieve algorithm," in D.
Chaum, Ed., Advances in Cryptology: proceedings
of CRYPTO 83, a Workshop on the Theory and
Application of Cryptographic Techniques, Santa
Barbara, CA, August 22-24, 1983, pp. 103-113. New
York: Plenum Press, 1984.
[DA84] J. A. Davis, D. B. Holdridge, and G. J. Simmons,
"Status report on factoring," in T. Beth, N. Cot,
and I. Ingemarsson, Eds., Lecture Notes in
Computer Science Vol. 209: Advances in
Cryptology: Proceedings of EUROCRYPT 84, a
Workshop on the Theory and Application of
Cryptographic Techniques, Paris, France, April 9-
11, 1984, pp. 183-215. Berlin/New York: Springer-
Verlag, 1985.
[DAVE] Davies, D. W. & W. L. Price (1989). "Security for
Computer Networks: An Introduction to Data
Security in Teleprocessing and Electronic Funds
Transfer, 2nd edition". Wiley (New York). ISBN
0-471-92137-8. xx + 377. Index.
[DAVI] Da Vinci, "Solving Russian Cryptograms", The
Cryptogram, September-October, Vol XLII, No 5.
1976.
[DAVJ] M. Davio, J. Goethals, Elements of cryptology. in
Secure Digital Communications, G. Longo ed., 1--
57, 1983.
[DAWS] Dawson, Donald A., "Cryptanalysis of the Single
Rotor Cipher Machine," C-73, Aegean Park Press,
1996.
[DE83] R. DeMillo and M. Merritt, "Protocols for data
security," Computer, Vol. 16, No. 2, February
1983, pp. 39-51.
[DE79] D. E. Denning, "Secure personal computing in an
insecure network," Communications of the ACM,
Vol. 22, No. 8, August 1979, pp. 476-482.
[D83a] D. E. Denning, "Protecting public keys and
signature keys," Computer, Vol. 16, No. 2,
February 1983, pp. 27-35.
[DE81] D. E. Denning and G. M. Sacco, "Timestamps in key
distribution protocols," Communications of the
ACM, Vol. 24, No. 8, August 1981, pp. 533-536.
[DE83] D. E. R. Denning, Cryptography and Data Security.
Reading, MA: Addison-Wesley, 1983.
[DDKM] Delaney, D., Denning, D., Kaye, J. and McDonald,
A., 1993, ``Wiretap Laws and Procedures: What
Happens When the U.S. Government Taps A Line,''
Sept. 23, 1993, available electronically from
cpsr.org.
[Denn] Denning, D., 1994, ``Encryption and Law
Enforcement,'' Feb. 21, 1994, available
electronically from cpsr.org.
[DEN1] Denning, D., 'To tap or not to
tap?'Communications of the ACM, vol. 36, no. 3
(March 1993): 25-44.
[DGBB] Denning, D., Godwin, M., Bayse, W., Rotenberg,
M., Branscomb, L., Branscomb, A., Rivest, R.,
Grosso, A. and Marx, G., 1993, ``To Tap or Not
to Tap,'' Communications of the ACM, Vol. 36 (3),
March 1993 , pp. 24-44.
[DEAC] Deacon, R., "The Chinese Secret Service,"
Taplinger, New York, 1974.
[DEAU] Bacon, Sir Francis, "De Augmentis Scientiarum,"
tr. by Gilbert Watts, (1640) or tr. by Ellis,
Spedding, and Heath (1857,1870).
[DELA] Delastelle, F., Traite' Elementaire de
Cryptographie, Mathematiques appliquees,
gauthier-Villars, Paris, 1902.
[DEL1] Delastelle, F., Cryptographie nouvelle assurant
l'inviolabilite' absolue des correspondances
chiffrees Maire of Saint-Malo, P. Dubreuil,
Paris, 1893.
[DEL2] Delastelle, F., Cryptographie universelle, Paris,
1893.
[DENN] Denning, Dorothy Elizabeth Robling. "The Clipper
Chip Will Block Crime."Newsday:
USENET:alt.privacy.clipper.
[DENN] Denning, Dorothy E. R.," Cryptography and Data
Security," Reading: Addison Wesley, 1983.
[DERN] Dern, D. P. (1994). "The Internet Guide for New
Users". McGraw-Hill (New York). ISBN 0-07-
016511-4. xxvii + 570. Index.
[DESM] Desmedt, Y., Y. Frankel, and M. Yung, "A
Scientific Statement on the Clipper Chip
Technology and Alternatives," paper distributed
at the Clipper session of the 16th National
Computer Security Conference, 21 September 1993.
[DEVO] Deavours, Cipher A. and Louis Kruh, Machine
Cryptography and Modern Cryptanalysis, Artech,
New York, 1985.
[DEV1] Deavours, C. A., "Breakthrough '32: The Polish
Solution of the ENIGMA," Aegean Park Press,
Laguna Hills, CA, 1988.
[DEV2] Deavours, C. A. and Reeds, J.,"The ENIGMA,"
CRYPTOLOGIA, Vol I No 4, Oct. 1977.
[DEV3] Deavours, C. A.,"Analysis of the Herbern
Cryptograph using Isomorphs," CRYPTOLOGIA, Vol I
No 2, April, 1977.
[DEV4] Deavours, C. A., "Cryptographic Programs for the
IBM PC," Aegean Park Press, Laguna Hills, CA,
1989.
[DEVR] HOMO SAPIENS, "De Vries Cipher," SO60, The
Cryptogram, The American Cryptogram Association,
1960.
[DIG1] DENDAI, "Digrafid, A Footnote to Tip Placement,"
SO84, The Cryptogram, The American Cryptogram
Association, 1984.
[DIG2] B. NATURAL, "Digrafid, Cipher solution," MJ61,
The Cryptogram, The American Cryptogram
Association, 1961.
[DIG3] KNUTE, "Digrafid Cipher," SO60, The Cryptogram,
The American Cryptogram Association, 1960.
[DIG4] THE RAT, "The Buzzsaw, an Enhanced Digrafid,"
JA83, The Cryptogram, The American Cryptogram
Association, 1983.
[DIG5] BERYL, "Digrafid, Cipher," SO93, The Cryptogram,
The American Cryptogram Association, 1993.
[DI82] W. Diffie, "Conventional versus public key
cryptosystems," in G. J. Simmons, Ed., Secure
Communications and Asymmetric Cryptosystems, pp.
41-72. Boulder, CO: Westview Press, 1982.
[DI84] W. Diffie, "Network security problems and
approaches," Proceedings of the National
Electronics Conference, Vol. 38, 1984, pp. 292-
314.
[DI86] W. Diffie, "Communication security and national
security business, technology, and politics,"
Proceedings of the National Communications Forum,
Vol. 40, 1986, pp. 734-751.
[DI88] W. Diffie, "The first ten years of public-key
cryptography," Proceedings of the IEEE, Vol. 76,
No. 5, May 1988, pp. 560-577.
[DI76] W. Diffie and M. E. Hellman, "Multiuser
cryptographic techniques," in S. Winkler, Ed.,
AFIPS Conference Proceedings Vol. 45: National
Computer Conference, New York, NY, June 7-10,
1976, pp. 109-112. Montvale, NJ: AFIPS Press,
1976.
[D76b] W. Diffie and M. E. Hellman, "New directions in
cryptography," IEEE Transactions on Information
Theory, Vol. IT-22, No. 6, November 1976, pp.
644-654.
[DF87] W. Diffie, B. O'Higgins, L. Strawczynski, and D.
Steer, "An ISDN secure telephone unit,"
Proceedings of the National Communications Forum,
Vol. 41, No. 1, 1987, pp. 473-477.
[DI79] W. Diffie, M. Hellman, Privacy and
Authentication: An introduction to cryptography.
IEEE proceedings, 67(3), 397--427, 1979.
[Di78] Diffie, W., 1978, ``Data Security for EFT and
Automated Business,'' New Problems - New
Solutions, San Jose, California, SBS Publishing,
1978.
[Di82] Diffie, W., 1982, ``Cryptographic Technology:
Fifteen Year Forecast,'' in Gustavus J. Simmons,
Secure Communications and Asymmetric
Cryptosystems, AAAS Selected Symposium No. 69,
Westview Press, 1982.
[D83d] Y. Desmedt, J. Vandewalle, and R. J. M. Govaerts,
"A critical analysis of the security of knapsack
public key algorithms," IEEE Transactions on
Information Theory, Vol. IT-30, No. 4, July
1984, pp. 601-611.
[DOA1] Department of the Army (1945) Crypto-Operating
Instructions for Converter M-134-C (short title:
SIGQZF-2)
[DOA2] Department of the Army (1946) Crypto-Operating
Instructions for Converter M-134-C (short title:
SIGQZF-3)
[DOA3] Department of the Army (1949) ASAM 1/1 Crypto-
Operating Instructions for ASAM 1. Note the new
designation of ASAM 1 for the ECM Mark II after
the war.
[DoCB] Department of Commerce Briefing re Escrowed
Encryption Standard, 1994, Department of
Commerce, February, 4, 1994, Washington, DC.
[DoJB] Department of Justice Briefing re Escrowed
Encryption Standard, 1994, Department of
Commerce, February, 4, 1994,Washington, DC.
[DONI] Donitz, Karl, Memoirs: Ten Years and Twenty Days,
London: Weidenfeld and Nicolson, 1959.
[DOUB] TIBEX, " A Short Study in doubles ( Word
beginning or ending in double letters)," FM43,
The Cryptogram, published by the American
Cryptogram Association, 1943.
[DO81] J. D. Dixon, "Asymptotically fast factorization
of integers," Mathematics of Computation, Vol.
36, No. 153, January 1981, pp. 255-260.
[DO81] D. Dolev and A. C. Yao, "On the security of
public key protocols," in 22nd Annual Symposium
on Foundations of Computer Science, Nashville,
TN, October 28-30, 1981, pp. 350-357. Silver
Spring, MD: IEEE Computer Society Press, 1981.
[DOW] Dow, Don. L., "Crypto-Mania, Version 3.0", Box
1111, Nashua, NH. 03061-1111, (603) 880-6472,
Cost $15 for registered version and available as
shareware under CRYPTM.zip on CIS or zipnet.
[DOW1] Diffie, W., van Oorschot, P. and Wiener, M.,
1992, ``Authentication and Authenticated Key
Exchanges,'' in , Designs, Codes, and
Cryptography, Volume 2, Number 2, 1992, pp. 107--
125.
[DPSW] Digital Privacy and Security Working Group, white
paper on key escrow encryption technology, 30
September 1993.
[DU90] S. R. Dusse and B. S. Kaliski, Jr., "A
cryptographic library for the Motorola DSP
56000," presented at EUROCRYPT '90, Aarhuis,
DEnmark, May 21-24, 1990.
[EDUC] OZ, "Educational Cryptography," MA89, The
Cryptogram, The American Cryptogram Association,
1989.
[EELL] Eells, Richard, and P. Nehemkis, "Corporate
Intellegence and Espionage," Macmillian, London,
1984.
[EFF ] Electronic Frontier Foundation. EFF Announces Its
Official Policy onCryptography and Privacy.
N.p.: EFF, 8 Dec. 1993. ftp.eff.org file.
[EFF1] Electronic Frontier Foundation. General
Information About the Electronic Frontier
Foundation. N.p.: EFF, ftp.eff.org file.
[EFF2] Electronic Frontier Foundation. EFF Wan ts You
(to add your voice tothe crypto fight!) N.p.:
EFF, 7 Feb. 1994, USENET:alt.privacy.clipper.
[ERMA] Erman, M. David, et al. Computers, Ethics, and
Society. OxfordUniversity Press, 1990.
[EH78] W. F. Ehrsam, S. M. Matyas, C. H. Meyer, and W.
L. Tuchman, "A cryptographic key management
scheme for implementing the Data Encryption
Standard," IBM Systems Journal, Vol. 17, No. 2,
1978, pp. 106-125.
[EIIC] Ei'ichi Hirose, ",Finland ni okeru tsushin joho,"
in Showa gunji hiwa: Dodai kurabu koenshu, Vol 1,
Dodai kurabu koenshu henshu iinkai, ed., (Toyko:
Dodai keizai konwakai, 1987), pp 59-60.
[ELCY] Gaines, Helen Fouche, Cryptanalysis, Dover, New
York, 1956. [ A text that every serious player
should have!]
[ELLI] Carl M. Ellison, A Solution of the Hebern
Messages. Cryptologia, vol. XII, #3, 144-158,
Jul 1988.
[EL85] T. ElGamal, "A public key cryptosystem and a
signature scheme based on discrete logarithms,"
IEEE Transactions on Information Theory, Vol. IT-
31, No. 4, July 1985, pp. 469-472.
[E85b] T. ElGamal, "On computing logarithms over finite
fields," in H. C. Williams, Ed., Lecture Notes in
Computer Science Vol. 218: Advances in Cryptology
-CRYPTO '85, proceedings of a Conference on the
Theory and Applications of Cryptographic
Techniques, Santa Barbara, CA, August 18-22,
1985, pp. 396-402. Berlin/New York: Springer-
Verlag, 1986.
[ENIG] Tyner, Clarence E. Jr., and Randall K. Nichols,
"ENIGMA95 - A Simulation of Enhanced Enigma
Cipher Machine on A Standard Personal Computer,"
for publication, November, 1995.
[EPST] Epstein, Sam and Beryl, "The First Book of Codes
and Ciphers," Ambassador Books, Toronto, Canada,
1956.
[EQUI] THE OAK, "An Equi-Frequency Cipher System," JA55,
The Cryptogram, The American Cryptogram
Association, 1955.
[ERSK] Erskine, Ralph, "Naval Enigma: The Breaking of
Heimisch and Triton," Intelligence and National
Security 3, Jan. 1988.
[EVEN] S. Even, O. Goldreich, DES-like functions can
generate the alternating group. IEEE Trans. on
Inform. Theory, vol. 29, #6, 863--865, 19 83.
[EVES] Eve's H, Introduction to the History of
Mathematics, 4th ed., New York: holt, rinehart
and winston, 1964.
[EYRA] Eyraud, Charles, "Precis de Cryptographie
Moderne'" Paris, 1953.
[FARR] Farrow, R. (1991). "UNIX Systems Security: How
to Protect Your Data and Prevent Intruders".
Addison-Wesley (Reading, MA). ISBN 0-201-57030-
0. vii + 278. Index.
[F186] FIPS 186, "Digital Signature Standard (DSS)",
specifies a Digital Signature Algorithm
appropriate for applications requiring a digital
rather than a written signature.
[F185] FIPS 185, "Escrowed Encryption Standard (EES)",
specifies a voluntary technology available for
protecting telephone communications (e.g., voice,
fax, modem).
[F180] FIPS 180, "Secure Hash Standard (SHS)", specifies
a Secure Hash Algorithm (SHA) for use with the
Digital Signature Standard. Additionally, for
applications not requiring a digital signature,
the SHA is to be used whenever a secure hash
algorithm is required for federal applications.
[F462] FIPS 46-2, "Data Encryption Standard (DES)",
provides the technical specifications for the
DES.
[F113] FIPS 113, "Computer Data Authentication",
specifies a Data Authentication Algorithm, based
upon the DES, which may be used to detect
unauthorized modifications to data, both
intentional and accidental. The Message
Authentication Code as specified in ANSI X9.9 is
computed in the same manner as the Data
Authentication Code as specified in this
standard.
[F140] FIPS 140-1, "Security Requirements for
Cryptographic Modules", establishes the physical
and logical security requirements for the design
and manufacture of modules implementing NIST-
approved cryptographic algorithms.
[F171] FIPS 171, "Key Management Using ANSI X9.17",
adopts ANSI X9.17 and specifies a particular
selection of options for the automated
distribution of keying material by the federal
government using the protocols of ANSI X9.17.
[FE87] U. Feige, A. Fiat, and A. Shamir, "Zero knowledge
proofs of identity," in Proceedings of the
Nineteenth Annual ACM Symposium on Theory of
Computing, New York, NY, May 25-27, 1987, pp.
210- 217. New York: ACM, 1987.
[FEI1] H. Feistel, Cryptography and Computer Privacy.
Scientific American, 228(5), 15--23, 1973.
[FEI2] H. Feistel, H, W. Notz, J. Lynn Smith. Some
cryptographic techniques for machine-to-machine
data communications, IEEE proceedings, 63(11),
1545--1554, 1975.
[FISA] Foreign Intelligence Surveillance Act, 50 U.S.C.
Sec. 1801 , et seq.
[FI86] A. Fiat and A. Shamir, "How to prove yourself:
practical solutions to identification and
signature problems," in A. M. Odlyzko, Ed.,
Lecture Notes in Computer Science Vol. 263:
Advances in Cryptology -CRYPTO '86, proceedings
of a Conference on the
Theory and Applications of Cryptographic
Techniques, Santa Barbara, CA, August 11-15,
1986, pp. 186-194. Berlin/New York: Springer-
Verlag, 1987.
[FIBO] LOGONE BASETEN, "Use of Fibonacci Numbers in
Cryptography," JF69, The Cryptogram, published by
the American Cryptogram Association, 1969.
[FIDD] FIDDLE, (Frederick D. Lynch, Col.) "An Approach
to Cryptarithms," ACA Publications, 1964.
[FID1] FIDDLE, " The International Chess Cable Code,"
MJ55, The Cryptogram, American Cryptogram
Association, 1955.
[FING] HELCRYPT, "Cryptography in Fingerprinting," FM51,
The Cryptogram, published by the American
Cryptogram Association, 1951.
[FIRE] FIRE-O, "A Tool for Mathematicians:
Multiplicative Structures," The Cryptogram, Vol.
XXXVI, No 5, 1977.
[FISH] Fisher, R. P. (1984). "Information Systems
Security". Prentice-Hall (Englewood Cliffs, NJ).
ISBN 0-13-464727-0. viii + 240. Index.
[FL78] R. Flynn and A. S. Campasano, "Data dependent
keys for a selective encryption terminal," in S.
P. Ghosh and L. Y. Liu, Eds., AFIPS Conference
Proceedings Vol. 47: National Computer
Conference, Anaheim, CA, June 5-8, 1978, pp.
1127-1129. Montvale, NJ: AFIPS Press, 1978.
[FL] Anonymous, The Friedman Legacy: A Tribute to
William and Elizabeth Friedman, National Security
Agency, Central Security Service, Center for
Cryptological History,1995.
[FLI1] Flicke, W. F., "War Secrets in the Ether - Volume
I," Aegean Park Press, Laguna Hills, CA, 1977.
[FLIC] Flicke, W. F., "War Secrets in the Ether - Volume
II," Aegean Park Press, Laguna Hills, CA, 1977.
[FLIC] Flicke, W. F., "War Secrets in the Ether," Aegean
Park Press, Laguna Hills, CA, 1994.
[FM34] Field Manual 34-40-2 "Basic Cryptanalysis",
Department of Army, GPO 1990-729/952, 13
September, 1990. (Authored by ACA member Walt
Howe)
[FOOT] George FOOT,"An Introduction to Modern
Cryptography ," SO96, The Cryptogram, American
Cryptogram Association, 1996.
[FORE] DELAC, "Solving a Foreign Periodic by Lining Up
the Alphabets," JJ46, The Cryptogram, published
by the American Cryptogram Association, 1946.
[FOR1] VULPUS, "Four-Square Cipher," JA63, The
Cryptogram, The American Cryptogram Association,
1963.
[FOR2] FIDDLE, "Further Comments on Solution of Four-
Square Ciphers by Probable Word Method," FM50,
The Cryptogram, The American Cryptogram
Association, 1950.
[FOR3] GALUPOLY, "Numerical Four-Square Cipher," MA62,
MJ62, The Cryptogram, The American Cryptogram
Association, 1962.
[FOR4] SAI CHESS, "Sharpshooting the Four-Square
Cipher," AM49,JJ49, The Cryptogram, The
American Cryptogram Association, 1949.
[FOR5] B. NATURAL, "Solution of Type II-X Four-Square
Cipher," MJ62, The Cryptogram, The American
Cryptogram Association, 1962.
[FOR6] FIDDLE, "Solutionof Four-Square Ciphers by
Probable Word Method," DJ49, The Cryptogram, The
American Cryptogram Association, 1949.
[FORS] Forester, T. & P. Morrison (1990). "Computer
Ethics: Cautionary Tales and Ethical Dilemmas in
Computing". MIT Press (Cambridge, MA). ISBN 0-
262-06131-7. vi + 193. Index.
[FORT] Forester, T., ed. (1991). "Computers in the Human
Context: Information Technology, Productivity and
People". MIT Press (Cambridge, MA). ISBN 0-262-
56050-X. xii + 548. Index.
[FOWL] Fowler, Mark and Radhi Parekh, " Codes and
Ciphers, - Advanced Level," EDC Publishing, Tulsa
OK, 1994. (clever and work)
[FRAA] Friedman, William F. , "American Army Field Codes
in The American Expeditionary Forces During the
First World War, USA 1939.
[FRAB] Friedman, W. F., Field Codes used by the German
Army During World War. 1919.
[FRAN] Franks, Peter, "Calculator Ciphers," Information
Associates, Champaign, Il. 1980.
[FRA1] SI SI, "Analysis and Optimization of the
Fractionated Morse Cipher," ND81, The Cryptogram,
The American Cryptogram Association, 1981.
[FRA2] B. NATURAL, "Elementary Study of the Fractionated
Morse Cipher," AS51, The Cryptogram, The American
Cryptogram Association, 1951.
[FRA3] X.GOTKY, "Fractionated Morse Cipher," AM50, The
Cryptogram, The American Cryptogram Association,
1950.
[FRA4] CROTALUS, "Fractionated Morse Frequencies
Reissued," MA93, The Cryptogram, The American
Cryptogram Association, 1993.
[FRA5] RIG R. MORTIS, "Fractionated Morse Keyword
Recovery," MA60, The Cryptogram, The American
Cryptogram Association, 1960.
[FRA6] LAMONT CRANSTON, "Fractionated Morse Made Easy,"
JA92, The Cryptogram, The American Cryptogram
Association, 1992.
[FRA7] MOOJUB, "General Break For Fractionated Morse,"
AS51, The Cryptogram, The American Cryptogram
Association, 1951.
[FRA8] FIDDLE, "Periodic Fractionated Morse," AS54, The
Cryptogram, The American Cryptogram Association,
1954.
[FRAK] Franklin, Charles E. H., "Business Guide to
Privacy and Data Protection Legislation," ICC
Publishing, Kluwer Law International, The Hague,
1996.
[FRE] Friedman, William F. , "Elements of
Cryptanalysis," Aegean Park Press, Laguna Hills,
CA, 1976.
[FREA] Friedman, William F. , "Advanced Military
Cryptography," Aegean Park Press, Laguna Hills,
CA, 1976.
[FREB] Friedman, William F. , "Elementary Military
Cryptography," Aegean Park Press, Laguna Hills,
CA, 1976.
[FREC] Friedman, William F., "Cryptology," The
Encyclopedia Britannica, all editions since 1929.
A classic article by the greatest cryptanalyst.
[FRSG] Friedman, William F., "Solving German Codes in
World War I, " Aegean Park Press, Laguna Hills,
CA, 1977.
[FR1] Friedman, William F. and Callimahos, Lambros D.,
Military Cryptanalytics Part I - Volume 1, Aegean
Park Press, Laguna Hills, CA, 1985.
[FR2] Friedman, William F. and Callimahos, Lambros D.,
Military Cryptanalytics Part I - Volume 2, Aegean
Park Press, Laguna Hills, CA, 1985.
[FR3] Friedman, William F. and Callimahos, Lambros D.,
Military Cryptanalytics Part III, Aegean Park
Press, Laguna Hills, CA, 1995.
[FR4] Friedman, William F. and Callimahos, Lambros D.,
Military Cryptanalytics Part IV, Aegean Park
Press, Laguna Hills, CA, 1995.
[FR5] Friedman, William F. Military Cryptanalysis -
Part I, Aegean Park Press, Laguna Hills, CA,
1980.
[FR6] Friedman, William F. Military Cryptanalysis -
Part II, Aegean Park Press, Laguna Hills, CA,
1980.
[FR7] Friedman, William F. and Callimahos, Lambros D.,
Military Cryptanalytics Part II - Volume 1,
Aegean Park Press, Laguna Hills, CA, 1985.
[FR8] Friedman, William F. and Callimahos, Lambros D.,
Military Cryptanalytics Part II - Volume 2,
Aegean Park Press, Laguna Hills, CA, 1985.
[FR22] Friedman, William F., The Index of Coincidence
and Its Applications In Cryptography, Publication
22, The Riverbank Publications, Aegean Park
Press, Laguna Hills, CA, 1979.
[FRS6] Friedman, W. F., "Six Lectures On Cryptology,"
National Archives, SRH-004.
[FR8] Friedman, W. F., "Cryptography and Cryptanalysis
Articles," Aegean Park Press, Laguna Hills, CA,
1976.
[FR9] Friedman, W. F., "History of the Use of Codes,"
Aegean Park Press, Laguna Hills, CA, 1977.
[FRZM] Friedman, William F.,and Charles J. Mendelsohn,
"The Zimmerman Telegram of January 16, 1917 and
its Cryptographic Background," Aegean Park Press,
Laguna Hills, CA, 1976.
[Freh] Freeh, L., 1994, Written Statement before the
Subcommittee on Technology and the Law of the
Committee of the Judiciary, United States Senate
and the Subcommittee on Civil and Constitutional
Rights of the Committee on the Judiciary, House
of Representatives, March 18, 1994, Washington,
DC.
[FROM] Fromkin, V and Rodman, R., "Introduction to
Language," 4th ed.,Holt Reinhart & Winston, New
York, 1988.
[FRS] Friedman, William F. and Elizabeth S., "The
Shakespearean Ciphers Examined," Cambridge
University Press, London, 1957.
[FUMI] Fumio Nakamura, Rikugun ni okeru COMINT no hoga
to hatten," The Journal of National Defense, 16-1
(June 1988) pp85 - 87.
[GA79] M. R. Garey and D. S. Johnson, Computers and
Intractability. New York: W. H. Freeman, 1979.
[GALL] Gallery, S. M., ed. (1987). "Computer Security:
Readings from `Security Management' Magazine".
Butterworths (Boston). ISBN 0-409-90084-2. xvi
+ 301. Index.
[GAJ] Gaj, Krzysztof, "Szyfr Enigmy: Metody zlamania,"
Warsaw Wydawnictwa Komunikacji i Lacznosci, 1989.
[GAR1] Gardner, Martin, "536 Puzzles and Curious
Problems," Scribners, 1967.
[GAR2] Gardner, Martin, "Mathematics, Magic, and Mystery
," Dover, 1956.
[GAR3] Gardner, Martin, "New Mathematical Diversions
from Scientific American," Simon and Schuster,
1966.
[GAR4] Gardner, Martin, "Sixth Book of Mathematical
Games from Scientific American," Simon and
Schuster, 1971.
[GARL] Garlinski, Jozef, 'The Swiss Corridor', Dent,
London 1981.
[GAR1] Garlinski, Jozef, 'Hitler's Last Weapons',
Methuen, London 1978.
[GAR2] Garlinski, Jozef, 'The Enigma War', New York,
Scribner, 1979.
[GARF] Garfinkel, S. & G. Spafford (1991). "Practical
UNIX Security". O'Reilly & Assoc (Sebastopol,
CA). ISBN 0-937175-72-2. xxvii + 481. Index.
Available from the NCSA.
[GARO] G. Garon, R. Outerbridge, DES watch: an
examination of the sufficiency of the Data
Encryption Standard for financial institutions in
the 1990's. Cryptologia, vol. XV, #3, 177--193,
1991.
[GASS] Gasser, M. (1988). "Building a Secure Computer
System". Van Nostrand Reinhold (New York). ISBN
0-442-23022-2.
[GE] "Security," General Electric, Reference manual
Rev. B., 3503.01, Mark III Service, 1977.
[GERH] Gerhard, William D., "Attack on the U.S.,
Liberty," SRH-256, Aegean Park Press, 1981.
[GERM] "German Dictionary," Hippocrene Books, Inc., New
York, 1983.
[GI77] J. Gill, "Computational complexity of
probabilistic Turing machines," SIAM Journal on
Computing, Vol. 6, No. 4, December 1977, pp.
675-695.
[GILE] Giles, Herbert A., "Chinese Self-Taught," Padell
Book Co., New York, 1936?
[GIVI] Givierge, General Marcel, " Course In
Cryptography," Aegean Park Press, Laguna Hills,
CA, 1978. Also, M. Givierge, "Cours de
Cryptographie," Berger-Levrault, Paris, 1925.
[GLEN] Gleason, Norma, "Fun With Codes and Ciphers
Workbook," Dover, New York, 1988.
[GLE1] Gleason, Norma, "Cryptograms and Spygrams,"
Dover, New York, 1981.
[GLEA] Gleason, A. M., "Elementary Course in Probability
for the Cryptanalyst," Aegean Park Press, Laguna
Hills, CA, 1985.
[GLOV] Glover, D. Beaird, "Secret Ciphers of the 1876
Presidential Election," Aegean Park Press, Laguna
Hills, CA, 1991.
[GODD] Goddard, Eldridge and Thelma, "Cryptodyct,"
Marion, Iowa, 1976
[GOOD] I. J. Good, Good Thinking: the foundations of
probability and its applications. University of
Minnesota Press, 1983.
[GOOE] Goodell, J. (1996). "The Cyberthief and the
Samurai: The True Story of Kevin Mitnick--and the
Man Who Hunted Him Down". Dell (New York). ISBN
0-440-22205-2. xix + 328.
[GO84] S. Goldwasser and S. Micali, "Probabilistic
encryption," Journal of Computer and System
Sciences, Vol. 28, No. 2, April 1984, pp. 270-
299.
[GO89] S. Goldwasser, S. Micali, and C. Rackoff, "The
knowledge complexity of interactive proof
systems," SIAM Journal on Computing, Vol. 18, No.
1, February 1989, pp. 186-208.
[GO88] S. Goldwasser, S. Micali, and R. L. Rivest, "A
digital signature scheme secure against adaptive
chosen-message attacks," SIAM Journal on
Computing, Vol. 17, No. 2, April 1988, pp. 281-
308.
[G84b] J. Gordon, "Strong RSA keys," Electronics
Letters, Vol. 20, No. 12, June 7, 1984, pp. 514-
516.
[GO84] J. A. Gordon, "Strong primes are easy to find,"
in T. Beth, N. Cot, and I. Ingemarsson, Eds.,
Lecture Notes in Computer Science Vol. 209:
Advances in Cryptology: Proceedings of EUROCRYPT
84, a Workshop on the Theory and Application of
Cryptographic Techniques, Paris, France, April 9-
11, 1984, pp. 216-223.
Berlin/New York: Springer-Verlag, 1985.
[GR88] J. Grollman and A. L. Selman, "Complexity
measures for public-key cryptosystems," SIAM
Journal on Computing, Vol. 17, No. 2, April
1988, pp. 309-335.
[GORD] Gordon, Cyrus H., " Forgotten Scripts: Their
Ongoing Discovery and Decipherment," Basic
Books, New York, 1982.
[GORE] Gore, Al. Interview. By Lawrence J. Magid.
Microtimes 8 Feb. 1994:26-31.
[GOR1] Gore, Al. Remarks (as prepared). Royce Hall.
University of CaliforniaLos Angeles. 11 Jan.
1994. ftp.eff.org file.
[GOR2] Gore, Al. Statement of the Vice President. White
House: Office of the Vice President. 4, Feb.
1994. ftp.eff.org file .
[Gold] Goldman V. United States, 316 U.S. 129, 1942.
[GRA1] Grandpre: "Grandpre, A. de--Cryptologist. Part 1
'Cryptographie Pratique - The Origin of the
Grandpre', ISHCABIBEL, The Cryptogram, SO60,
American Cryptogram Association, 1960.
[GRA2] Grandpre: "Grandpre Ciphers", ROGUE, The
Cryptogram, SO63, American Cryptogram
Association, 1963.
[GRA3] Grandpre: "Grandpre", Novice Notes, LEDGE, The
Cryptogram, MJ75, American Cryptogram
Association,1975
[GRAH] Graham, L. A., "Ingenious Mathematical Problems
and Methods," Dover, 1959.
[GRAN] Grant, E. A., "Kids Book of Secret Codes, Signals
and Ciphers, Running Press, 1989.
[GRAP] DR. CRYPTOGRAM,"The Graphic Position Chart (On
Aristocrats)," JF59, The Cryptogram, American
Cryptogram Association, 1959.
[GREU] Greulich, Helmut, "Spion in der
Streichholzschachtel: Raffinierte Methoden der
Abhortechnik, Gutersloh: Bertelsmann, 1969.
[GRI1] ASAP,"An Aid For Grille Ciphers," SO93, The
Cryptogram, American Cryptogram Association,
1993.
[GRI2] DUN SCOTUS,"Binary Number Grille," JA60, The
Cryptogram, American Cryptogram Association,
1960.
[GRI3] S-TUCK,"Grille Solved By the Tableaux Method,"
DJ42, The Cryptogram, American Cryptogram
Association, 1942.
[GRI4] The SQUIRE,"More About Grilles," ON40,DJ40, The
Cryptogram, American Cryptogram Association,
1940, 1940.
[GRI5] OMAR,"Rotating Grille Cipher," FM41, The
Cryptogram, American Cryptogram Association,
1941.
[GRI6] S-TUCK,"Solving The Grille. A New Tableaux
Method," FM44, The Cryptogram, American
Cryptogram Association, 1944.
[GRI7] LABRONICUS,"Solving The Turning Grille," JF88,
The Cryptogram, American Cryptogram Association,
1988.
[GRI8] BERYL,"The Turning Grille," ND92, The Cryptogram,
American Cryptogram Association, 1992.
[GRI9] SHERLAC and S-TUCKP,"Triangular Grilles," ON45,
The Cryptogram, American Cryptogram Association,
1945.
[GRIA] SHERLAC,"Turning Grille," ON49, The Cryptogram,
American Cryptogram Association, 1949.
[GRIB] DUN SCOTUS,"Turning (by the numbers)," SO61, The
Cryptogram, American Cryptogram Association,
1961.
[GRIC] LEDGE,"Turning Grille (Novice Notes)," JA77, The
Cryptogram, American Cryptogram Association,
1977.
[GRO1] DENDAI, DICK," Analysis of Gromark Special,"ND74,
The Cryptogram, American Cryptogram Association,
1974.
[GRO2] BERYL," BERYL'S Pearls: Gromark Primers by hand
calculator," ND91, The Cryptogram, American
Cryptogram Association, 1991.
[GRO3] MARSHEN," Checking the Numerical Key,"JF70, The
Cryptogram, American Cryptogram Association,
1970.
[GRO4] PHOENIX," Computer Column: Gronsfeld -> Gromark,"
"MJ90, The Cryptogram, American Cryptogram
Association, 1990.
[GRO5] PHOENIX," Computer Column: Perodic Gromark," MJ90
The Cryptogram, American Cryptogram Association,
1990.
[GRO6] ROGUE," Cycles for Gromark Running Key," JF75,
The Cryptogram, American Cryptogram Association,
1975.
[GRO7] DUMBO," Gromark Cipher," MA69, JA69, The
Cryptogram, American Cryptogram Association,
1969.
[GRO8] DAN SURR," Gromark Club Solution," MA75, The
Cryptogram, American Cryptogram Association,
1975.
[GRO9] B.NATURAL," Keyword Recovery in Periodic
Gromark," SO73, The Cryptogram, American
Cryptogram Association, 1973.
[GROA] D.STRASSE," Method For Determining Term of Key,"
MA75, The Cryptogram, American Cryptogram
Association, 1975.
[GROB] CRUX," More On Gromark Keys," ND87, The
Cryptogram, American Cryptogram Association,
1987.
[GROC] DUMBO," Periodic Gromark ," MA73, The Cryptogram,
American Cryptogram Association, 1973.
[GROD] ROGUE," Periodic Gromark ," SO73, The Cryptogram,
American Cryptogram Association, 1973.
[GROE] ROGUE," Theoretical Frequencies in the Gromark,"
MA74, The Cryptogram, American Cryptogram
Association, 1974.
[GRON] R.L.H., "Condensed Analysis of a Gronsfeld,"
AM38, ON38,The Cryptogram, American Cryptogram
Association, 1938,1938.
[GRON] Groner, J., 'When it Comes to Software, U.S.
Sees Military Hardware; Concern over Spread of
Encryption Codes Hurts Exports,' The Connecticut
Law Tribune, 21 December 1992, p. 12.
[GROU] Groueff, Stephane, "Manhattan Project: The Untold
Story of the Making of the Atom Bomb," Little,
Brown and Company,1967.
[GRN1] CHARMER, "Gronsfeld," AS44, The Cryptogram,
American Cryptogram Association, 1944.
[GRN2] PICCOLA, "Gronsfeld Cipher," ON35, The
Cryptogram, American Cryptogram Association,
1935.
[GRN3] S-TUCK, "Gronsfeld Cipher," AS44, The Cryptogram,
American Cryptogram Association, 1944.
[GSA] General Services Administration, 1992, Offices of
Congressional Affairs, Memo of May 5, 1992, in ,
The Third CPSR Cryptography and Privacy
Conference Source Book, June 7, 1993, Washington,
DC.
[GUNG] GUNG HO, (Courville, J. B.), Manual for
Cryptanalysis of the Columnar Double Transp-
osition Cipher, South Gate, CA, 1986.
[GUST] Gustave, B., "Enigma:ou, la plus grande 'enigme
de la guerre 1939-1945." Paris:Plon, 1973.
[GYLD] Gylden, Yves, "The Contribution of the
Cryptographic Bureaus in the World War," Aegean
Park Press, 1978.
[GYL1] Gylden, Yves, "Chiffrebyraernas insatser i
varldskriget till lands," Stockholm, 1931.
[HA88] J. Hastad, "Solving simultaneous modular
equations of low degree," SIAM Journal on
Computing, Vol. 17, No. 2, April 1988, pp. 336-
341.
[HA87] S. Hawkinson, "The FPS T Series: a parallel
vector supercomputer," in W. J. Karplus, Ed.,
Multiprocessors and Array Processors, pp. 147-
155. San Diego: Simulation Councils Inc., 1987.
[HA86] J. P. Hayes, T. Mudge, Q. F. Stout, S. Colley,
and J. Palmer, "A microprocessor-based hypercube
supercomputer," IEEE Micro, Vol. 6, No. 5,
October 1986, pp. 6-17.
[HA88] M. E. Haykin and R. B. J. Warnar, "Smart card
technology: new methods for computer access
control," NIST Special Publication 500-157,
September 1988.
[HA] Hahn, Karl, " Frequency of Letters", English
Letter Usage Statistics using as a sample, "A
Tale of Two Cities" by Charles Dickens, Usenet
SCI.Crypt, 4 Aug 1994.
[HAFT] Haftner, Katie and John Markoff, "Cyberpunk,"
Touchstine, 1991.
[HAFN] Hafner, K. & J. Markoff (1991). "Cyberpunk:
Outlaws and Hackers on the Computer Frontier".
Touchstone Books, Simon & Schuster (New York).
ISBN 0-671-77879-X. 368. Index.
[HAGA] Hagamen,W. D. et. al., "Encoding Verbal
Information as Unique Numbers," IBM Systems
Journal, Vol 11, No. 4, 1972.
[HAGH] Hahn, H. & R. Stout (1995). "The Internet Yellow
Pages, Second Edition". Osborne McGraw-Hill
(Bereley, CA). ISBN 0-07-882098-7. xxxvi + 812.
Index.
[HARR] Harris, Zellig, "A Grammar of English on
Mathematical Principles," John Wiley, 1992.
[HASS] Hassig, L. & J. W. Shanks (1986), eds. "Computer
Security". One of the series, "Understanding
Computers". TIME-LIFE (541 North Fairbanks Court
/ Chicago, IL 60611). ISBN 0-8094-5670-2. 128
pp. Index.
[HAUG] Haugh, J. J., R. E. Burney, G. L. Dean & L. H.
Tisch (1992). "Toll Fraud and Telabuse: A
Multibillion Dollar National Problem".
Telecommunications Advisors Inc (Portland, OR).
ISBN 0-9632634-2-0. 399 + 431 pp.
[HAWA] Hitchcock, H. R., "Hawaiian," Charles E. Tuttle,
Co., Toyko, 1968.
[HAWC] Hawcock, David and MacAllister, Patrick, "Puzzle
Power! Multidimensional Codes, Illusions,
Numbers, and Brainteasers," Little, Brown and
Co., New York, 1994.
[HE81] P. S. Henry, "Fast decryption algorithm for the
knapsack cryptographic system," Bell System
Technical Journal, Vol. 60, No. 5, May-June
1981, pp. 767-773.
[HE64] I. N. Herstein, Topics in Algebra. Waltham:
Blaisdell, 1964.
[HEBR] COMET, "First Hebrew Book (of Cryptology)," JF72,
The Cryptogram, published by the American
Cryptogram Association, 1972.
[HELD] Gilbert, "Top Secret Data Encryption Techniques,"
Prentice Hall, 1993. (great title..limited use)
[HELL] M. Hellman, The mathematics of public key
cryptography. Scientific American, 130--139,
1979.
[HEMP] Hempfner, Philip and Tania, "Pattern Word List
For Divided and Undivided Cryptograms,"
unpublished manuscript, 1984.
[HEPP] Hepp, Leo, "Die Chiffriermaschine 'ENIGMA'", F-
Flagge, 1978.
[HEW] HEW Advisory Committee on Automated Personnel
Data Systems, Records, Computers and the Rights
of Citizens, 1973, Washington, DC.
[HI85] D. Hillis, The Connection Machine. Cambridge, MA:
MIT Press, 1985.
[HIDE] Hideo Kubota, " Zai-shi dai-go kokugun tokushu
joho senshi." unpublished manuscript, NIDS.
[HIER] ISHCABIBEL, "Hieroglyphics: Cryptology Started
Here, MA71, The Cryptogram, American Cryptogram
Association, 1971.
[HILL] Hill, Lester, S., "Cryptography in an Algebraic
Alphabet", The American Mathematical Monthly,
June-July 1929.
[HIL1] Hill, L. S. 1929. Cryptography in an Algebraic
Alphabet. American Mathematical Monthly. 36:306-
312.
[HIL2] Hill, L. S. 1931. Concerning the Linear
Transformation Apparatus in Cryptography.
American Mathematical Monthly. 38:135-154.
[HINS] Hinsley, F. H., "History of British Intelligence
in the Second World War", Cambridge University
Press, Cambridge, 1979-1988.
[HIN2] Hinsley, F. H. and Alan Strip in "Codebreakers -
Story of Bletchley Park", Oxford University
Press, 1994.
[HIN3] Hinsley, F. H., et. al., "British Intelligence in
The Second World War: Its Influence on Strategy
and Operations," London, HMSO vol I, 1979, vol II
1981, vol III, 1984 and 1988.
[HISA] Hisashi Takahashi, "Military Friction, Diplomatic
Suasion in China, 1937 - 1938," The Journal of
International Studies, Sophia Univ, Vol 19, July,
1987.
[HIS1] Barker, Wayne G., "History of Codes and Ciphers
in the U.S. Prior to World War I," Aegean Park
Press, Laguna Hills, CA, 1978.
[HITT] Hitt, Parker, Col. " Manual for the Solution of
Military Ciphers," Aegean Park Press, Laguna
Hills, CA, 1976.
[HO81] R. W. Hockney and C. R. Jesshope, Parallel
Computers: Architecture, Programming and
Algorithms. Bristol: Adam Hilger, 1981.
[HO78] E. Horowitz and S. Sahni, Fundamentals of
Computer Algorithms. Rockville: Computer Science
Press, 1978.
[HODG] Hodges, Andrew, "Alan Turing: The Enigma," New
York, Simon and Schuster, 1983.
[HOFF] Hoffman, Lance J., editor, "Building In Big
Brother: The Cryptographic Policy Debate,"
Springer-Verlag, N.Y.C., 1995. ( A useful and
well balanced book of cryptographic resource
materials. )
[HOF1] Hoffman, Lance. J., et. al.," Cryptography
Policy," Communications of the ACM 37, 1994, pp.
109-17.
[HOF3] Hoffman, L. J. (1990), ed. "Rogue Programs:
Viruses, Worms, and Trojan Horses". Van Nostrand
Reinhold (NY). ISBN 0-442-00454-0. xii+384.
Index.
[Hof4] Hoffman, L. J., 'Clipping Clipper,'
Communications of the ACM vol. 36, no. 9
(September 1993): 15-17.
[HOLM Holmes, W. J., "Double-Edged Secrets: U.S. Naval
Intelligence Operations in the Pacific During
WWII", Annapolis, MD: Naval Institute Press,
1979.
[HOM1] Homophonic: A Multiple Substitution Number
Cipher", S-TUCK, The Cryptogram, DJ45, American
Cryptogram Association, 1945.
[HOM2] Homophonic: Bilinear Substitution Cipher,
Straddling," ISHCABIBEL, The Cryptogram, AS48,
American Cryptogram Association, 1948.
[HOM3] Homophonic: Computer Column:"Homophonic Solving,"
PHOENIX, The Cryptogram, MA84, American
Cryptogram Association, 1984.
[HOM4] Homophonic: Hocheck Cipher,", SI SI, The
Cryptogram, JA90, American Cryptogram
Association, 1990.
[HOM5] Homophonic: "Homophonic Checkerboard," GEMINATOR,
The Cryptogram, MA90, American Cryptogram
Association, 1990.
[HOM6] Homophonic: "Homophonic Number Cipher," (Novice
Notes) LEDGE, The Cryptogram, SO71, American
Cryptogram Association, 1971.
[HUGH] Hughes, L. J., Jr (1995). "Actually Useful
Internet Security Techniques". New Riders
Publishing (Indianapolis, IN). ISBN 1-56205-508-
9. xv + 378. Index.
[HUNT] D. G. N. Hunter and A. R. McKenzie, Experiments
with Relaxation Algorithms for Breaking Simple
Substitution Ciphers. Computer Journal 26(1),
1983.
[HUTT] Hutt, A. E., S. Bosworth & D. B. Hoyt, editors
(1995). "Computer Security Handbook, Third
Edition". John Wiley & Son (New York). ISBN 0-
471-01907-0.
[HW84] K. Hwang and F. A. Briggs, Computer Architecture
and Parallel Processing. New York: McGraw-Hill,
1984.
[HYDE] H. Montgomery Hyde, "Room 3603, The Story of
British Intelligence Center in New York During
World War II", New York, Farrar, Straus, 1963.
[IAB-90] IAB Privacy and Security Research Group,
"Privacy enhancement for Internet electronic
mail: Part I: Message encipherment and
authentication procedures," RFC 1113B, December
18, 1990.
[IBM1] IBM Research Reports, Vol 7., No 4, IBM Research,
Yorktown Heights, N.Y., 1971.
[ICOV] Icove, D., K. Seger, W. VonStorch (1995).
"Computer Crime: A Crime Fighter's Handbook."
Eugene Spafford, editor. O'Reilly & Associates
(Sebastopol, CA). ISBN 1-56592-086-4.
[IC1 ] GIZMO, "Bifid Period Determination Using a
Digraphic Index of Coincidence, JF79, The
Cryptogram, American Cryptogram Association,
1979.
[IC2 ] PHOENIX, "Computer Column: Applications of the
Index of Coincidence, JA90, The Cryptogram,
American Cryptogram Association, 1990.
[IC3 ] PHOENIX, "Computer Column: Digraphic Index of
Coincidence, ND90, The Cryptogram, American
Cryptogram Association, 1990.
[IC4 ] PHOENIX, "Computer Column: Index of Coincidence
(IC), JA82, The Cryptogram, American Cryptogram
Association, 1982.
[IC5 ] PHOENIX, "Computer Column: Index of Coincidence,
(correction) MA83, The Cryptogram, American
Cryptogram Association, 1983.
[IFTS] Information Infrastructure Task Force, The
National Information Infrastructure: Agenda for
Action, Department of Commerce, 15 September
1993.
[IMPE] D'Imperio, M. E, " The Voynich Manuscript - An
Elegant Enigma," Aegean Park Press, Laguna Hills,
CA, 1976.
[INDE] PHOENIX, Index to the Cryptogram: 1932-1993, ACA,
1994.
[INDU] Industry Canada (1994). "Privacy and the
Canadian Information Highway". Available from
Distribution Services / Industry Canada / Room
208D, East Tower / 235 Queen Street / Ottawa K1A
0H5. Tel. 613-954-5716; fax 613-954-6436.
PW/GSC catalog #C2-229/1-1994. ISBN 0-662-61370-
8. SIT PU 0025-94-03.
[IRD ] International Resource Development, Data, Fax,
and Voice Encryption Equipment Worldwide, Report
#782 (December 1991), New Canaan, CT, pp. 267-
271.
[Irvi] Irvine v. California, 347 U.S. 128, 1954.
[ISO-87] International Organization for Standards, Draft
International Standard ISO/DIS 7498-2,
Information processing systems - Open Systems
Interconnection Model - Part 2: Security
Architecture, 1987.
[ITAL] Italian - English Dictionary, compiled by Vittore
E. Bocchetta, Fawcett Premier, New York, 1965.
[ITAR] International Traffic in Arms Regulation (ITAR),
22 CFR 120-130.
[JAPA] Martin, S.E., "Basic Japanese Conversation
Dictionary," Charles E. Tuttle Co., Toyko, 1981.
[JAPH] "Operational History of Japanese Naval
Communications, December 1941- August 1945,
Monograph by Japanese General Staff and War
Ministry, Aegean Park Press, 1985.
[JOH0] Johnson, Brian, 'The Secret War', Arrow Books,
London 1979.
[JOHN] Johnson, D.B., Matyas, S.M., Le, A.V., Wilkins,
J.D., "Design of the Commercial Data Masking
Facility Data Privacy Algorithm," Proceedings 1st
ACM Conference on Computer & Communications
Security, November 1993, Fairfax, VA., pp. 93-96.
[JU82] R. R. Jueneman, "Analysis of certain aspects of
output feedback mode," in D. Chaum, R. L. Rivest,
and A. T. Sherman, Eds., Advances in Cryptology
- proceedings of CRYPTO 82, a Workshop on the
Theory and Application of Cryptographic
Techniques, Santa Barbara, CA, August 23-25,
1982, pp. 99-127. New York: Plenum Press, 1983.
[JU86] R. R. Jueneman, "A high speed manipulation
detection code," in A. M. Odlyzko, Ed., Lecture
Notes in Computer Science Vol. 263: Advances in
Cryptology -CRYPTO '86, proceedings of a
Conference on Theory and Applications of
Cryptographic Techniques, Santa Barbara, CA,
August 11-15, 1986, pp. 327-346. Berlin/New
York: Springer-Verlag, 1987.
[KABA] Kabay, M. E. (1996). "The NCSA Guide to
Enterprise Security: Protecting Information
Assets". McGraw-Hill (New York). ISBN 0-07-
033147-2. 388 pp. Index.
[KALI] Kaliski, B. "The MD2 Message-Digest Algorithm",
RFC1319, April 1992
[KADI] al-Kadi, Ibrahim A., Cryptography and Data
Security: Cryptographic Properties of Arabic,
Proceedings of the Third Saudi Engineering
Conference. Riyadh, Saudi Arabia: Nov 24-27, Vol
2:910-921., 1991.
[KAHN] Kahn, David, "The Codebreakers", Macmillian
Publishing Co. , 1967.
[KAH1] Kahn, David, "Kahn On Codes - Secrets of the New
Cryptology," MacMillan Co., New York, 1983.
[KAH2] Kahn, David, "An Enigma Chronology", Cryptologia
Vol XVII,Number 3, July 1993.
[KAH3] Kahn, David, "Seizing The Enigma: The Race to
Break the German U-Boat Codes 1939-1943 ",
Houghton Mifflin, New York, 1991.
[KAMD] J. Kam, G. Davida, A structured design of
substitution-permutation encryption networks.
IEEE Trans. Information Theory, 28(10), 747--
753, 1978.
[KAPO] Kapor, Mitchell. Testimony. "Telecommunications
InfrastructureLegislation And Proposals."
Telecommunications And Finance HouseEnergy And
Commerce Commi ttee. Washington DC, 24Oct. 1991.
ftp.eff.org file.
[KARA] Karalekas, Anne, "History of the Central
Intelligence Agency," Aegean Park Press, Laguna
Hills, CA, 1977.
[KASI] Kasiski, Major F. W. , "Die Geheimschriften und
die Dechiffrir-kunst," Schriften der
Naturforschenden Gesellschaft in Danzig, 1872.
[KAS1] Bowers, M. W., {ZEMBIE} "Major F. W. Kasiski -
Cryptologist," The Cryptogram, XXXI, JF, 1964.
[KAS2] ----, "Kasiski Method," JF64,MA64, The
Cryptogram, American Cryptogram Association,
1964.
[KAS3] PICCOLA, "Kasiski Method for Periodics,"
JJ35,AS35, The Cryptogram, American Cryptogram
Association, 1935, 1935.
[KAS4] AB STRUSE, "Who was Kasiski?" SO76, The
Cryptogram, American Cryptogram Association,
1976.
[KATZ] Katzen, Harry, Jr., "Computer Data Security,"Van
Nostrand Reinhold, 1973.
[Katz] Katz v United States, 389 U.S. 347, 1967.
[KENN] Ellen Alderman and Carolyn Kennedy, The Right To
Privacy, Knopf Publishing, New York, 1995.
[KENT] Sherman Kent, "Strategic Intelligence for
American World Policy" Princetone University
Press, Princeton, NJ 1966.
[Kent] Kent, S., 1993, ``Internet Privacy Enhanced
Mail,'' Communications of the ACM, Vol. 36 (8),
pp. 48-59, August 1993.
[KERC] Kerckhoffs, "la Cryptographie Militaire, "
Journel des Sciences militaires, 9th series, IX,
(January and February, 1883, Libraire Militaire
de L. Baudoin &Co., Paris. English trans. by
Warren T, McCready of the University of Toronto,
1964
[KEY0] S-TUCK, " 5X5 Key Squares and How to Solve Them"
AS44, The Cryptogram, American Cryptogram
Association, 1944.
[KEY1] S-TUCK, " Mixed Squares...Columnar Takeout From
Keyword Block" DJ46, The Cryptogram, American
Cryptogram Association, 1946.
[KEY2] S-TUCK, " Recovery of a 5X5 Keyword Square" ON46,
The Cryptogram, American Cryptogram Association,
1946.
[KEY3] ARACHNE, " Square Dealing: The Polybius Square,
Part I- Introduction and History," JF93, The
Cryptogram, American Cryptogram Association,
1993.
[KEY4] ARACHNE, " Square Dealing: The Polybius Square,
Part II-Tri Square Application," MA93, The
Cryptogram, American Cryptogram Association,
1993.
[KEY5] ARACHNE, " Square Dealing: The Polybius Square,
Part III-Bifid Application," MJ93, The
Cryptogram, American Cryptogram Association,
1993.
[KEY6] ARACHNE, " Square Dealing: The Polybius Square,
Part IV-Reconstruction of Phillips Squares,"
JA93, The Cryptogram, American Cryptogram
Association, 1993.
[KH79] L. G. Khacian, "A polynomial algorithm in linear
programming," Dokl. Akad. Nauk. SSSR 244, pp.
1093-1096. English translation in Soviet Math.
Dokl. 20, pp. 191-194.
[Kinz] Kinzer, S., 1992, ``East Germans Face Their
Accusers,'' New York Times Magazine, April 12,
1992.
[KINN] P. Kinnucan, Data encryption gurus: Tuchman and
Meyer. Cryptologia, vol. II #4, 371--XXX, 1978.
[KING] King and Bahler, Probabilistic Relaxation in the
Cryptanalysis of Simple Substitution Ciphers.
Cryptologia 16(3), 215--225, 1992.
[KINB] King and Bahler, An Algorithmic Solution of
Sequential Homophonic Ciphers. Cryptologia 17(2),
in press.
[KL79] C. S. Kline and G. J. Popek, "Public key vs.
conventional key encryption," in R. E. Merwin,
Ed., AFIPS Conference Proceedings Vol. 48:
National Computer Conference, June 4-7, 1979, New
York, NY, pp. 831-837. Montvale, NJ: AFIPS
Press, 1979.
[KN81] D. E. Knuth, The Art of Computer Programming,
Vol. 2: Seminumerical Algorithms. Reading, MA:
Addison-Wesley, 1981.
[K78b] L. M. Kohnfelder, "On the signature reblocking
problem in public-key cryptosystems,"
Communications of the ACM, Vol. 21, No. 2,
February 1978, p. 179.
[KP1 ] PICCOLA, "The Key Phrase Cipher," ON37, The
Cryptogram, American Cryptogram Association,
1937.
[KP2 ] S-TUCK, "The Key Phrase Cipher," ON43, The
Cryptogram, American Cryptogram Association,
1943.
[KP3 ] LEDGE, "The Key Phrase Cipher," JF75, The
Cryptogram, American Cryptogram Association,
1975. [Novice Notes]
[KP4 ] TRIODE, "Thought on the The Key Phrase Cipher,"
JF69, The Cryptogram, American Cryptogram
Association, 1969.
[KP5 ] DE SAURAIS, "Stamp out Cockneyed Key Phrase
Cipher," JA69, The Cryptogram, American
Cryptogram Association, 1969.
[KNUT] D. E. Knuth, The Art of Computer Programming,
volume 2: Seminumerical Algorithms. Addison-
Wesley, 1981.
[KOBI] Kobayashi et T. Ochiai, "Meromorphic mappings
into compact complex spaces of general type,"
Invent. Math. 31 (1975), 7-16.
[KOBL] Koblitz, Neal, " A Course in Number Theory and
Cryptography, 2nd Ed, Springer-Verlag, New York,
1994.
[KOCH] Martin Kochanski, A Survey of Data Insecurity
Packages. Cryptologia 11(1), 1--15, 1987.
[KOCM] Martin Kochanski, Another Data Insecurity
Package. Cryptologia 12(3), 165--177, 1988.
[KOHL] Kohls, D., and Lance J. Hoffman, "TurboTrade: A
National Information Infrastructure
Cost/Risk/Benefit Model," Report GWU-IIST-93-17,
Department of Electrical Engineering and Computer
Science, The George Washington University,
Washington, D. C., September 1993.
[KOHL] Kohl, J., and Neuman, C., "The Kerberos
Authentication Service (V5)", RFC1510, September
1993.
[KONH] Konheim, Alan G., "Cryptography -A Primer" , John
Wiley, 1981, pp 212 ff.
[KORD] Kordemsky, B., "The Moscow Puzzles," Schribners,
1972.
[KOTT] Kottack, Phillip Conrad, "Anthropology: The
Exploration Of Human Diversity," 6th ed., McGraw-
Hill, Inc., New York, N.Y. 1994.
[KOZA] Kozaczuk, Dr. Wladyslaw, "Enigma: How the German
Machine Cipher was Broken and How it Was Read by
the Allies in WWI", University Pub, 1984.
[KOZC] W. Kozaczuk, Enigma. University Publications of
America, 1984 ov, Elementary Cryptanalysis.
Math. Assoc. Am. 1966.
[KO78] L. M. Kohnfelder, "A method for certification,"
MIT Laboratory for Computer Science, Cambridge,
MA, May 1978.
[KO81] A. G. Konheim, Cryptography: a Primer. New York:
John Wiley & Sons, 1981.
[KO85] J. Kowalik, Ed., Parallel MIMD Computation: the
HEP supercomputer and its Applications.
Cambridge, MA: MIT Press, 1985.
[Krav] Kravitz, D., Digital Signature Algorithm, U.S.
Patent Number 5231668, applied for July 26, 1991,
received July 27, 1993.
[KR86] E. Kranakis, Primality and Cryptography.
Chichester/New York: John Wiley & Sons, 1986.
[KRAI] Kraitchek, "Mathematical Recreations," Norton,
1942, and Dover, 1963.
[KROL] Krol, E. (1992). "The Whole Internet User's
Guide & Catalog". O'Reilly & Associates
(Sebastopol, CA). ISBN 1-56592-025-2. xxiv +
376. Index.
[KOZA] Kozaczuk, Wladyslaw, "ENIGMA," How the German
Machine Cipher was Broken, and How It was Read by
the Allies in World War Two," Ksiazka i Wiedza,
Warsaw, 1984.
[KU82] H. T. Kung, "Why systolic architectures,"
Computer, Vol. 15, No. 1, January 1982, pp. 37-
46.
[KU78] H. T. Kung and C. Leiserson, "Systolic arrays
(for VLSI)," in I. S. Duff and G. W. Stewart,
Eds., Sparse Matrix Proceedings, pp. 245-282.
Philadelphia: SIAM, 1978.
[KU82b] S. Y. Kung, K. S. Arun, R. J. Gal-Ezer, and D.
V. B. Rao, "Wavefront array processor:
language, architecture, and applications," IEEE
Transactions on Computers, Vol. C-31, No. 11,
November 1982, pp. 1054-1066.
[KULL] Kullback, Solomon, Statistical Methods in
Cryptanalysis, Aegean Park Press, Laguna Hills,
Ca. 1976.
[KUL1] Soloman Kullback, Information Theory and
Statistics. Dover, 1968.
[Ladn] LADNER System, 1984, , Operation and Maintenance
Manual, Part No. ON332500, Prepared for Maryland
Procurement Office, Ft. George G. Meade, MD,
December 1, 1984.
[Land] Landau, S., 1988, ``Zero Knowledge and the
Department of Defense,'' , Notices of the
American Mathematical Society (Special Article
Series), Vol. 35, No. 1 (1988), pp.5-12.
[LaOd] LaMacchia, B. and Odlyzko, A., 1991, Computation
of Discrete Logarithms in Prime Fields, in ,
Design, Codes, and Cryptography, Vol. 1, 1991,
pp. 47-62.
[LA84] J. C. Lagarias, "Performance analysis of Shamir's
attack on the basic Merkle-Hellman knapsack
system," in J. Paredaens, Ed., Lecture Notes in
Computer Science Vol. 172: Automata, Languages
and Programming: 11th Colloquium, Antwerp,
Belgium, July 16-20, 1984, pp. 312-323.
Berlin/New York: Springer-Verlag, 1984.
[LA83] J. C. Lagarias and A. M. Odlyzko, "Solving low-
density subset sum problems," in 24th Annual
Symposium on Foundations of Computer Science,
Tucson, AZ, November 7-9, 1983, pp. 1-10. Silver
Spring, MD: IEEE Computer Society Press, 1983.
Revised version in Journal of the Association for
Computing Machinery, Vol. 32, No. 1, January
1985, pp. 229-246.
[LA83] S. Lakshmivarahan, "Algorithms for public key
cryptosystems: theory and application," Advances
in Computers, Vol. 22, 1983, pp. 45-108.
[LA71] B. A. Laws, Jr. and C. K. Rushforth, "A cellular-
array multiplier for GF(2m)," IEEE Transactions
on Computers, Vol. 20, No. 12, December 1971,
pp. 1573-1578.
[LAFF] Laffin, John, "Codes and Ciphers: Secret Writing
Through The Ages," Abelard-Schuman, London, 1973.
[LAI] Lai, Xuejia, "On the Design and Security of Block
Ciphers," ETH Series in Information Processing 1,
1992. (Article defines the IDEA Cipher)
[LAI] Lai, X. "On the Design and Security of Block
Ciphers," ETH Series in Information Processing,
v. 1, Konstanz: Hartung-Gorre Verlag, 1992.
(Article defines the IDEA Cipher)
[LAIM] Lai, Xuejia, and James L. Massey, "A Proposal for
a New Block Encryption Standard," Advances in
Cryptology -Eurocrypt 90 Proceedings, 1992, pp.
55-70.
[LAKE] Lakoff, R., "Language and the Women's Place,"
Harper & Row, New York, 1975.
[LAKS] S. Lakshmivarahan, Algorithms for public key
cryptosystems. In Advances in Computers, M.
Yovtis ed., 22, Academic Press, 45--108, 1983.
[LAN0] Lang., S., - "Hyperbolic and Diophantine
analysis, a paraitre," Bull. AMS, 1986.
[LANG] Langie, Andre, "Cryptography," translated from
French by J.C.H. Macbeth, Constable and Co.,
London, 1922.
[LAN1] Langie, Andre, "Cryptography - A Study on Secret
Writings", Aegean Park Press, Laguna Hills, CA.
1989.
[LAN2] Langie, Andre, and E. A. Soudart, "Treatise on
Cryptography, " Aegean Park Press, Laguna Hills,
CA. 1991.
[LATI] BRASSPOUNDER, "Latin Language Data, "The
Cryptogram," July-August 1993.
[LAUE] Lauer, Rudolph F., "Computer Simulation of
Classical Substitution Cryptographic Systems"
Aegean Park Press, 1981, p72 ff.
[Lewi] Lewis, P., 1994, ``IRS Tries On-Line Filing,''New
York Times, February 19, 1994, Sec. D.
[LE82] D. J. Lehman, "On primality tests," SIAM Journal
on Computing, Vol. 11, No. 2, May 1982, pp. 374-
375.
[LE76] D. H. Lehmer, "Strong Carmichael numbers,"
Journal of the Australian Mathematical Society,
Vol. 21 (Series A), 1976, pp. 508- 510.
[LE79] A. Lempel, "Cryptology in transition," ACM
Computing Surveys, Vol. 11, No. 4, December 1979,
pp. 285-303.
[LE82] A. K. Lenstra, H. W. Lenstra, Jr., and L. Lovasz,
"Factoring polynomials with rational
coefficients," Mathematische Annalen, Vol. 261,
1982, pp. 515-534.
[LE90] A. K. Lenstra, H. W. Lenstra, Jr., M. S. Manasse,
and J. M. Pollard, "The number field sieve."
[LE89] A. K. Lenstra and M. S. Manasse, "Factoring by
electronic mail," to appear in proceedings of
EUROCRYPT '89.
[LE83] H. W. Lenstra, Jr., "Integer programming with a
fixed number of variables," Mathematics of
Operations Research, Vol. 8, No. 4, November
1983, pp. 538-548.
[LE86] H. W. Lenstra, Jr., "Primality testing," in J. W.
de Bakker et al., Eds., Mathematics and Computer
Science, CWI Monographs, I, pp. 269-287.
Amsterdam/New York: North-Holland, 1986.
[LE87] H. W. Lenstra, Jr., "Factoring integers with
elliptic curves," Annals of Mathematics, Vol.
126, 1987, pp. 649-673.
[LE81] H. R. Lewis and C. H. Papadimitriou, Elements of
the Theory of Computation. Englewood Cliffs, NJ:
Prentice-Hall, 1981.
[LEAR] Leary, Penn, " The Second Cryptographic
Shakespeare," Omaha, NE [from author] 1994.
[LEA1] Leary, Penn, " Supplement to The Second
Cryptographic Shakespeare," Omaha, NE [from
author] 1994.
[LEAU] Leaute, H., "Sur les Mecanismes Cryptographiques
de M. de Viaris," Le Genie Civil, XIII, Sept 1,
1888.
[LEDG] LEDGE, "NOVICE NOTES," American Cryptogram
Association, 1994. [ One of the best
introductory texts on ciphers written by an
expert in the field. Not only well written,
clear to understand but as authoritative as they
come! ]
[LED1] LEDGE, "Basic Patterns in Base Eleven and Twelve
Arithmetic (Part 1) ," The Cryptogram, American
Cryptogram Association, Vol XLIII, No. 5, 1977.
[LED2] LEDGE, "Basic Patterns in Base Eleven and Twelve
Arithmetic (Part 2) ," The Cryptogram, American
Cryptogram Association, Vol XLIII, No. 6, 1977.
[LEMP] A. Lempel, Cryptology in transition, Computing
Surveys, 11(4), 285--304, 1979.
[LENS] Lenstra, A.K. et. al. "The Number Field Sieve,"
Proceedings of the 22 ACM Symposium on the Theory
of Computing," Baltimore, ACM Press, 1990, pp
564-72.
[LEN1] Lenstra, A.K. et. al. "The Factorization of the
Ninth Fermat Number," Mathematics of Computation
61 1993, pp. 319-50.
[LEVY] Levy, Steven. "Crypto Rebels." WIRED May-June
1993: 54-61.
[LEWF] Lewis, Frank, "Problem Solving with Particular
Reference to the Cryptic (or British) Crossword
and other 'American Puzzles', Part One," by Frank
Lewis, Montserrat, January 1989.
[LEW1] Lewis, Frank, "The Nations Best Puzzles, Book
Six," by Frank Lewis, Montserrat, January 1990.
[LEWI] Lewin, Ronald, 'Ultra goes to War', Hutchinson,
London 1978.
[LEWN] Lewin, Ronald, 'The American Magic - Codes,
ciphers and The Defeat of Japan', Farrar Straus
Giroux, 1982.
[LEWY] Lewy, Guenter, "America In Vietnam", Oxford
University Press, New York, 1978.
[LEVI] Levine, J., U.S. Cryptographic Patents 1861-
1981, Cryptologia, Terre Haute, In 1983.
[LEV1] Levine, J. 1961. Some Elementary Cryptanalysis
of Algebraic Cryptography. American Mathematical
Monthly. 68:411-418
[LEV2] Levine, J. 1961. Some Applications of High-
Speed Computers to the Case n =2 of Algebraic
Cryptography. Mathematics of Computation.
15:254-260
[LEV3] Levine, J. 1963. Analysis of the Case n =3 in
Algebraic Cryptography With Involuntary Key
Matrix With Known Alphabet. Journal fuer die
Reine und Angewante Mathematik. 213:1-30.
[LINA] Anonomous, "Decrypment of Minoan Linear A," MJ64,
The Cryptogram, American Cryptogram Association,
1964.
[LI89] J. Linn and S. T. Kent, "Privacy for DARPA-
Internet mail," in Proceedings of the 12th
National Computer Security Conference, Baltimore,
MD, October 10-13, 1989, pp. 215-229.
[Link] M/A-COM LINKABIT Corporation, 1983, , LC76 DES
Data Encryption/Decryption Unit: Product
Brochure, August, 1983.
[LINN] Linn J. "Privacy Enhancement for Internet
Electronic Mail: Part I: Message Encryption and
Authentication Procedures", RFC1421, Feb 1993.
[LISI] Lisicki, Tadeusz, 'Dzialania Enigmy', Orzet
Biaty, London July-August, 1975; 'Enigma i
Lacida',
Przeglad lacznosci, London 1974- 4; 'Pogromcy
Enigmy we Francji', Orzet Biaty, London, Sept.
1975.'
[LION] LIONEL,"A Tool for Patristocrat Tip Placement ,"
JA95 3, The Cryptogram, American Cryptogram
Association, 1995.
[LITT] Littman, J. (1996). "The Fugitive Game: Online
with Kevin Mitnick--The Inside Story of the Great
Cyberchase". Little, Brown and Company (Boston).
ISBN 0-316-5258-7. x + 383.
[LUBY] C. Rackoff, M. Luby, How to construct
psuedorandom permutations from psuedorandom
functions. SIAM Journal of Computing, vol. 17,
#2, 373--386, 1988.
[LUCK] Michael Lucks, A Constraint Satisfaction
Algorithm for the Automated Decryption of Simple
Substitution Ciphers. In CRYPTO '88. 598--605,
1979.
[LYNC] Lynch, Frederick D., "Pattern Word List, Vol 1.,"
Aegean Park Press, Laguna Hills, CA, 1977.
[LYN1] Lynch, Frederick D., "An Approach To
Cryptarithms," ACA, 1976.
[LYND] Lynch, D. C. & M. T. Rose (1993). "Internet
System Handbook". Addison-Wesley Publishing Co.
(Reading, MA). ISBN 0-201-56741-5. xxxii + 790.
Index.
[LYSI] Lysing, Henry, aka John Leonard Nanovic, "Secret
Writing," David Kemp Co., NY 1936.
[MA81] D. MacMillan, "Single chip encrypts data at 14
Mb/s," Electronics, Vol. 54, No. 12, June 16,
1981, pp. 161-165.
[MA88] J. L. Massey, "An introduction to contemporary
cryptology," Proceedings of the IEEE, Vol. 76,
No. 5, May 1988, pp. 533-549.
[MA78] S. M. Matyas and C. H. Meyer, "Generation,
distribution, and installation of cryptographic
keys," IBM Systems Journal, Vol. 17, No. 2,
1978, pp. 126-137.
[MACB] Macbeth, J. C. H., "The Marconi International
Code," 1920. - "Secret Ciphering for the Marconi
International Code," 1920.
[MACF] MacFarlane, A. Lectures on Ten British
Mathematicians of the Nineteen Century, Math.
Mono. No 17, New York: John Wiley, 1916.
[MACI] Macintyre, D., "The Battle of the Atlantic," New
York, Macmillan, 1961.
[MADA] Madachy, J. S., "Mathematics on Vacation,"
Scribners, 1972.
[MAGN] Magne, Emile, Le plaisant Abbe de Boisrobert,
Paris, Mecure de France, 1909.
[MANN] Mann, B.,"Cryptography with Matrices," The
Pentagon, Vol 21, Fall 1961.
[MANS] Mansfield, Louis C. S., "The Solution of Codes
and Ciphers", Alexander Maclehose & Co., London,
1936.
[MAN1] Mansfield, L.C.S, "One Hundred Problems in
Cipher. London, 1936.
[MARO] Marotta, Michael, E. "The Code Book - All About
Unbreakable Codes and How To Use Them,"
Loompanics Unlimited, 1979. [This is a terrible
book. Badly written, without proper authority,
unprofessional, and prejudicial to boot. And, it
has one of the better illustrations of the Soviet
one-time pad with example, with three errors in
cipher text, that I have corrected for the
author.]
[MARS] Marshall, Alan, "Intelligence and Espionage in
the Reign of Charles II," 1660-1665, Cambridge
University, New York, N.Y., 1994.
[MASS] J. Massey, An introduction to contemporary
cryptology, IEEE proceedings, 76(5), 533--549,
1988.
[MART] Martin, James, "Security, Accuracy and Privacy
in Computer Systems," Prentice Hall, Englewood
Cliffs, N.J., 1973.
[MAST] Lewis, Frank W., "Solving Cipher Problems -
Cryptanalysis, Probabilities and Diagnostics,"
Aegean Park Press, Laguna Hills, CA, 1992.
[MATS] Matsui, M., 1993, ``Linear Cryptanalysis of DES
Cipher,'' in Proceedings Eurocrypt 1993.
[MATT] Matthews, T., Shadows Dancing: Japanese Espionage
Against the West, 1939-1945, St. Martins, Press,
New York, 1993.
[MAU] Mau, Ernest E., "Word Puzzles With Your
Microcomputer," Hayden Books, 1990.
[MAVE] Mavenel, Denis L., Lettres, Instructions
Diplomatiques et Papiers d' Etat du Cardinal
Richelieu, Historie Politique, Paris 1853-1877
Collection.
[MAYA] Coe, M. D., "Breaking The Maya Code," Thames and
Hudson, New York, 1992.
[MYSZ] Myszkowski, E., Cryptographie Indechiffrable,
Paris, 1902.
[MAZU] Mazur, Barry, "Questions On Decidability and
Undecidability in Number Theory," Journal of
Symbolic Logic, Volume 54, Number 9, June, 1994.
[MC89] K. S. McCurley, "The discrete logarithm problem,"
preprint.
[MC78] R. J. McEliece, "A public-key cryptosystem based
on algebraic coding theory," DSN Progress Report
42-44, Jet Propulsion Laboratory, 1978, pp. 114-
116.
[ME78] R. C. Merkle, "Secure communications over
insecure channels," Communications of the ACM,
Vol. 21, No. 4, April 1978, pp. 294-299.
[ME82] R. C. Merkle, Secrecy, Authentication, and Public
Key Systems. Ann Arbor: UMI Research Press, 1982.
[ME82b] R. C. Merkle, "Protocols for public key
cryptosystems," in G. J. Simmons, Ed., Secure
Communications and Asymmetric Cryptosystems, pp.
73-104. Boulder, CO: Westview Press, 1982.
[ME89] R. C. Merkle, "One way hash functions and DES,"
preprint.
[M78b] R. C. Merkle and M. E. Hellman, "Hiding
information and signatures in trapdoor
knapsacks," IEEE Transactions on Information
Theory, Vol. 24, No. 5, September 1978, pp. 525-
530.
[MELL] Mellen G. 1981. Graphic Solution of a Linear
Transformation Cipher. Cryptologia. 5:1-19.
[MEND] Mendelsohn, Capt. C. J., Studies in German
Diplomatic Codes Employed During World War, GPO,
1937.
[MERK] Merkle, Ralph, "Secrecy, Authentication and
Public Key Systems," Ann Arbor, UMI Research
Press, 1982.
[MER1] Merkle, Ralph, "Secure Communications Over
Insecure Channels," Communications of the ACM 21,
1978, pp. 294-99.
[MER2] Merkle, Ralph and Martin E. Hellman, "On the
Security of Multiple Encryption ," Communications
of the ACM 24, 1981, pp. 465-67.
[MER3] Merkle, Ralph and Martin E. Hellman, "Hiding
Information and Signatures in Trap Door
Knapsacks," IEEE Transactions on Information
Theory 24, 1978, pp. 525-30.
[MER4] R. Merkle, Fast software encryption functions. In
Proceedings of CRYPTO '90, Menezes and Vanstone
ed., 476--501, 1991.
[MESC] Meschkowski, H., "Ways of Thought of Great
Mathematicians, tr by John Dyer-Bennet. San
Francisco: Holden-Day 1948.
[MEYE] C. Meyer and S. Matyas, Cryptography: A new
dimension in computer security. Wiley, 1982.
[MEYR] C. Meyer, Ciphertext/plaintext and ciphertext/key
dependence vs. number of rounds for the Data
Encryption Standard. AFIPS Conference
proceedings, 47, 1119--1126, 1978.
[MI76] G. L. Miller, "Riemann's hypothesis and tests for
primality," Journal of Computer and System
Sciences, Vol. 13, No. 3, December 1976, pp.
300-317.
[MI88] V. M. Milutinovic, Computer Architecture:
Concepts and Systems. New York: North-Holland,
1988.
[MICR] MICROPOD,"The Solution of a Two Square," JA95,
The Cryptogram, American Cryptogram Association,
1995.
[MICA] Micali, S., Fair Cryptosystems, Report
MIT/LCS/TR-579.b, MIT Laboratory for Computer
Science, Cambridge, Mass, November 1993.
[MILL] Millikin, Donald, " Elementary Cryptography ",
NYU Bookstore, NY, 1943.
[MIL0] Miller, C. (1993). "Information Technology
Security Handbook". PW/GSC, catalog #P35-
73/1993. ISBN 0-662-59922-5.
[MIL1] Miller, C. (1993). "Microcomputer and LAN
Security". PW/GSC, catalog #P35-72/1993. ISBN
0-662-59921-7.
[MILE] Miller, S. E. (1996). "Civilizing Cyberspace:
Policy, Power and the Information Superhighway".
ACM Press by Addison-Wesley (Reading, MA). ISBN
0-201-84760-4. xvii + 413. Index.
[Mint] Mintz, J., 1992, ``Intelligence Community in
Breach with Business,'' Washington Post, April
30, 1992, Sec. A.
[MINT] Mintz J., and J. Schwartz, "Encryption Program
Draws Fresh Attacks," The Washington Post, 18
September 1993, p. C1.
[MO85] P. L. Montgomery, "Modular multiplication without
trial division," Mathematics of Computation, Vol.
44, No. 170, April 1985, pp. 519-521.
[MO88] J. H. Moore, "Protocol failures in
cryptosystems," Proceedings of the IEEE, Vol. 76,
No. 5, May 1988, pp. 594-602.
[MO75] M. A. Morrison and J. Brillhart, "A method of
factoring and the factorization of F7,"
Mathematics of Computation, Vol. 29, No. 129,
January 1975, pp. 183-205.
[MODE] Modelski, Tadeusz, 'The Polish Contribution to
the Ultimate Allied Victory in the Second World
War', Worthing (Sussex) 1986.
[MOOR] Moore, D. T., and M. Waller, "Cloak and Cipher,"
Bobbs-Merrill, New York, 1962.
[MORB] EUREKA, "A Bit More To the Morbit Cipher," MJ64,
The Cryptogram, American Cryptogram Association,
1964.
[MORB] EUREKA, "A Bit More To the Morbit Cipher," MJ64,
The Cryptogram, American Cryptogram Association,
1964.
[MOR1] THE BRUIN, "A Pollux/Morbit Hybrid Cipher," MA88,
The Cryptogram, American Cryptogram Association,
1988.
[MOR2] NIP N. BUD, "Comments on Breaking the Morbit
Cipher," MA64, The Cryptogram, American
Cryptogram Association, 1964.
[MOR3] CROATULUS, "Entering the Morbit with Plaintext
H," SO68, The Cryptogram, American Cryptogram
Association, 1968.
[MOR4] EUREKA, "Morbit Cipher," JF64, The Cryptogram,
American Cryptogram Association, 1964.
[MOR5] CRUX, "Morbit Diagraph Analysis," MA90, The
Cryptogram, American Cryptogram Association,
1990.
[MOR6] LEDGE, "Morbit Cipher," SO75, The Cryptogram,
American Cryptogram Association, 1975.
[MOR7] MARSHEN, "On Morbit Variants," ND64, The
Cryptogram, American Cryptogram Association,
1964.
[MOR8] THE DOC, "Pollux/Morbit Challenge Solved," SO88,
The Cryptogram, American Cryptogram Association,
1988.
[MORS] FIDDLE, "Morse Code in Three Languages,
International, ," DJ53, The Cryptogram, American
Cryptogram Association, 1953.
[MOR1] LAMONT CRANSTON,"Fractionated Morse," JA92, The
Cryptogram, American Cryptogram Association,
1992.
[MRAY] Mrayati, Mohammad, Yahya Meer Alam and Hassan al-
Tayyan., Ilm at-Ta'miyah wa Istikhraj al-Mu,amma
Ind al-Arab. Vol 1. Damascus: The Arab Academy of
Damascus.,
1987.
[MULL] Mulligan, Timothy," The German Navy Examines its
Cryptographic Security, Oct. 1941, Military
affairs, vol 49, no 2, April 1985.
[Myer] Myers, F., 1979, ``A Data Link Encryption
System,'' National Telecommunications Conference,
Washington, D.C. November 27-29, 1979, pp.
43.5.1-43.5.8.
[MYER] Myer, Albert, "Manual of Signals," Washington,
D.C., USGPO, 1879.
[MYSK] PHOENIX, "Myszkowski Deciphering Program," JA87,
The Cryptogram, American Cryptogram Association,
1987.
[MYS1] PHOENIX, "Myszkowski Deciphering Program-
Conclusion," ND87, The Cryptogram, American
Cryptogram Association, 1987.
[MYS2] QUINCE, "Redefence al la Myszkowski," JF92, The
Cryptogram, American Cryptogram Association,
1992.
[MYS3] DELAC, "Myszkowski Transposition," AS46, The
Cryptogram, American Cryptogram Association,
1946.
[MYS4] S-TUCK, "Myszkowski Transposition," AM52, The
Cryptogram, American Cryptogram Association,
1952.
[MYS5] B.NATURAL, "Simplifing the Myszkowski," JF59, The
Cryptogram, American Cryptogram Association,
1959.
[MYS6] AB STRUSE, "Solving the Myszkowski," AM48, The
Cryptogram, American Cryptogram Association,
1948.
[MYS7] CROTALUS, "Railfence and Redefence as Special
Cases of the Myszkowski," JA80, The Cryptogram,
American Cryptogram Association, 1980.
[MYSZ] Myszkowski, Emile V.T., "Cryptographie
indechiffrable basee sur de nouvelles
combinaisons rationelles." Paris 1902. 69 pg 8
vol.,NN, DLC, Boston Public Library, John Crerar
Library, Great Britian War Office Library,
Belgium War Library, BN.
[NA77] National Bureau of Standards, Federal Information
Processing Standards Publication 46: Data
Encryption Standard, January 15, 1977.
[NA80] National Bureau of Standards, Federal Information
Processing Standards Publication 81: DES Modes of
Operation, December 2, 1980.
[NA81] National Bureau of Standards, Federal Information
Processing Standards Publication 74: Guidelines
for Implementing and Using the NBS Data
Encryption Standard, April 1, 1981.
[NBS] National Bureau of Standards, "Data Encryption
Standard," FIPS PUB 46-1, 1987.
[NBS] National Bureau of Standards, 1977, Data
Encryption Standard, Federal Information
Processing Standard 46,
January 1977, Washington, DC.
[NCSS] National Computer Security Center (1983-).
"Rainbow Series" (so-called). Monographs on many
aspects of information systems security. For an
excellent summary of the series and its topics,
see Appendix E of Russell & Gangemi (below), p.
359 ff.
[NE78] R. M. Needham and M. D. Schroeder, "Using
encryption for authentication in large networks
of computers," Communications of the ACM, Vol.
21, No. 12, December 1978, pp. 993-999.
[Neu ] Neumann, P., 1994 , Computer-Related Risks, ACM
Press (Addison-Wesley), 1994.
[NIXX] National Institute of Standards and Technology,
1991, Publication XX: Announcement and
Specifications for a Digital Signature Standard
(DSS), August 19, 1991, Washington, DC.
[N185] National Institute of Standards and Technology,
1994, Federal Information Processing Standards
Publication 185, Escrowed Encryption Standard},
February 9, 1994, Washington, DC.
[N186] National Institute of Standards and Technology,
1994, Federal Information Processing Standards
Publication 186: Digital Signature Standard
(DSS), May 19, 1994, Washington, DC.
[NI94] National Institute of Standards and Technology,
1994, Approval of Federal Information Processing
Standards Publication 185, Escrowed Encryption
Standard, Federal Register, Vol. 59, No. 27,
February 9, 1994, Washington, DC.
[NISA] National Institute of Standards and Technology
and National Security Agency, 1989, Memorandum of
Understanding between the Director of the
National Institute of Standards and Technology
and the Director of the National Security Agency
concerning the Implementation of Public Law 100-
235, March 24, 1989, Washington, DC.
[NIBL] Niblack, A. P., "Proposed Day, Night and Fog
Signals for the Navy with Brief Description of
the Ardois Hight System," In Proceedings of the
United States Naval Institute, Annapolis: U. S.
Naval Institute, 1891.
[NICO] PHOENIX, "Nicodemus," ND88, The Cryptogram,
American Cryptogram Association, 1988.
[NICa] BERYL, "How to Finish Deciphering a Nicodemus,"
SO92, The Cryptogram, American Cryptogram
Association, 1992.
[NICb] S-TUCK, "Decrypting the Nicodemus," AM52, The
Cryptogram, American Cryptogram Association,
1952.
[NICc] FIDDLE, "Method for Solving the Nicodemus," JF60,
The Cryptogram, American Cryptogram Association,
1960.
[NICd] DELEC, "Nicodemus Cipher," AS49, The Cryptogram,
American Cryptogram Association, 1949.
[NICe] LEDGE, "Nicodemus Cipher," SO72, The Cryptogram,
American Cryptogram Association, 1972.
[NICH] Nichols, Randall K., " Classical Cryptography
Course, Volume I," Aegean Park Press (C-74),
ISBN: 0-89412-263-0, Softbound, 8.38 x 10.75 in,
xii + 301 pp.
Mr. Nichols (aka LANAKI) is the outgoing
President of the American Cryptogram Association
(ACA). In his truly great book, he covers the
following:
Volume I covers such diverse topics as
Aristocrats (the king of puzzles found in the
daily paper), Patristocrat (single language
Aristocrats without word divisions), Xenocrypts
(language ciphers other than English),
Transposition ciphers, Military Ciphers,
Cryptarithms, Polyalphabetics, Cipher Machines
such as the ENIGMA (with simulation disk
available) and special ciphers used in history,
as well as their modern day equivalents. Ciphers
and cryptanalytic techniques for solution are
presented.
[NIC~] Nichols, Randall K., " Classical Cryptography
Course, Volume II," Aegean Park Press (C-76),
ISBN: 0-89412-264-9, Softbound, 8.38 x 10.75 in,
xii + 400 pp. 1996, $40.00.
Volume II presents Lectures 11 - 20 (of a total
of twenty five) from Mr. Nichols' extremely
successful course in Classical Cryptography
taught in 1995 and 1996 to 358 students via the
Internet and regular mail.
Volume II covers polyalphabetic substitutions
ciphers in the Vigenere family (Viggy, Variant,
Beaufort, Porta, Gronsfeld, Portax, Gromark),
decimation, principles of symmetry, isologs and
superimposition solution techniques. Volume II
describes the difficult aperiodic cipher systems
(Interrupted key, Autoclave, Progressive, Running
Key used in cipher machines) and their analysis
by isomorphs, and repetitions. Cryptarithm
solutions for extended bases are presented. The
theory of coincidences and statistical attacks
(kappa, chi, phi) that are derived from this
important theory are detailed.
Transposition theory and a variety of
transposition ciphers are solved (Columnar,
Amsco, Myszkowski, Cadenus, Grille, Swagman,
Auto-Transposition). Volume II has two chapters
on the difficult cipher systems invented by the
famous French cryptographer Delastelle:
Foursquare, Bifid and Trifid. Volume II ends
with a chapter on passwords, law and data
protection. Volume II is a potpourri of advanced
topics in classical cryptography.
Volume II includes over 1600 Cryptographic
Resources and References covering all phases of
cryptography: cryptanalysis, history, legal,
social, classical, modern, NSA, mathematical
techniques, recreational, intelligence, tactical,
strategic, national defense, INFOSEC: offensive
and defensive, hardware, software, standards,
public key cryptography, web sources, and
applicable Senate and House bills. Readers are
encouraged to expand their knowledge in the many
directions possible to them through this section.
[NIC1] Nichols, Randall K., "Xeno Data on 10 Different
Languages," ACA-L, August 18, 1995.
[NIC2] Nichols, Randall K., "Chinese Cryptography Parts
1-3," ACA-L, August 24, 1995.
[NIC3] Nichols, Randall K., "German Reduction Ciphers
Parts 1-4," ACA-L, September 15, 1995.
[NIC4] Nichols, Randall K., "Russian Cryptography Parts
1-3," ACA-L, September 05, 1995.
[NIC5] Nichols, Randall K., "A Tribute to William F.
Friedman", NCSA FORUM, August 20, 1995.
[NIC6] Nichols, Randall K., "Wallis and Rossignol,"
NCSA FORUM, September 25, 1995.
[NIC7] Nichols, Randall K., "Arabic Contributions to
Cryptography,", in The Cryptogram, ND95, ACA,
1995.
[NIC8] Nichols, Randall K., "U.S. Coast Guard Shuts Down
Morse Code System," The Cryptogram, SO95, ACA
Publications, 1995.
[NIC9] Nichols, Randall K., "PCP Cipher," NCSA FORUM,
March 10, 1995.
[NICX] Nichols, R. K., Keynote Speech to A.C.A.
Convention, "Breaking Ciphers in Other
Languages.," New Orleans, La., 1993.
[NICK] Nickels, Hamilton, "Codemaster: Secrets of Making
and Breaking Codes," Paladin Press, Boulder, CO.,
1990.
[NIHL] PHOENIX," Computer Column: Nihilist
Substitution," MA88, The Cryptogram, American
Cryptogram Association, 1988.
[NIH1] PHOENIX," Computer Column: Nihilist
Substitution," MJ88, The Cryptogram, American
Cryptogram Association, 1988.
[NIH2] PHOENIX," Computer Column: Nihilist
Substitution," JA88, The Cryptogram, American
Cryptogram Association, 1988.
[NIH3] PHOENIX," Computer Column: Nihilist
Substitution," JA89, The Cryptogram, American
Cryptogram Association, 1989.
[NIH4] FIDDLE and CLEAR SKYS," FIDDLE'S slide for
Nihilist Number Substitution," ON48, The
Cryptogram, American Cryptogram Association,
1948.
[NIH5] RIG R. MORTIS," Mixed Square Nihilist," JA60, The
Cryptogram, American Cryptogram Association,
1960.
[NIH6] PICCOLA," Nihilist Number Cipher," AS37, The
Cryptogram, American Cryptogram Association,
1937.
[NIH7] PICCOLA," Nihilist Transposition," DJ38, The
Cryptogram, American Cryptogram Association,
1938.
[NIST90] PUBLIC-KEY CRYPTOGRAPHY, James Nechvatal
Security Technology Group National Computer
Systems Laboratory National Institute of
Standards and Technology Gaithersburg, MD 20899
[NORM] Norman, Bruce, 'Secret Warfare', David & Charles,
Newton Abbot (Devon) 1973.
[NORW] Marm, Ingvald and Sommerfelt, Alf, "Norwegian,"
Teach Yourself Books, Hodder and Stoughton,
London, 1967.
[NRC ] National Research Council (1991). "Computers at
Risk: Safe Computing in the Information Age".
National Academy Press (Washington, DC). ISBN 0-
309-04388-3. xv + 302. Available from the NCSA.
[NSA] NSA's Friedman Legacy - A Tribute to William and
Elizabeth Friedman, NSA Center for Cryptological
[NSA1] Masked Dispatches: Cryptograms and Cryptology in
American History, 1775 -1900. Series 1, Pre World
War I Volume I, National Security Agency, Central
Security Service, NSA Center for Cryptological
History, 1993.
[NULL] PICCOLA, "Null Cipher," ON34, The Cryptogram,
American Cryptogram Association, 1934.
[NUL1] ISHCABIBEL, "Null Cipher," JJ45, The Cryptogram,
American Cryptogram Association, 1945.
[NUL2] HELLCRYPT, "Nullifing the Null Cipher," ON49, The
Cryptogram, American Cryptogram Association,
1945.
[NUL3] BUNYIP, "NULLX: The Patristocrat Null Cipher,"
SO91, The Cryptogram, American Cryptogram
Association, 1991.
[NWCS] National Commission for the Review of Federal and
State Laws relating to Wiretapping and Electronic
Surveillance, 1976, Commission Studies,
Washington, 1976, Washington, DC.
[OD84] A. M. Odlyzko, "Cryptanalytic attacks on the
multiplicative knapsack cryptosystem and on
Shamir's fast signature scheme," IEEE
Transactions on Information Theory, Vol. IT-30,
No. 4, July 1984, pp. 594-601.
[OD8b] A. M. Odlyzko, "Discrete logarithms in finite
fields and their cryptographic significance," in
T. Beth, N. Cot, and I. Ingemarsson, Eds.,
Lecture Notes in Computer Science Vol. 209:
Advances in Cryptology: Proceedings of EUROCRYPT
84, a Workshop on
the Theory and Application of Cryptographic
Techniques, Paris, France, April 9-11, 1984, pp.
224-314. Berlin/New York: Springer- Verlag, 1985.
[OHAV] OHAVER, M. E., "Solving Cipher Secrets," Aegean
Park Press, 1989.
[OHA1] OHAVER, M. E., "Cryptogram Solving," Etcetera
Press, 1973.
[OKLA] Andre, Josephine and Richard V. Andree,
"Cryptarithms," Unit One, Problem Solving and
Logical Thinking, University of Oklahoma, Norman,
Ok. Copy No: 486, 1976.
[OKLI] Andre, Josephine and Richard V. Andree, "
Instructors Manual For Cryptarithms," Unit One,
Problem Solving and Logical Thinking, University
of Oklahoma, Norman, Ok. Copy No: 486, 1976.
[Olm] Olmstead v. United States, 277 U.S. 438, 1928.
[OPS] Office of the Press Secretary, The White House,
1993, statement on the Clipper Chip Initiative,
April 16, 1993, Washington, DC.
[OP20] "Course in Cryptanalysis," OP-20-G', Navy
Department, Office of Chief of Naval Operations,
Washington, 1941.
[OPSH] O'PSHAW,"Bifid Statistical Period Determination
Using a Contingency Table Chi-Square," JA95, The
Cryptogram, American Cryptogram Association,
1995.
[OR86] G. A. Orton, M. P. Roy, P. A. Scott, L. E.
Peppard, and S. E. Tavares, "VLSI implementation
of public-key encryption algorithms," in A. M.
Odlyzko, Ed., Lecture Notes in Computer Science
Vol. 263: Advances in Cryptology - CRYPTO '86,
proceedings of a Conference on the Theory and
Applications of Cryptographic Techniques, Santa
Barbara, CA, August 11-15, 1986, pp. 277-301.
Berlin/New York: Springer-Verlag, 1987.
[ORAN] The ``Orange Book'' is DOD 520 0.28-STD,
published December 1985 as part of the ``rainbow
book'' series. Write to Department of Defense,
National Security Agency, ATTN: S332, 9800 Savage
Road, Fort Meade, MD 20755-6000, and ask for the
Trusted Computer System Evaluation Criteria. Or
call 301-766-8729. The ``Orange Book'' will
eventually be replaced by the U.S. Federal
Criteria for Information Technology Security (FC)
online at the NIST site [FTPNS], which also
contains information on other various proposed
and active federal standards.
[ORE ] Ore, Oystein, Number Theory and Its History, New
York: McGraw-Hill, 1948.
[OCNO] Office of Chief of Naval Operations (1943)
Memorandum Communication Improvement Item.
available from the NARA, Pacific Sierra Regional
Archive, RG 181-58-3224, 12th ND Commandants
Office General Correspondence, A6-2(1) Complaints
-Discrepencies, Security-etc.
[OTA] "Defending Secrets, Sharing Data: New Locks and
Keys for Electronic Information," Office of
Technology Assessment, 1988.
[OTA1] OTA (1993). "Protecting Privacy in Computerized
Medical Information". U.S. Congress Office of
Technology Assessment. U.S. Government Printing
Office #OTA-TCT-576 (Washington, DC). ISBN 0-16-
042074-1. viii + 157. Index.
[OZK ] OZ,"Variation in Letter Frequency with Cipher
Length or Where Did All Those K's Come From? ,"
SO59, The Cryptogram, American Cryptogram
Association, 1959.
[P235] Computer Security Act of 1987, Public Law 100-235
(H.R. 145), 101 Stat. 1724-1730.
[PA87] W. Patterson, Mathematical Cryptology for
Computer Scientists and Mathematicians. Totowa,
NJ: Rowman & Littlefield, 1987.
[Park] Parker, D., 1983, Fighting Computer Crime,
Charles Scribner's, New York, 1983.
[PATR] PICCOLA, "Patristocrat: A method for Finding
Repeated Sequences," JF92, The Cryptogram,
American Cryptogram Association, 1992.
[PAT1] PICCOLA, "Patristocrat: Vowel Spotting and
Digraphs ," ND91, The Cryptogram, American
Cryptogram Association, 1991.
[PAT2] PICCOLA, "Patristocrat: Finding Repeated
Sequences," AM34, The Cryptogram, American
Cryptogram Association, 1934.
[PAT3] PICCOLA, "Patristocrat: Vowel Spotting and
Digraphs ," FM34, The Cryptogram, American
Cryptogram Association, 1934.
[PAT4] FLEETFOOT, "Patristocrat: Column Insight," SO90,
The Cryptogram, American Cryptogram Association,
1990.
[PAT5] AECUS, "Patristocrat Tip Placement," SO90, The
Cryptogram, American Cryptogram Association,
1990.
[PAT6] LAMONT CRANSTON, "Patristocrat: Rookie Guide To
Solving," JA91, The Cryptogram, American
Cryptogram Association, 1991.
[PAT7] MICROPOD, "Solution of a K2 Patristocrat," MJ91,
The Cryptogram, American Cryptogram Association,
1991.
[PAT8] FAUSTUS, "Patristocrat: Solution of Straight
Substitution Crypts ," ON32, SO91, The
Cryptogram, American Cryptogram Association,
1932,1991.
[PATT] Wayne Patterson, Mathematical Cryptology for
Computer Scientists and Mathematicians. Rowman &
Littlefield, 1987.
[PCSG] Public Cryptography Study Group, 1981, Report of
the Public Cryptography Study Group, American
Council on Education, February 1981.
[PE86] R. C. Peralta, "A simple and fast probabilistic
algorithm for computing square roots modulo a
prime number," IEEE Transactions on Information
Theory, Vol. 32, No. 6, November 1986, pp. 846-
847.
[PEAR] "Pearl Harbor Revisited," U.S. Navy
Communications Intelligence, 1924-1941, U.S.
Cryptological History Series, Series IV, World
War II, Volume 6, NSA CSS , CH-E32-94-01, 1994.
[PECK] Peck, Lyman C., "Secret Codes, Remainder
Arithmetic, and Matrices," National Counsil of
Teachers of Mathematics, Washington, D.C. 1971.
[PELE] S. Peleg and A. Rosenfeld, Breaking Substitution
Ciphers Using a Relaxation Algorithm. CACM
22(11).
[PERI] Y.KNOTT, "Aid For Solving Periodic Ciphers, JJ42,
The Cryptogram, American Cryptogram Association,
1942.
[PER1] S-TUCK, "Finding the Period in Periodic Ciphers,
AS44, The Cryptogram, American Cryptogram
Association, 1944
[PER2] SCHMOO, "Refinement for Simple Periodic Ciphers,
MJ80, The Cryptogram, American Cryptogram
Association, 1980.
[PER3] LEANDER and PICCOLA, "Some Odds and Ends On
Periodic Ciphers, AM40, The Cryptogram, American
Cryptogram Association, 1940.
[PER4] R.E. GILMAN, "To Find the Period in Any Periodic
Ciphers, JJ43, The Cryptogram, American
Cryptogram Association, 1943.
[PERR] Perrault, Charles, Tallement des Reaux, Les
Historiettes, Bibliotheque del La Pleiade, Paris
1960, pp 256-258.
[PETE] Peterson, I., 'Encrypting Controversy,' Science
News, 19 June 1993, 394-396.
[PFLE] Pfleeger, C. P. (1989). "Security in Computing".
Prentice-Hall (Englewood Cliffs, NJ). ISBN 0-13-
798943-1. xxi + 538. Index.
[PGP] Garfinkel, Simson, "PGP: Pretty Good Privacy,"
O'reilly and Associates, Inc. Sebastopol, CA.
1995.
[PHL ] PHIL,"System Identification by General
Frequencies," AM48, The Cryptogram, American
Cryptogram Association, 1948.
[PHIL] K. SEA, "Comments On The Phillips Cipher," AM51,
The Cryptogram, American Cryptogram Association,
1951.
[PHI1] PHOENIX, "Phillips Crib Dragging," JA91, The
Cryptogram, American Cryptogram Association,
1991.
[PHI2] O'PSHAW "Mechanization of the Phillips Cipher,"
ND90, The Cryptogram, American Cryptogram
Association, 1990.
[PHI3] LEDGE, "More on the Phillips Cipher," JA72, The
Cryptogram, American Cryptogram Association,
1972.
[PHI4] CALIMAR, "Phillips Cipher," MA84, The Cryptogram,
American Cryptogram Association, 1984.
[PHI5] GLENDALE, "The Phillips Cipher," ON47, The
Cryptogram, American Cryptogram Association,
1947.
[PHI6] O.G. WIZ, "Phillips System," AS32, The
Cryptogram, American Cryptogram Association,
1932.
[PHI7] B.NATURAL, "Phillips Cipher with Mixed square,"
AM50, The Cryptogram, American Cryptogram
Association, 1950.
[PHI8] LEDGE, "Phillips," MJ72, The Cryptogram, American
Cryptogram Association, 1972.
[PHIP] Phillips, H., "My Best Puzzles in Logic and
Reasoning," Dover, 1961.
[PHOT] PHOTON, "Headline Puzzles by Paul Derthick," for
publication, 1 September, 1996. (With permission
of NSA and Mr. Derthick's estate))
[Pil ] Piller, C., 1993, ``Privacy in Peril,''
MacWorld,July 1993, pp. 8 - 14.
[PIER] Pierce, Clayton C., "Cryptoprivacy", 325 Carol
Drive, Ventura, Ca. 93003, 1994.
[PIE1] Pierce, Clayton C., "Privacy, Cryptography, and
Secure Communication ", 325 Carol Drive, Ventura,
Ca. 93003, 1977.
[PLAY] ZEMBIE, "Playfair Cipher: Anyone For," JF68, The
Cryptogram, American Cryptogram Association,
1968.
[PLA1] SCHMOO, "Asymetrical Playfair Cipher," MJ88, The
Cryptogram, American Cryptogram Association,
1988.
[PLA2] PHOENIX, "Playfair Square," MJ84, The Cryptogram,
American Cryptogram Association, 1984.
[PLA3] PHOENIX, "Playfair Square Reconstruction," JA84,
The Cryptogram, American Cryptogram Association,
1984.
[PLA4] PHOENIX, "Seriated Playfair ," SO88, The
Cryptogram, American Cryptogram Association,
1988.
[PLA5] S-TUCK, "First Principles of Playfair Cipher,"
JJ49, The Cryptogram, American Cryptogram
Association, 1949.
[PLA6] MI TAI TAI, "FracFair Cipher," JA66, The
Cryptogram, American Cryptogram Association,
1966.
[PLA7] SCRYER, "Key Reconstruction for Asymetric
Playfair Cipher," JA89, The Cryptogram, American
Cryptogram Association, 1989.
[PLA8] THE SQUIRE, "Mixed Sequence Playfairs," DJ41, The
Cryptogram, American Cryptogram Association,
1941.
[PLA9] MARSHEN, "More On George Ashton's Playfair Cipher
," JA68, The Cryptogram, American Cryptogram
Association, 1968.
[PLAa] S-TUCK, "New Layout for the Playfair Cipher,"
JJ42, The Cryptogram, American Cryptogram
Association, 1942.
[PLAb] THE RAT, "Octafair Cipher -Version of Playfair
Cipher ," MA91, The Cryptogram, American
Cryptogram Association, 1991.
[PLAc] PICCOLA, "Playfair Cipher," ON38, The Cryptogram,
American Cryptogram Association, 1938.
[PLAd] LEDGE, "Playfair Cipher," SO74, The Cryptogram,
American Cryptogram Association, 1974.
[PLAe] AB STRUSSE, "Playfair Symposium," SO84, The
Cryptogram, American Cryptogram Association,
1984.
[PLAf] Leonard, C.A., "Seriated Playfair ," JF38, The
Cryptogram, American Cryptogram Association,
1938.
[PO78] S. C. Pohlig and M. E. Hellman, "An improved
algorithm for computing logarithms over GF(p) and
its cryptographic significance," IEEE
Transactions on Information Theory, Vol. IT-24,
No. 1, January 1978, pp. 106-110.
[PO84] C. Pomerance, "The quadratic sieve factoring
algorithm," in T. Beth, N. Cot, and I.
Ingemarsson, Eds., Lecture Notes in Computer
Science Vol. 209: Advances in Cryptology:
proceedings of EUROCRYPT 84, a Workshop on the
Theory and Application of Cryptographic
Techniques, Paris, France, April 9-11, 1984, pp.
169- 182. Berlin/New York: Springer-Verlag, 1985.
[PO86] C. Pomerance, "Fast, rigorous factorization and
discrete logarithm algorithms," in D. S. Johnson,
T. Nishizeki, A. Nozaki, and H. S. Wilf, Eds.,
Discrete Algorithms and Complexity, proceedings
of the Japan-US Joint Seminar, Kyoto, Japan, June
4- 6, 1986, pp. 119-143. Orlando, FL: Academic
Press, 1987.
[PO88] C. Pomerance, J. W. Smith, and R. Tuler, "A
pipeline architecture for factoring large
integers with the quadratic sieve algorithm,"
SIAM Journal on Computing, Vol. 17, No. 2, April
1988, pp. 387-403.
[PO78] G. J. Popek and C. S. Kline, "Encryption
protocols, public key algorithms and digital
signatures in computer networks," in R. A.
DeMillo, D. P. Dobkin, A. K. Jones, and R. J.
Lipton, Eds., Foundations of Secure Computation,
pp. 133-153. New York: Academic Press, 1978.
[PO79] G. L. Popek and C. S. Kline, "Encryption and
secure computer networks," ACM Computing Surveys,
Vol. 11, No. 4, December 1979, pp. 331-356.
[PODE] Podesta, J., White House memo to Jerry Berman,
Digital Privacy and Security Working Group, on
Key Escrow Encryption Technology, July 29, 1993.
[POLL] Pollard, H. The Theory of Algebraic Numbers,
Carus Mathematical Mono., No. 9, New York: John
Wiley, 1950.
[POLU] PHOENIX, "Pollux Cipher Separators," SO83, The
Cryptogram, American Cryptogram Association,
1983.
[POLa] MEROMA, "Locating the X's in the Pollux Cipher ,"
MJ75, The Cryptogram, American Cryptogram
Association, 1975.
[POLb] B.NATURAL, "Pollux Cipher," SO74, The Cryptogram,
American Cryptogram Association, 1974.
[POLc] DUN SCOTUS, "Pollux Cipher," JF68, The
Cryptogram, American Cryptogram Association,
1968.
[POLd] FLORDELIS "How to Solve the Pollux Cipher," JA83,
The Cryptogram, American Cryptogram Association,
1983.
[POLI] CRYPTOGRAPHY: POLICY AND TECHNOLOGY TRENDS,
Hoffman, Lance, Faraz A. Ali, Steven L.
Heckler,Ann Huybrechts, December 1, 1993 ,Revised
January 30, 1994, under contract DE-AC05-
84OR21400
[POLL] L. Harris and Associates, Harris-Equifax Consumer
Privacy Survey 1992, New York: Louis Harris and
Associates, 1992.
[POLY] Polya, G., "Mathematics and Plausible Reasoning,"
Princeton Press, 1954.
[POL1] Polya, G., "How To Solve It.," Princeton Press,
1948.
[POPE] Pope, Maurice, "The Story of Decipherment: From
Egyptian Hieroglyphic to Linear B., Thames and
Hudson Ltd., 1975.
[PORG] Barker, Wayne G. "Cryptograms in Portuguese,"
Aegean Park Press, Laguna Hills, CA., 1986.
[PORT] AB STRUSE, "Breaking the Porta Auto-Key Cipher,"
ON49, The Cryptogram, American Cryptogram
Association, 1949.
[POR1] SOLDJER C, "Easier Porta ," MA89, The Cryptogram,
American Cryptogram Association, 1989.
[POR2] CODEX, "Keyed Alphabet Porta," MJ85, The
Cryptogram, American Cryptogram Association,
1985.
[POR3] O'PSHAW, "Porta Cipher- Special Case of the
Beaufort," MA91, The Cryptogram, American
Cryptogram Association, 1991.
[POR4] X.GOTKY, "Porta Auto-Key Cipher," AM44, The
Cryptogram, American Cryptogram Association,
1944.
[POR5] LEDGE, "Porta Cipher," MA72, The Cryptogram,
American Cryptogram Association, 1972.
[POR6] X.GOTKY, "Short Cut For Lining up Porta
Alphabets," AS46, The Cryptogram, American
Cryptogram Association, 1946.
[POR7] X.GOTKY, "ShortCuts For Lining up Porta
Alphabets," FM43, The Cryptogram, American
Cryptogram Association, 1943.
[POR8] PICCOLA, "Some Odds and Ends On the Porta
Cipher," JJ40, The Cryptogram, American
Cryptogram Association, 1940.
[PORa] Aliandro, Hygino, "The Portuguese-English
Dictionary," Pocket Books, New York, N.Y., 1960.
[PORX] RED E. RASER, "Portax Cipher," JJ53, The
Cryptogram, American Cryptogram Association,
1953.
[POX1] LEDGE, "Portax Cipher," JF73, The Cryptogram,
American Cryptogram Association, 1973.
[POX2] S-TUCK, "Portax Cipher Period Finding," FM50, The
Cryptogram, American Cryptogram Association,
1950.
[POST] Postman, N. (1992). "Technopoly: The Surrender
of Culture to Technology." Vintage Books
Division of Random House (New York). ISBN 0-679-
74540-8. xii + 222. Index.
[POUN] Poundstone, William, "Biggest Secrets," Quill
Publishing, New York, 1993. ( Explodes the Beale
Cipher Hoax.)
[PRIC] Price, A.,"Instruments of Darkness: the History
of Electronic Warfare, London, Macdonalds and
Janes, 1977.
[PRI1] W. Price, D. Davies, Security for computer
networks. Wiley, 1984.
[PRIV] Privacy Commissioner of Canada (1994). Annual
Report. Canada Communication Group (Ottawa).
ISBN 0-662-61245-0. iv + 69.
[PROT] "Protecting Your Privacy - A Comprehensive Report
On Eavesdropping Techniques and Devices and Their
Corresponding Countermeasures,"
Telecommunications Publishing Inc., 1979.
[PT10] Annonomous, "PT109 Cipher Message (President
Kennedy)," SO62, The Cryptogram, American
Cryptogram Association, 1962.
[QU87] M. J. Quinn, Designing Efficient Algorithms for
Parallel Computers. New York: McGraw-Hill, 1987.
[QU82] J.-J. Quisquater and C. Couvreur, "Fast
decipherment algorithm for RSA public-key
cryptosystem," Electronics Letters, Vol. 18, No.
21, October 14, 1982, pp. 905-907.
[QUAG] QUINCE, "Quagmire Cipher:A Personal Attack,"
JA92, The Cryptogram, American Cryptogram
Association, 1992.
[QUA1] MACHIAVELLI, "Alphabet Recovery in K4 Quagmire
Ciphers," SO59, The Cryptogram, American
Cryptogram Association, 1959.
[QUA2] DUBIOUS, "Cipher text Alphabets of Quagmire
Ciphers ," JASO59, The Cryptogram, American
Cryptogram Association, 1959.
[QUA3] CALIMER, "Double Quagmire Cipher," JF81, The
Cryptogram, American Cryptogram Association,
1981.
[QUA4] B.NATURAL, "Filling in the Quagmire Block with
the Least Amount of Values and Yet Finding the
Keywords(s)," SO58, The Cryptogram, American
Cryptogram Association, 1958.
[QUA5] O'PSHAW, "Double Quagmire Recovery of Non
Consecutive Key Alphabet," MJ88, The Cryptogram,
American Cryptogram Association, 1988.
[QUA6] BARGE, "Five by Five Quagmires," JF70, The
Cryptogram, American Cryptogram Association,
1970.
[QUA7] RED E. RASER, "Impressions on Quagmire III
Cipher," ON47, The Cryptogram, American
Cryptogram Association, 1947.
[QUA8] MACHIAVELLI, "Keyword IV: Its Use and Recovery in
Quagmires," MA69, The Cryptogram, American
Cryptogram Association, 1969.
[QUA9] DUBIOUS, "Mechanical Substitution for Quagmire
Ratios, " JA58, The Cryptogram, American
Cryptogram Association, 1958.
[QUAa] TONTO, "More about Theory of Substitutions in
Quagmire Ciphers," FM49, The Cryptogram, American
Cryptogram Association, 1949.
[QUAb] PHOENIX, "Quagmire Alphabet Merging and Ratios ,"
ND87, The Cryptogram, American Cryptogram
Association, 1987.
[QUAc] LEDGE, "Quagmire I and II Ciphers," SO73, The
Cryptogram, American Cryptogram Association,
1973.
[QUAd] LEDGE, "Quagmire III Ciphers," ND73, The
Cryptogram, American Cryptogram Association,
1973.
[QUAe] LEDGE, "Quagmire IV Ciphers," JF74, The
Cryptogram, American Cryptogram Association,
1974.
[QUAf] SCRYER, "Quagmire with Paper Strips," JF88, The
Cryptogram, American Cryptogram Association,
1988.
[QUAg] THE DOC, "Solution of Quagmire I without Tip,"
JA92, The Cryptogram, American Cryptogram
Association, 1992.
[QUAh] BOB O' LYNQUE, "Start on Quagmire Type III,"
FM54, The Cryptogram, American Cryptogram
Association, 1954.
[QUAi] TONTO, "Theory of Substitutions in Quagmire
Ciphers," FM48, The Cryptogram, American
Cryptogram Association, 1948.
[QUAj] S-TUCK, "Symmetry of Letter Positions in Key
Frame and recovery of the Keyword in Quagmire
Type III Ciphers," ON43 The Cryptogram, American
Cryptogram Association, 1943.
[QUAk] S-TUCK, "Symmetry of Letter Positions Quagmire
Frames ," ON50 The Cryptogram, American
Cryptogram Association, 1950.
[RA76] M. O. Rabin, "Probabilistic algorithms," in J. F.
Traub, Ed., Algorithms and Complexity: New
Directions and Recent Results, proceedings of a
Symposium, Pittsburgh, PA, April 7-9, 1976, pp.
21-39. New York: Academic Press, 1976.
[RA78] M. O. Rabin, "Digitalized signatures," in R. A.
DeMillo, D. P. Dobkin, A. K. Jones, and R. J.
Lipton, Eds., Foundations of Secure Computation,
pp. 155-168. New York: Academic Press, 1978.
[RA79] M. O. Rabin, "Digitalized signatures and public-
key functions as intractable as factorization,"
MIT Laboratory for Computer Science, Technical
Report LCS/TR-212, January 1979.
[RA80] M. O. Rabin, "Probabilistic algorithms for
testing primality," Journal of Number Theory,
Vol. 12, 1980, pp. 128-138.
[RA64] H. Rademacher, Lectures on Elementary Number
Theory. New York: Blaisdell, 1964.
[RAG1] PHOENIX, "Ragbaby Decipherment," ND84, SO85,
JF86, The Cryptogram, American Cryptogram
Association, 1984, 1985, 1986.1950.
[RAG2] DR. CRYPTOGRAM, "Ragbaby Cipher,", JA55, The
Cryptogram, American Cryptogram Association,
1955.
[RAG3] LEDGE, "Ragbaby ," ND72, The Cryptogram, American
Cryptogram Association, 1972.
[RAG4] TEX TREMUS, "Ragbaby Redundancy," MJ92, The
Cryptogram, American Cryptogram Association,
1992.
[RAG5] FRINKUS, "Ragbaby Shaking Out," ND61, The
Cryptogram, American Cryptogram Association,
1961.
[RAG6] B. NATURAL, "Ragbaby-Without a Known Starting
Point, " ND60, The Cryptogram, American
Cryptogram Association, 1960.
[RAG7] B.NATURAL, "Rag-baby Cipher," MJ59, The
Cryptogram, American Cryptogram Association,
1959.
[RAJ1] "Pattern and Non Pattern Words of 2 to 6
Letters," G & C. Merriam Co., Norman, OK. 1977.
[RAJ2] "Pattern and Non Pattern Words of 7 to 8
Letters," G & C. Merriam Co., Norman, OK. 1980.
[RAJ3] "Pattern and Non Pattern Words of 9 to 10
Letters," G & C. Merriam Co., Norman, OK. 1981.
[RAJ4] "Non Pattern Words of 3 to 14 Letters," RAJA
Books, Norman, OK. 1982.
[RAJ5] "Pattern and Non Pattern Words of 10 Letters," G
& C. Merriam Co., Norman, OK. 1982.
[RAIL] MACHIAVELLI, "Railfence: Method of Solving,"
MA61, The Cryptogram, American Cryptogram
Association, 1961.
[RAI1] SNAIL PACE, "More Simplification in Solving the
Railfence," JA84, The Cryptogram, American
Cryptogram Association, 1984.
[RAI2] FIDDLE, "Railfence: Calculus of," AM50, The
Cryptogram, American Cryptogram Association,
1950.
[RAI3] LEDGE, "Railfence," ND74, The Cryptogram,
American Cryptogram Association, 1974.
[RAI4] RIG R MORTIS, "Railfence, Sidelights of," JA59,
The Cryptogram, American Cryptogram Association,
1959.
[RAI5] TEEPEE, "Railfence, Solving a Normal," MA66, The
Cryptogram, American Cryptogram Association,
1966.
[RAI6] SNAIL PACE, "Simplification in Solving the
Railfence," MA84, The Cryptogram, American
Cryptogram Association, 1984.
[RAND] Randolph, Boris, "Cryptofun," Aegean Park Press,
1981.
[REDE] FRINKUS, "Redefence Cipher," JA65, The
Cryptogram, American Cryptogram Association,
1965.
[RED1] MACHIAVELLI, "Redefence Solving," MJ70, The
Cryptogram, American Cryptogram Association,
1970.
[RED2] SI SI, "Simplified Railfence and Redefence
Construction and Solving," JF83, The Cryptogram,
American Cryptogram Association, 1983.
[RB1] Friedman, William F., The Riverbank Publications,
Volume 1," Aegean Park Press, 1979.
[RB2] Friedman, William F., The Riverbank Publications,
Volume 2," Aegean Park Press, 1979.
[RB3] Friedman, William F., The Riverbank Publications,
Volume 3," Aegean Park Press, 1979.
[RCMP] RCMP (1992). "Small Systems Security
Guidelines". PW/GSC catalog #BT32-36/7-1992.
ISBN 0-662-59297-2. ISSN 1188-6315.
[RCM1] RCMP (1992). "Technical Security Standards for
Information Technology (TSSIT)". PW/GSC catalog
#BT32-36/6-1992. ISBN 0-662-59120-8.
[REED] J. Reeds, `Cracking' a Random Number Generator.
Cryptologia 1(1), 20--26, 1977.
[REE1] J. A. Reeds and P. J. Weinberger, File Security
and the UNIX Crypt Command. AT&T Bell
Laboratories Technical Journal, Vol. 63 #8, part
2, 1673--1684, October, 1984.
[REJE] Rejewski, Marian, "Mathematical Solution of the
Enigma Cipher" published in vol 6, #1, Jan 1982
Cryptologia pp 1-37.
[RELY] Relyea, Harold C., "Evolution and Organization of
Intelligence Activities in the United States,"
Aegean Park Press, 1976.
[RENA] Renauld, P. "La Machine a' chiffrer 'Enigma'",
Bulletin Trimestriel de l'association des Amis de
L'Ecole superieure de guerre no 78, 1978.
[RHEE] Rhee, Man Young, "Cryptography and Secure
Communications," McGraw Hill Co, 1994
[RIEB] Riebensehl, D., "Hyperbolische Komplex Raume und
die Vermutung von Mordell," Math Ann. 257,
(1981), 99-110.
[RIVE] Rivest, Ron, "Ciphertext: The RSA Newsletter 1,
1993.
[RI84] R. L. Rivest, "RSA chips (past/present/future),"
in T. Beth, N. Cot, and I. Ingemarsson, Eds.,
Lecture Notes in Computer Science Vol. 209:
Advances in Cryptology: proceedings of EUROCRYPT
84, a Workshop on the Theory and Application of
Cryptographic Techniques, Paris, France, April 9-
11, 1984, pp. 159-165. Berlin/New York:
Springer-Verlag, 1985.
[RI90] R. L. Rivest, "The MD4 message digest algorithm,"
February 1990.
[RIV1] Rivest, R. "The MD5 Message-Digest Algorithm",
RFC1321, April 1992
[RI78] R. L. Rivest, A. Shamir, and L. Adleman, "A
method for obtaining digital signatures and
public-key cryptosystems," Communications of the
ACM, Vol. 21, No. 2, February 1978, pp. 120-
127.
[RI82] R. L. Rivest and A. T. Sherman, "Randomized
encryption techniques," in D. Chaum, R. L.
Rivest, and A. T. Sherman, Eds., Advances in
Cryptology: Proceedings of CRYPTO 82, a Workshop
on the Theory and Application of Cryptographic
Techniques, Santa Barbara, CA, August 23-25,
1982, pp. 145-163. New York: Plenum Press, 1983.
[RIV1] Rivest, Ron, Shamir, A and L. Adleman, "A Method
for Obtaining Digital Signatures and Public Key
Cryptosystems," Communications of the ACM 21,
1978.
[Rive] Rivest, R., 1992, ``Responses to NIST's
Proposal,'' Communications of the ACM, Vol. 35
(7), July 1992, pp. 41-47.
[ROAC] Roach, T., "Hobbyist's Guide To COMINT Collection
and Analysis," 1330 Copper Peak Lane, San Jose,
Ca. 95120-4271, 1994.
[ROBO] NYPHO, The Cryptogram, Dec 1940, Feb, 1941.
[ROHE] Jurgen Rohwer's Comparative Analysis of Allied
and Axis Radio-Intelligence in the Battle of the
Atlantic, Proceedings of the 13th Military
History Symposium, USAF Academy, 1988, pp 77-109.
[ROHW] Rohwer Jurgen, "Critical Convoy Battles of March
1943," London, Ian Allan, 1977.
[ROH1] Rohwer Jurgen, "Nachwort: Die Schlacht im
Atlantik in der Historischen Forschung, Munchen:
Bernard and Graefe, 1980.
[ROH2] Rohwer Jurgen, et. al. , "Chronology of the War
at Sea, Vol I, 1939-1942, London, Ian Allan,
1972.
[ROH3] Rohwer Jurgen, "U-Boote, Eine Chronik in Bildern,
Oldenburs, Stalling, 1962. Skizzen der 8 Phasen.
[ROOM] Hyde, H. Montgomery, "Room 3603, The Story of
British Intelligence Center in New York During
World War II", New York, Farrar, Straus, 1963.
[ROSE] Budge, E. A. Wallis, "The Rosetta Stone," British
Museum Press, London, 1927.
[ROSL] Rose, L. J. (1994). "NetLaw: Your Rights in the
Online World". Osborne/McGraw-Hill (New York).
ISBN 0-07-882077-4. xx + 372. Index.
[ROSN] Rosenblatt, K. S. (1995). "High-Technology
Crime: Investigating Cases Involving Computers".
KSK Publications (P.O. Box 934, San Jose, CA
95108-0934; tel. 408-296-7072). 603 pp +
diskette.
[Ro89] Rotenberg, M., 1989, Testimony on Military and
Security Control of Computer Security, Before the
Subcommittee on Legislation and National Security
of the House Committee on Government Operations,
101st Congress, 1st Session 80, May 4, 1989,
Washington, DC.
[Ro93] Rotenberg, M., 1993, ``Communications Privacy:
Implications for Network Design,'' Communications
of the ACM, Vol. 36 (8), August 1993, pp. 61- 68.
[RSA] RSA Data Security, Inc., "Mailsafe: Public Key
Encryption Software Users Manual, Version 5.0,
Redwood City, CA, 1994
[RSA1] RSA Data Security, Inc. "Cryptographic Message
Syntax Standard", PKCS-7, Nov 1, 1993.
[RUEP] R. Rueppel, Design and Analysis of Stream
Ciphers. Springer-Verlag, 1986.
[RUNY] Runyan, T. J. and Jan M. Copes "To Die
Gallently", Westview Press 1994, p85-86 ff.
[RUSS] Russell, D. & G. T. Gangemi Sr (1991). "Computer
Security Basics". O'Reilly & Assoc (Sebastopol,
CA). ISBN 0-937175-71-4. xx + 448. Index.
[RYP1] A B C, "Adventures in Cryptarithms (digital
maze)," JA63, The Cryptogram, published by the
American Cryptogram Association, 1963.
[RYP2] CROTALUS "Analysis of the Classic
Cryptarithm,"MA73, The Cryptogram, published by
the American Cryptogram Association, 1973.
[RYP3] CLEAR SKIES "Another Way To Solve
Cryptarithms,"DJ44, The Cryptogram, published by
the American Cryptogram Association, 1944.
[RYP4] CROTALUS "Arithemetic in Other Bases (Duodecimal
table),"JF74, The Cryptogram, published by the
American Cryptogram Association, 1974.
[RYP5] LEDGE, "Basic Patterns in Base Eleven and Twelve
Arithmetic,"SO77, ND77, The Cryptogram, published
by the American Cryptogram Association,
1977,1977.
[RYP6] COMPUTER USER, "Computer Solution of
Cryptarithms," JF72, The Cryptogram, published by
the American Cryptogram Association, 1972.
[RYP7] PIT, "Cryptarithm Crutch," JA80, The Cryptogram,
published by the American Cryptogram Association,
1980.
[RYP8] DENDAI, DICK, "Cryptarithm Ccub root," ND76, The
Cryptogram, published by the American Cryptogram
Association, 1976.
[RYP9] S-TUCK, "Cryptarithm in Addition," AM44, The
Cryptogram, published by the American Cryptogram
Association, 1944.
[RYPA] APEX DX, "Cryptarithm Line of Attack," ND91, The
Cryptogram, published by the American Cryptogram
Association, 1991.
[RYPB] HUBBUBBER and CROTALUS, "Cryptarithm
Observations," ND73, The Cryptogram, published by
the American Cryptogram Association, 1973.
[RYPC] CROTALUS, "Cryptarithms and Notation," JF73, The
Cryptogram, published by the American Cryptogram
Association, 1973.
[RYPD] JUNKERL, "Cryptarithms: The digital root method,"
AS43, The Cryptogram, published by the American
Cryptogram Association, 1943.
[RYPE] CROTALUS, "Divisibility by Eleven," ND89, The
Cryptogram, published by the American Cryptogram
Association, 1989.
[RYPF] S-TUCK, "Double Key Division," JJ43, The
Cryptogram, published by the American Cryptogram
Association, 1943.
[RYPG] NEOTERIC, "Duo-Decimal Cryptarithms," AM40, The
Cryptogram, published by the American Cryptogram
Association, 1940.
[RYPH] QUINTUPLEX, "Duo-Decimal Cryptarithms," JJ40, The
Cryptogram, published by the American Cryptogram
Association, 1940.
[RYPI] FIDDLE, "Exhausitive for Three," JF59, The
Cryptogram, published by the American Cryptogram
Association, 1959.
[RYPJ] ---, "Finding the Zero In Cryptarithms," DJ42,
The Cryptogram, published by the American
Cryptogram Association, 1942.
[RYPK] FILM-D, "Greater than Less than Diagram for
Cryptarithms," DJ51, The Cryptogram, published by
the American Cryptogram Association, 1951.
[RYPL] MI TI TI, "Introduction To Cryptarithms," SO63,
The Cryptogram, published by the American
Cryptogram Association, 1963.
[RYPM] FORMALHUT, "Leading Digit Analysis in
Cryptarithms," JA91, The Cryptogram, published by
the American Cryptogram Association, 1991.
[RYPN] CROTALUS, "Make Your Own Arithmetic Tables In
Other Bases," MJ89, The Cryptogram, published by
the American Cryptogram Association, 1989.
[RYPO] BACEDI, "Method for Solving Cryptarithms," JF78,
The Cryptogram, published by the American
Cryptogram Association, 1978.
[RYPP] SHERLAC, "More on Cryptarithms," DJ44, The
Cryptogram, published by the American Cryptogram
Association, 1944.
[RYPQ] FIRE-O, "Multiplicative Structures," MJ70, The
Cryptogram, published by the American Cryptogram
Association, 1970.
[RYPR] CROTALUS, "Solving A Division Cryptarithm," JA73,
The Cryptogram, published by the American
Cryptogram Association, 1973.
[RYPS] CROTALUS, "Solving A Multiplication Cryptarithm,"
MJ73, The Cryptogram, published by the American
Cryptogram Association, 1973.
[RYPT] PHOENIX, "Some thoughts on Solving Cryptarithms,"
SO87, The Cryptogram, published by the American
Cryptogram Association, 1987.
[RYPU] CROTALUS, "Square Root Cryptarithms," SO73, The
Cryptogram, published by the American Cryptogram
Association, 1973.
[RYPV] FIDDLE, "Theory of Duplicated Digital Figures,"
JJ53, The Cryptogram, published by the American
Cryptogram Association, 1953.
[RYPW] FIDDLE, "Theory of Three Unlike Digital Figures,"
AS52, The Cryptogram, published by the American
Cryptogram Association, 1952.
[RYPX] CROTALUS, "Unidecimal Tables," MJ73, The
Cryptogram, published by the American Cryptogram
Association, 1973.
[RYSK] Norbert Ryska and Siegfried Herda,
"Kryptographische Verfahren in der
Datenverarbeitung," Gesellschaft fur Informatik,
Berlin, Springer-Verlag1980.
[SADL] Sadler, A. L., "The Code of the Samurai," Rutland
and Tokyo: Charles E. Tuttle Co., 1969.
[SACC] Sacco, Generale Luigi, " Manuale di
Crittografia", 3rd ed., Rome, 1947.
[SALE] Salewski, Michael, "Die Deutscher
Seekriegsleitung, 1938- 1945, Frankfurt/Main:
Bernard and Graefe, 1970-1974. 3 volumes.
[SALO] A. Saloma, Public-key cryptography. Springer-
Verlag, 1990.
[SANB] Sanbohonbu, ed., "Sanbohonbu kotokan shokuinhyo."
NIDS Archives.
[SAPR] Sapir, E., "Conceptual Categories in Primitive
Language," Science: 74: 578-584., 1931.
[SAFF] Safford, L.F. (1943) History of Invention And
Development of the Mark II ECM (Electric Cipher
Machine) available from NARA. SRH-360 in RG 0457:
NSA/CSS Finding Aid A1, 9020 US Navy Records
Relating to Cryptology 1918- 1950 Stack 190 Begin
Loc 36/12/04 Location 1-19. In Feb 1996 the
version at NARA was redacted, but the full
document is now declassified.
[SAS-] Descriptions of the the Authentication Systems
may be found in: Survey Of Authentication Systems
1942-45 (1945), NARA; NSA Historical Collections
190/37/7/1, NR 3526 CBRK24 12960A 19420728.
[SFUS] Submarine Force U.S. Pacific Fleet (1944)
Cryptographic Aids Check-Off List: available from
NARA, Pacific Sierra Regional Archive, 181-58-
3201, S1313, S372, A6-3/N36 Cryptographic Aids.
[SASS] Sassoons, George, "Radio Hackers Code Book",
Duckworth, London, 1986.
[SAWI] Sawicki, E. (1992). "LAN Desktop Guide to
Security, Netware Edition". SAMS (Div. of
Prentice-Hall, Carmel, IN). ISBN 0-672-30085-0.
xxix + 351. Index.
[SCHN] Schneier, Bruce, "Applied Cryptography:
Protocols, Algorithms, and Source Code C," John
Wiley and Sons, 1994.
[SCH2] Schneier, Bruce, "Applied Cryptography:
Protocols, Algorithms, and Source Code C," 2nd
ed., John Wiley and Sons, 1995.
[SCHU] Schuh, fred, "Master Book of Mathematical
Recreation," Dover, 1968.
[SCHB] Schwab, Charles, "The Equalizer," Charles Schwab,
San Francisco, 1994.
[Sc89] Schnorr, C., Procedures for the Identification of
Participants as well as the Generation and
Verification of Electronic Signatures in a
Digital Exchange System, German Patent Number
9010348.1, patent applied for February 24, 1989,
patent received August 29, 1990.
[Sc90] Schnorr, C., 1989, ``Efficient Identification and
Signatures for Smart Cards,'' Advances in
Cryptology --Crypto '89, Springer-Verlag, New
York, 1990, pp. 239-251.
[Sc9b] Schnorr, C., Method for Identifying Subscribers
and for Generating and Verifying Electronic
Signatures in a Data Exchange System, U.S. Patent
Number 4995082, patent applied for February 23,
1990, patent received February 19, 1991.
[SCHW] Schwartau, W. (1991). "Terminal Compromise"
(novel). Inter.Pact Press (Seminole, FL). ISBN
0-962-87000-5. 562 pp.
[SCH1] Schwartau, W. (1994). "Information Warfare:
Chaos on the Electronic Superhighway". Thunder's
Mouth Press (New York). ISBN 1-56025-080-1. 432
pp. Index.
[SCH2] Schwartau, W. (1997). "Information Warfare"
2nd Edition. Thunder's Mouth Press (New York).
600 pp. Index.
[SC82] B. P. Schanning, "Applying public key
distribution to local area networks," Computers &
Security, Vol. 1, No. 3, November 1982, pp. 268-
274.
[SC80] B. P. Schanning, S. A. Powers, and J. Kowalchuk,
"MEMO: privacy and authentication for the
automated office," in proceedings of the 5th
Conference on Local Computer Networks,
Minneapolis, MN, October 6-7, 1980, pp. 21-30.
Silver Spring, MD: IEEE Computer Society Press,
1980.
[SC84] C. P. Schnorr and H. W. Lenstra, Jr., "A Monte
Carlo factoring algorithm with linear storage,"
Mathematics of Computation, Vol. 43, No. 167,
July 1984, pp. 289-311.
[SE87] H. Sedlak, "The RSA Cryptography Processor," in
D. Chaum and W. L. Price, Eds., Lecture Notes in
Computer Science Vol. 304: Advances in
Cryptology - EUROCRYPT '87, a Workshop on the
Theory and Applications of Cryptographic
Techniques, Amsterdam, The Netherlands, April 13-
15, 1987, pp. 95-105. Berlin/New York: Springer-
Verlag, 1988.
[SE85] C. L. Seitz, "The Cosmic Cube," Communications of
the ACM, Vol. 28, No. 1, January 1985, pp. 22-33.
[SEBE] Seberry, Jennifer and Joseph Pieprzyk,
"Cryptography: An Introduction to Computer
Security," Prentice Hall, 1989. [CAREFUL! Lots
of Errors - Basic research efforts may be flawed
- see Appendix A pg 307 for example.]
[SHIM] Shimomura, T. & J. Markoff (1996). "Takedown:
The Pursuit and Capture of Kevin Mitnick,
America's Most Wanted Computer Outlaw--by the Man
Who Did It". Hyperion (New York). ISBN 0-7868-
6210-6. xii + 324. Index.
[SHAF] Shafi Goldwasser, Silvio Micali, Probabilistic
Encryption and How To Play Mental Poker Keeping
Secret All Partial Information. Proceedings of
the Fourteenth Annual ACM Symposium on Theory of
Computing, 1982.
[SHAN] Shannon, C. E., "The Communication Theory of
Secrecy Systems," Bell System Technical Journal,
Vol 28 (October 1949).
[SHAN] C. Shannon, Communication Theory of Secrecy
Systems. Bell System Technical Journal 28(4),
656--715, 1949.
[SHEM] B. Kaliski, R. Rivest, A. Sherman, Is the Data
Encryption Standard a Group. Journal of
Cryptology, vol. 1, #1, 1--36, 1988.
[SHIM] A. Shimizu, S. Miyaguchi, Fast data encipherment
algorithm FEAL. EUROCRYPT '87, 267--278, 1988.
[SHIN] Shinsaku Tamura, "Myohin kosaku," San'ei
Shuppansha, Toyko, 1953.
[SHOR] Shorey, T. N., et al., "Applications of the
Gel'fond-Baker method to Diophantine equations,
Transcendence Theory; Advances and Applications,"
Academic Press, 1977.
[SHUL] Shulman, David, "An Annotated Bibliography of
Cryptography," Garland Publishing, New York,
1976.
[SHUS] Shulsky, A. N., "Silent Warfare: Understanding
The World of Intelligence", Brassey's (US),New
York, 1991.
[SHIR] K. Shirriff, C. Welch, A. Kinsman, Decoding a
VCR Controller Code. Cryptologia 16(3), 227--234,
1992.
[SHTP] E. Rescorla, E., and A. Schiffman, INTERNET-
DRAFT, "The Secure HyperText Transfer Protocol,"
Enterprise Integration Technologies, December
1994
[SH79] A. Shamir, "On the cryptocomplexity of knapsack
systems," in proceedings of the Eleventh Annual
ACM Symposium on Theory of Computing, Atlanta,
GA, April 30 -May 2, 1979, pp. 118-129. New York:
ACM, 1979.
[SH84] A. Shamir, "Identity-based cryptosystems and
signature schemes," in G. R. Blakley and D.
Chaum, Eds., Lecture Notes in Computer Science
Vol. 196: Advances in Cryptology: Proceedings of
CRYPTO 84, a Workshop on the Theory and
Application of Cryptographic Techniques, Santa
Barbara, CA, August 19-22, 1984,
pp. 47-53. Berlin/New York: Springer-Verlag,
1985.
[S84a] A. Shamir, "A polynomial-time algorithm for
breaking the basic Merkle-Hellman cryptosystem,"
IEEE Transactions on Information Theory, Vol. IT-
30, No. 5, September 1984, pp. 699-704.
[SH90] M. Shand, P. Bertin, and J. Vuillemin, "Hardware
speedups in long integer multiplication,"
presented at the Second ACM Symposium on Parallel
Algorithms and Architectures, Crete, July 2- 6,
1990.
[Silv] Silverman v. United States, 365 U.S. 505, 1961.
[SI90] "Number field sieve produces factoring
breakthrough," SIAM News, Vol. 23, No. 4, July
1990.
[SI87] R. D. Silverman, "The multiple polynomial
quadratic sieve," Mathematics of Computation,
Vol. 48, No. 177, January 1987, pp. 329-339.
[SI79] G. J. Simmons, "Symmetric and asymmetric
encryption," ACM Computing Surveys, Vol. 11, No.
4, December 1979, pp. 305-330.
[SI88] G. J. Simmons, "How to ensure that data acquired
to verify treaty compliance are trustworthy,"
Proceedings of the IEEE, Vol. 76, No. 5, May
1988, pp. 621-627.
[SIMM] G. Simmons (ed.), Contemporary Cryptology: the
Science of Information Integrity. IEEE press,
1991.10.4. Reference articles
[SIC1] S.I. Course in Cryptanalysis, Volume I, June
1942, Aegean Park Press, Laguna Hills , CA.
1989.
[SIC2] S.I. Course in Cryptanalysis, Volume II, June
1942, Aegean Park Press, Laguna Hills , CA.
1989.
[SIG1] "International Code Of Signals For Visual, Sound,
and Radio Communications," Defense Mapping
Agency, Hydrographic/Topographic Center, United
States Ed. Revised 1981
[SIG2] "International Code Of Signals For Visual, Sound,
and Radio Communications," U. S. Naval
Oceanographic Office, United States Ed., Pub.
102, 1969.
[SIMM] Simmons, G. J., "How To Insure that Data Acquired
to Verify Treaty Compliance are Trustworthy, " in
"Authentication without secrecy: A secure
communications problem uniquely solvable by
asymmetric encryption techniques.", IEEE EASCON
79, Washington, 1979, pp. 661-62.
[SINK] Sinkov, Abraham, "Elementary Cryptanalysis", The
Mathematical Association of America, NYU, 1966.
[SLAT] Slatalla, M. & J. Quittner (1995). "Masters of
Deception: The Gang that Ruled Cyberspace".
HarperCollins (New York). ISBN 0-06-017030-1.
225 pp.
[SmBr] Smid, M. and Branstad, D., 1988, ``The Data
Encryption Standard: Past and
Future,''Proceedings of the IEEE}, Vol. 76 (5),
pp. 550-559, May, 1988.
[SM81] M. E. Smid, "Integrating the data encryption
standard into computer networks," IEEE
Transactions on Computers, Vol. COM-29, No. 6,
June 1981, pp. 762-772.
[SM88] M. E. Smid and D. K. Branstad, "The Data
Encryption Standard: past and future,"
Proceedings of the IEEE, Vol. 76, No. 5, May
1988, pp. 550-559.
[SMIH] Smith, David E., "John Wallis as Cryptographer",
Bulletin of American Mathematical Society, XXIV,
1917.
[SMIT] Smith, Laurence D., "Cryptography, the Science of
Secret Writing," Dover, NY, 1943.
[SMIV] Smith, G. (1994). "The Virus Creation Labs: A
Journey into the Underground". American Eagle
Publications (Tucson, AZ). ISBN 0-929408-09-8.
172 pp.
[SO85] Salomaa, "Cryptography," in A. Salomaa,
Encyclopedia of Mathematics and its Applications
Vol. 25: Computation and Automata, pp. 186-230.
Cambridge, UK: Cambridge University Press, 1985.
[SOLS] Solms, Von S., and D. Naccache, "On Blind
Signatures and Perfect Crimes," Computers and
Security vol. 11, no. 6 (October 1992): 581- 583.
[SOLZ] Solzhenitsyn, Aleksandr I. , "The Gulag
Archipelago I-III, " Harper and Row, New York,
N.Y., 1975.
[SORK] A. Sorkin, LUCIFER: a cryptographic algorithm.
Cryptologia, 8(1), 22--35, 1984.
[SO77] R. Solovay and V. Strassen, "A fast Monte-Carlo
test for primality," SIAM Journal on Computing,
Vol. 6, No. 1, March 1977, pp. 84-85. Erratum:
Ibid., Vol. 7, No. 1, February 1978, p. 118.
[SPAN] Barker, Wayne G. "Cryptograms in Spanish," Aegean
Park Press, Laguna Hills, CA., 1986.
[SPIL] R. Spillman et al., Use of Genetic Algorithms in
Cryptanalysis of Simple Substitution Ciphers.
Cryptologia 17(1), 31--44, 1993.
[SP94] Software Publishers Association, Trusted
Information Systems and Hoffman Business
Associates, 1994, Encryption Products Database
Statistics, March 1994.
[SP93] Software Publishers Association, 1993,Foreign
Text, File, Data Encryption Programs and Products
Identified by the SPA, October 9, 1993.
[SSSC] System Security Study Committee, 1991 Computers
at Risk: Safe Computing in the Information Age,
National Academy Press, 1991.
[ST86] L. K. Steiner, "The ETA-10 supercomputer system,"
in Proceedings of the 1986 IEEE International
Conference on Computer Design, Port Chester, NY,
October 6-9, p. 42. Washington, DC: IEEE
Computer Society Press, 1986.
[STAL] Stallings, William, "Protect Your Privacy: A
Guide for PGP Users," Prentice Hall PTR, 1995.
[STA1] Stallings, W. (1995). "Network and Internetwork
Security: Principles and Practice". Prentice
Hall (Englewood Cliffs, NJ). ISBN 0-02-415483-0.
xiii + 462. Index.
[STAN] Stang, D. J. & S. Moon (1993). "Network Security
Secrets". IDG Books Worldwide Inc. (San Mateo,
CA). ISBN 1-56884-021-7. xxxiii + 1166. Index.
[STER] Sterling, B. (1992). "The Hacker Crackdown: Law
and Disorder on the Electronic Frontier". Bantam
Doubleday Dell (New York). ISBN 0-553-08058-X.
xiv + 328. Index.
[STEV] Stevenson, William, 'A Man Called INTREPID',
Macmillan, London 1976.
[STEW] Stewart, "C. L., On some Diophantine Equations
and Related Linear Recurrence Sequences." Univ.
of Waterloo, Ontario, Canada. 1980.
[STIN] Stinson, D. R., "Cryptography, Theory and
Practice," CRC Press, London, 1995.
[STIX] Stix, F., Zur Geschicte und Organisation der
Wiener Geheimen Ziffernkanzlei, Mitteilungen des
Osterreichischen Instituts fir
Geschichtsforschung,
LI 1937.
[STOL] Stoll, C. (1989). "The Cuckoo's Egg: Tracking a
Spy Through the Maze of Computer Espionage".
Pocket Books (Simon & Schuster, New York). ISBN
0-671-72688-9. viii + 356.
[STUR] Sturtevant, E. H. and Bechtel, G., "A Hittite
Chrestomathy," Linguistic Society of American and
University of Pennsylvania, Philadelphia, 1935.
[SURV] Austin, Richard B.,Chairman, "Standards Relating
To Electronic Surveillance," American Bar
Association Project On Minimum Standards For
Criminal Justice, Tentative Draft, June, 1968.
[SUVO] Suvorov, Viktor "Inside Soviet Military
Intelligence," Berkley Press, New York, 1985.
[TA81] A. S. Tanenbaum, Computer Networks. Englewood
Cliffs, NJ: Prentice-Hall, 1981.
[TERR] Terrett, D., "The Signal Corps: The Emergency (to
December 1941); G. R. Thompson, et. al, The Test(
December 1941 - July 1943); D. Harris and G.
Thompson, The Outcome;(Mid 1943 to 1945),
Department of the Army, Office of the Chief of
Military History, USGPO, Washington,1956 -1966.
[THEO] Theodore White and Annalee Jacoby, "Thunder Out
Of China," William Sloane Assoc., New York, 1946.
[THE1] Marie-Jose Bertin, ed.:Seminaire de Theorie des
Nombres, Paris 1980-81.
[THE2] Catherine Goldstein, ed.: Serge Lang {in FRENCH}:
Seminaire de Theorie des Nombres, Paris 1984-85,
[THOM] Thompson, Ken, "Reflections on Trusting Trust,"
Communications of the ACM 27, 1984.
[TIII] Title III of the Omnibus Crime Control and Safe
Streets Act, 18 U.S.C. Sec. 2510 , et seq.
[TIJD] Tijdeman, R., "Exponential Diophantine Equations"
Proc. Intern. Congress Math., Helsinki (1978)
p381-387.
[TILD] Glover, D. Beaird, Secret Ciphers of The 1876
Presidential Election, Aegean Park Press, Laguna
Hills, Ca. 1991.
[TM32] TM 32-250, Fundamentals of Traffic Analysis
(Radio Telegraph) Department of the Army, 1948.
[TORR] Torrieri, Don J., "Principles of Military
Communication Systems," Artech, 1981.
[TRAD] U. S. Army Military History Institute,
"Traditions of The Signal Corps., Washington,
D.C., USGPO, 1959.
[TRAN] SI SI, "Analysis of the Skipping Tramp Cipher -
Part 1," MA80, The Cryptogram, published by the
American Cryptogram Association, 1980.
[TRA1] SI SI, "Analysis of the Skipping Tramp Cipher -
Part 2," MJ80, The Cryptogram, published by the
American Cryptogram Association, 1980.
[TRA2] PICCOLA, "Another method for Finding Key-Length
for Columnar Transposition," AS39, The
Cryptogram, published by the American Cryptogram
Association, 1939.
[TRA3] PICCOLA, "Columnar Transposition - Random
Approach," ON39, The Cryptogram, published by the
American Cryptogram Association, 1939.
[TRA4] PHOENIX, "Complete Columnar Transpositon," MJ86,
The Cryptogram, published by the American
Cryptogram Association, 1986.
[TRA5] PHOENIX, "Complete Columnar Transpositon," JA86,
The Cryptogram, published by the American
Cryptogram Association, 1986.
[TRA6] PHOENIX, "CRUX Columnar Transpositon," SO86, The
Cryptogram, published by the American Cryptogram
Association, 1986.
[TRA7] PHOENIX, "Incomplete Columnar Transpositon: Crib
Breaking," MA87, The Cryptogram, published by the
American Cryptogram Association, 1987.
[TRA8] PHOENIX, "Incomplete Columnar Transpositon-
Revisited," SO87, The Cryptogram, published by
the American Cryptogram Association, 1987.
[TRA9] PHOENIX, "Incomplete Columnar Transpositon,"
ND86, The Cryptogram, published by the American
Cryptogram Association, 1986.
[TRA0] PHOENIX, "Incomplete Columnar Transpositon,"
JF87, The Cryptogram, published by the American
Cryptogram Association, 1987.
[TRAa] PHOENIX, "Incomplete Columnar Transpositon,"
MJ87, The Cryptogram, published by the American
Cryptogram Association, 1987.
[TRAb] SI SI, "Dissociative Coding" JA81, The
Cryptogram, published by the American Cryptogram
Association, 1981.
[TRAc] SI SI, "Double Transposition," MA87, The
Cryptogram, published by the American Cryptogram
Association, 1987.
[TRAd] NEOTERIC, "Geometric Forms for Transpositon,"
AS41, The Cryptogram, published by the American
Cryptogram Association, 1941.
[TRAe] TRYIT, "Observations about Transpositions," JJ41,
AS41 The Cryptogram, published by the American
Cryptogram Association, 1941.
[TRAf] ___, "Patterns of Route Transpositions," AM53,
The Cryptogram, published by the American
Cryptogram Association, 1953.
[TRAg] AB STRUSE, "Penny Tramp Cipher,"SO79, The
Cryptogram, published by the American Cryptogram
Association, 1979.
[TRAh] SI SI, "Penny Tramp Cipher," JF80, The
Cryptogram, published by the American Cryptogram
Association, 1980.
[TRAi] TATTERS, "Skipping Tramp Cipher," JF80, The
Cryptogram, published by the American Cryptogram
Association, 1980.
[TRAj] TATTERS, "Skipping Tramp Cipher," MA80, The
Cryptogram, published by the American Cryptogram
Association, 1980.
[TRAk] GUNG HO, "Solving the Complete Columnar Single
Transposition Cryptogram, Succeed Every Time!,"
SO88, The Cryptogram, published by the American
Cryptogram Association, 1988.
[TRAl] DAN SURR, "Solving the skipping Tramp Cipher,"
MJ80, The Cryptogram, published by the American
Cryptogram Association, 1980.
[TRAm] SI SI, "Transpositon Algorithms and Equivalent
Linear Permutations," JA87, The Cryptogram,
published by the American Cryptogram Association,
1987.
[TRAn] GENIAL, "Transposition Ciphers with Identical
Plain Text Ends," FM40, AM40, The Cryptogram,
published by the American Cryptogram Association,
1940.
[TRAo] SCRYER, "Tromping the Penny Tramp Cipher," JF80,
The Cryptogram, published by the American
Cryptogram Association, 1980.
[TRAj] GUNG HO, "Validating the Solution of a Single
Columnar Double Transposition Cryptogram, " ND88,
The Cryptogram, published by the American
Cryptogram Association, 1988.
[TRIB] Anonymous, New York Tribune, Extra No. 44, "The
Cipher Dispatches, New York, 1879.
[TRIT] Trithemius:Paul Chacornac, "Grandeur et Adversite
de Jean Tritheme ,Paris: Editions Traditionelles,
1963.
[TUCK] Harris, Frances A., "Solving Simple Substitution
Ciphers," ACA, 1959.
[Tuer] Tuerkheimer, F., 1993, ``The Underpinnings of
Privacy Protection,'' Communications of the ACM,
Vol. 36 (8), August 1993, pp. 69-73.
[TUKK] Tuckerman, B., "A Study of The Vigenere-Vernam
Single and Multiple Loop Enciphering Systems,"
IBM Report RC2879, Thomas J. Watson Research
Center, Yorktown Heights, N.Y. 1970.
[TURB] Turnbull, H. W., The Great Mathematicians, New
York: NYU Press, 1961.
[TURN] Turn, Rein, "Advances in Computer Security,"
Artec House, New York, 1982. [Original papers on
Public Key Cryptography, RSA, DES]
[UBAL] Ubaldino Mori Ubaldini, "I Sommergibili begli
Oceani: La Marina Italian nella Seconda Guerra
Mondiale," vol XII, Roma, Ufficio Storico della
Marina Militare, 1963.
[UDoT] U.S. Department of Treasury, 1985, Criteria and
Procedures for Testing, Evaluating, and
Certifying Message Authentication Devices for
Electronic Funds Transfer Use, May, 1, 1985,
Washington, DC.
[USAA] U. S. Army, Office of Chief Signal Officer,
"Instructions for Using the Cipher Device Type M-
94, February, 1922," USGPO, Washington, 1922.
[USAH] Gilbert, James L. and John P. Finnegan, Eds. "U.
S. Army Signals Intelligence in World War II: A
Documentary History," Center of Military
History, United States Army, Washington, D.C.
1993
[USC] U.S. Congress, Office of Technology Assessment,
1987, Defending Secrets, Sharing Data: New Locks
and Keys for Electronic Information, OTA-CIT-310,
Washington, D.C: Government Printing Office,
October, 1987, Washington, DC.
[USDJ] United States. Dept. of Justice. Authorization
Procedures For Release Of Encryption Key
Components. Washington, DC: N.p., 4Feb. 1994.
USENET: alt.privacy.clipper.
[USGA] United States General Accounting Office, 1992,
``Advanced Communications Technologies Pose
Wiretapping Challenges,' Briefing Report to the
Chairman, Subcommittee on Telecommunications and
Finance, Committee on Energy and Commerce, House
of Representatives, July 1992, Washington, DC.
[USHR] House Report 100-153, 1987, Part 2, the Committee
on Government Operations' Report on the Computer
Security Act of 1987, Washington, DC.
[US92] Hearing before the House Judiciary Subcommittee
on Economic and Commercial Law, May 7, 1992,
Washington, DC.
[USNA] US Naval Administration in WW II, History of
Naval Communications, 1939-1945. Op-20A-asz, A12,
Serial 00362P20, 7 Apr 1948. available from the
Naval Historical Center; WW II Command File CNO;
Communications History; Microfiche No. F3561.
[USS] United States Senate, 1974, Final Report of the
Select Committee to Study Governmental Operations
with respect to Intelligence Activities, April,
26, 1974, Washington, DC.
[USSF] "U.S. Special Forces Operational Techniques," FM
31-20, Headquarters Department Of The Army,
December 1965.
[US4] United States. Fourth Amendment, ftp.eff.org
file.
[USTF] ------. Testimony. Subcommittee on Economic
Policy, Trade and Environment Committee on
Foreign Affairs U.S. House of Representatives.
Washington DC, 12 Oct. 1993. ftp.eff.org file.
[USOT] "U.S. Special Forces Recon Manual," Elite Unit
Tactical Series, Lancer, Militaria, Sims, ARK.
71969, 1982.
[VACC] Vacca, John, "Internet Security Secrets," IDG
Books, New York, 1996.
[VAIL] Vaille, Euggene, Le Cabinet Noir, Paris Presses
Universitaires de Frances, 1950.
[VALE] Valerio, "De La Cryptographie," Journal des
Scienses militares, 9th series, Dec 1892 - May
1895, Paris.
[VAND] Van de Rhoer, E., "Deadly Magic: A personal
Account of Communications Intilligence in WWII in
the Pacific, New York, Scriber, 1978.
[VARI] ----,"Varietes Hyperboliques et Analyse
Diophantienne," Univ of California, Berkley,
1986.
[VERN] Vernam, A. S., "Cipher Printing Telegraph
Systems For Secret Wire and Radio Telegraphic
Communications," J. of the IEEE, Vol 45, 109-115
(1926).
[VIAR] de Viaris in Genie Civil: "Cryptographie",
Publications du Journal Le Genie Civil, 1888.
[VIA1] de Viaris, "L'art de chiffre et dechiffre les
depeches secretes," Gauthier-Villars, Paris,
1893.
[VIGE] BASSETT, "Vigenere:Auto-encipherment, Letter
Frequencies ," MJ70, The Cryptogram, published by
the American Cryptogram Association, 1970.
[VIG1] SI SI, "Vigenere:Comparative Analysis of the
Vigenere, beaufort, and variant Ciphers," JA80,
The Cryptogram, American Cryptogram Association,
1980.
[VIG2] SAI CHESS, "Discard your old Vigenere Charts and
Strips," AS51, The Cryptogram, the American
Cryptogram Association, 1951.
[VIG3] LEDGE, "Vigenere:Fundamentals," ND71, The
Cryptogram, American Cryptogram Association,
1971.
[VIG4] AB STRUSE, "Half-Vigenere Cipher," MA69, The
Cryptogram, published by the American Cryptogram
Association, 1969.
[VIG5] S-TUCK, "Introduction to the Vigenere Family,"
JJ44, The Cryptogram, American Cryptogram
Association, 1944.
[VIG6] EDNASANDE, "Vigenere:Making a Cipher Disk," SO79,
The Cryptogram, American Cryptogram Association,
1979.
[VIG7] X.GOTKY, "Short Cuts for Lining Up the Alphabets
in the Vigenere Family Type Ciphers," JJ47, The
Cryptogram, American Cryptogram Association,
1947.
[VIG8] CONTRACTUS, "Sigma Test for Keyword Letters in
the Vigenere," FM43, The Cryptogram, published by
the American Cryptogram Association, 1943.
[VIG9] PICCOLA, "Solving a Vigenere," AM35, The
Cryptogram, American Cryptogram Association,
1935.
[VIG0] S-TUCK, "Solving a Vigenere," FM45, The
Cryptogram, American Cryptogram Association,
1945.
[VIGa] TRYIT, "Solving Vigeneres by Trigram Method,"
JJ43, The Cryptogram, American Cryptogram
Association, 1943.
[VIGb] KOHOP, "Procedure for Solving Vigenere Type of
Periodic in an Unknown Language with Non-Roman
Alphabet," MA55, The Cryptogram, American
Cryptogram Association, 1955.
[VIGc] PICCOLA, "Vigenere Cipher," FM35, The Cryptogram,
American Cryptogram Association, 1935.
[VIGd] LEDGE, "Vigenere Family ," JF72, The Cryptogram,
American Cryptogram Association, 1972.
[VIGe] TONTO, "Vigenere Family ," JJ54, The Cryptogram,
American Cryptogram Association, 1954.
[VIGf] S-TUCK, "Vigenere Family ," FM46, The Cryptogram,
American Cryptogram Association, 1946.
[VIGg] LEDGE, "Vigenere, Variant, Beaufort, and
Grionsfield Ciphers," JA87, The Cryptogram,
American Cryptogram Association, 1987.
[VIGd] PICCOLA, "Vigenere with Running Key," ON36, The
Cryptogram, American Cryptogram Association,
1936.
[VOGE] Vogel, Donald S., "Inside a KGB Cipher,"
Cryptologia, Vol XIV, Number 1, January 1990.
[VN] "Essential Matters - History of the Cryptographic
Branch of the Peoples Army of Viet-Nam, 1945 -
1975," U.S. Cryptological History Series, Series
V, NSA CSS, CH-E32-94-02, 1994.
[WA84] N. R. Wagner and M. R. Magyarik, "A public-key
cryptosystem based on the word problem," in G. R.
Blakley and D. Chaum, Eds., Lecture Notes in
Computer Science Vol. 196: Advances in Cryptology
- Proceedings of CRYPTO 84, a Workshop on the
Theory and Applications of Cryptographic
Techniques, Santa Barbara, CA, August 19-22,
1984, pp. 19-36. Berlin/New York: Springer-
Verlag, 1985.
[WA85] C. C. Wang, T. K. Truong, H. M. Shao, L. J.
Deutsch, J. K. Omura, and I. S. Reed, "VLSI
architectures for computing multiplications and
inverses in GF(2m)," IEEE Transactions on
Computers, Vol. C-34, No. 8, August 1985, pp.
709-717.
[WDO ] War Department Office of The Chief Signal Officer
(1941) Operating Instructions for Converter M-
134-C (short title: SIGBWJ)
[WDO1] War Department Office of The Chief Signal Officer
(1941) Operating Instructions for Converter M-
134-C (short title: SIGLVC) Department of the
Army (1941) Crypto-Operating Instructions for
Converter M-134-C (short title: SIGQZF)
[WDM1] War Department (1942) Maintenance Instructions
for Converter M-134-C (short title: SIGKKK)
[WDM2] War Department (1945) Maintenance Instructions
for Converter M-134-C (short title: SIGKKK-2)
SIGQZF, SIGBWJ, SIGLVC, SIGKKK, SIGKKK-2 are
available from NARA; NSA Historical Collections
190/37/7/1, NR 2292 CBLL36 10622A 19410300.
[WDG1] War Department (1945) General Instructions For
Converter M-134-C (short title: SIGBRE-1)
available from NARA; NSA Historical Collections
190/37/7/1, NR 4588 ZEMA35 13909A 19450600
[WAL0] "Arithimetica Infinitorium" and Opera
mathematica (Oxoniae, 1699), III 674,687,688,693
and 695 give solutions to nomenclators based on
pre-calculus theory. Wallis' "Letter-Book" gives
some of his important papers (Smith op cit, p32,
p499)
[WALL] Walling, V. C., Jr., D. B. Parker, and C. C.
Wood, "Impacts of Federal Policy Options for
Nonmilitary Cryptography," SRI International
Research Report 32, April 1981, Menlo Park, CA.
[WALL] Wallis, John, "A Collection of Letters and other
Papers in Cipher" , Oxford University, Bodleian
Library, 1653.
[WAL1] Wallace, Robert W. Pattern Words: Ten Letters and
Eleven Letters in Length, Aegean Park Press,
Laguna Hills, CA 92654, 1993.
[WAL2] Wallace, Robert W. Pattern Words: Twelve Letters
and Greater in Length, Aegean Park Press, Laguna
Hills, CA 92654, 1993.
[Walk] Walker, S., 1993, Testimony for Subcommitte on
Economic Policy, Trade and Environment, Committee
on Foreign Affairs, U.S. House of
Representatives, October 12, 1993, Washington,
DC.
[WARN] "Warner Amendment" systems (10 U.S.C. 2315 and 44
U.S.C. 3502[2]) applies to digital signatures.
[WATS] Watson, R. W. Seton-, ed, "The Abbot Trithemius,"
in Tudor Studies, Longmans and Green, London,
1924.
[WAY] Way, Peter, "Codes and Ciphers," Crecent Books,
1976.
[WAYN] Wayner, P, Statement in "Cryptographic Issue
Statements Submitted to the Computer System
Security and Privacy Advisory Board," by NIST, 27
May 1993, pp. 13-17.
[WEBE] Weber, Ralph Edward, "United States Diplomatic
Codes and Ciphers, 1175-1938, Chicago, Precedent
Publishing, 1979.
[WEIS] Weissman, C., 'A national debate on encryption
exportability,' Communications of the ACM vol.
34, no. 10 (October, 1991): 162.
[WELH] D. Welsh, Codes and Cryptography. Claredon
Press, 1988.
[WELS] Welsh, Dominic, "Codes and Cryptography," Oxford
Science Publications, New York, 1993.
[WELC] Welchman, Gordon, 'The Hut Six Story', McGraw-
Hill, New York 1982.
[WELS] Welsh, Dominic, "Codes and Cryptography," Oxford
Science Publications, New York, 1993.
[WHIT] Whiteside, T. (1978). "Computer Capers: Tales
of Electronic Thievery, Embezzlement and Fraud."
Mentor Executive Library published by The New
American Library (New York). ISBN 0-145-62080-1.
[WHOR] Whorf, B. L., "A Linguistic Consideration of
Thinking In Primitive Communities," In Language,
Thought, and Reality: Selected Writings of
Benjamin Lee Whorf, ed. J. B. Carroll,
Cambridge, MA: MIT Press, pp. 65-86., 1956.
[Wie] Wiener, M., 1993, ``Efficient DES Key Search,''
presentation at Rump Session of Crypto (August,
1993), Santa Barbara, CA. Available as TR-244,
School of Computer Science, Carleton University,
Ottawa, Canada, May 1994.
[WI68] M. V. Wilkes, Time-Sharing Computer Systems. New
York: Elsevier, 1968.
[WI80] H. C. Williams, "A modification of the RSA
public-key encryption procedure," IEEE
Transactions on Information Theory, Vol. IT-26,
No. 6, November 1980, pp. 726-729.
[WI87] H. C. Williams and M. C. Wunderlich, "On the
parallel generation of the residues for the
continued fraction factoring algorithm,"
Mathematics of Computation, Vol. 48, No. 177,
January 1987, pp. 405-423.
[WIGG] Wiggins, R. W. (1995). "The Internet for
everyone: A guide for users and providers". J.
Ranade Workstation Series (McGraw-Hill, New
York). ISBN 0-07-067019-6. xvi + 655. Index.
[WILL] Williams, Eugenia, "An Invitation to
Cryptograms," Simon and Schuster, 1959.
[WIL1] Williams, P., OSISEC Introduction and Overview,
University College, London, 15 April 1993.
[WILD] Wildman, Ted, "The Expendables," Clearwater Pub.,
1983
[WINJ] Winton, J., " Ultra at Sea: How Breaking the Nazi
Code Affected Allied Naval Strategy During WWII,"
New York, William Morror, 1988.
[WINK] Winkle, Rip Van, "Hungarian: The Cryptogram,",
March -April 1956.
[WINF] Winterbotham, F.W., 'The Ultra Secret',
Weidenfeld and Nicolson, London 1974.
[WINR] Winter, Jack, "Solving Cryptarithms," ACA, 1984.
[WOLE] Wolfe, Ramond W., "Secret Writing," McGraw Hill
Books, NY, 1970.
[WOLF] Wolfe, Jack M., " A First Course in
Cryptanalysis," Brooklin College Press, NY, 1943.
[WOOD] Wood, C. C. (1994). "Information Security
Policies Made Easy: A Comprehensive Set of
Information Security Policies". Version 4.
BASELINE Software (Sausalito, CA). ISBN 1-
881585-01-8. 109 pp. Diskette available.
[WRIX] Wrixon, Fred B. "Codes, Ciphers and Secret
Languages," Crown Publishers, New York, 1990.
[WROB] Wrobel, L. A. (1990). "Disaster Recovery
Planning for Telecommunications." Artech House
(Boston, MA). ISBN 0-89006-460-1. xi + 112.
[WROE] Wrobel, L. A. (1993). "Writing Disaster Recovery
Plans for Telecommunications Networks and LANs."
Artech House (Boston, MA). ISBN 0-89006-694-7.
xiii + 138. Index.
[WU83] M. C. Wunderlich, "Factoring numbers on the
Massively Parallel computer," in D. Chaum, Ed.,
Advances in Cryptology -proceedings of CRYPTO 83,
a Workshop on the Theory and Applications of
Cryptographic Techniques, Santa Barbara, CA,
August 22-24, 1983,
pp. 87-102. New York: Plenum Press, 1984.
[WU85] M. C. Wunderlich, "Implementing the continued
fraction factoring algorithm on parallel
machines," Mathematics of Computation, Vol. 44,
No. 169, January 1985, pp. 251-260.
[XAMA] XAMAN EK,"Bifid Workshop," ND93, The Cryptogram,
American Cryptogram Association, 1993.
[XAM1] XAMAN EK,"Bifid Workshop- Part II," MJ93, The
Cryptogram, American Cryptogram Association,
1993.
[XEN1] PHOENIX, "Xenocrypt Handbook," American
Cryptogram Association, 1 Pidgeon Dr., Wilbraham,
MA., 01095-2603, for publication March, 1996.
[YA82] A. C. Yao, "Theory and applications of trapdoor
functions," in 23rd Annual Symposium on
Foundations of Computer Science, Chicago, IL,
November 3-5, 1982, pp. 80-91. IEEE Computer
Society Press, 1982.
[YAOA] A. Yao, Computational Information Theory. In
Complexity in Information Theory, ed. by Abu-
Mostafa, 1988.
[YARD] Yardley, Herbert, O., "The American Black
Chamber," Bobbs-Merrill, NY, 1931.
[YAR1] Yardley, H. O., "The Chinese Black Chamber,"
Houghton Mifflin, Boston, 1983.
[YAR2] Yardley, H. O., "Yardleygrams", Bobbs Merrill,
1932.
[YAR3] Yardley, H. O., "The Education of a Poker Player,
Simon and Schuster, 1957.
[YOKO] Yukio Yokoyama, "Tokushu joho kaisoka,"
unpublished handwritten manuscript.
[YOUS] Youshkevitch, A. P., Geschichte der Mathematik im
Mittelatter, Liepzig, Germany: Teubner, 1964.
[YUKI] Yukio Nishihara, "Kantogan tai-So Sakusenshi,"
Vol 17., unpublished manuscript, National
Institute for Defense Studies Military Archives,
Tokyo.,(hereafter NIDS Archives)
[ZIM] Zim, Herbert S., "Codes and Secret Writing."
William Morrow Co., New York, 1948.
[ZEND] Callimahos, L. D., Traffic Analysis and the
Zendian Problem, Agean Park Press, 1984. (also
available through NSA Center for Cryptologic
History)
[ZERZ] Zerzan, J. & A. Carnes, eds. (1988).
"Questioning Technology: A Critical Anthology".
Freedom Press (London). ISBN 0-900-384-44-1.
222. Index.
[ZYZZ] ZYZZ,"Sinkov's Frequency Matching," JA93, The
Cryptogram, American Cryptogram Association,
1993.
[ZYZ1] ZYZZ,"Nihilist Substitution," ND94, The
Cryptogram, American Cryptogram Association,
1994.
[ZYZ2] ZYZZ,"Solving Twin Bifids," JA94, The Cryptogram,
American Cryptogram Association, 1994
[ZYZ3] ZYZZ,"Bring Home the Baconian!," MA94, The
Cryptogram, American Cryptogram Association,
1994.
[ZYZ4] ZYZZ,"Xenocrypt Solving for Neophytes," JF96, The
Cryptogram, American Cryptogram Association,
1996.
ANNOTATED WEB SOURCES
Digital Privacy
http://www-leland.stanford.edu/~phillin /red_paper.gif
The Ethics of Encryption
http://www-pcd.stanford.edu/gifs/button.key.gif
http://www.ecst.csuchico.edu/~rodmur/docs/USConstitution
.html http://draco.centerline.com:8080/~franl/privacy/
http://www.house.gov/Constitution/Constitution.html
http://draco.centerline.com:8080/~franl/clipper/about-
clipper.html
Electronic Frontier Foundation
Electronic Frontier Foundation http://www-
leland.stanford.edu/~phillin/
http://rescomp.stanford.edu/~p weston/ptw.html
http://www.eff.org/
White House
http://www.whitehouse.gov/White_House/EOP/OVP/html
/GORE_Home.html
PGP
Phillip R. Zimmerman:
prz@acm.org
http://draco.centerline.com:8080/~franl/pgp/pgp-2.6.2-
doc1.html
http://draco.centerline.com:8080/~franl/pgp/
RIPEN
http://www.cs.indiana.edu/ripem/dir.html
Fourth Amendment
http://www.io.com/sjgames"
Free Speech
http://mirrors.yahoo.com/eff/speech.html
Senate Bill S.1587 - Encrypted Communications Privacy
Voters Telecommunications Watch
http://www.vtw.org/
Cryptographic Algorithms
http://www.cs.hut.fi/ssh/crypto/algorithms.html
Professor Ron Rivest
http://theory.lcs.mit.edu/~rivest/crypto-security.html
Terry Ritter's papers on Dynamic Substitution and
Dynamic Transposition ciphers
http://www.io.com/~ritter/
Michael Paul Johnson Thesis
ftp://ftp.csn.net/mpj/public/
K-Theory
http://www.math.uiuc.edu/K-theory/
DES
ftp://ftp.uu.net/pub/security/des"
Complexity Theory & Cryptography
http://dimacs.rutgers.edu/SpecialYears/1990_1991/index
.html
Random Numbers
http://www.cs.berkeley.edu/~daw/netscape-
randomness.html
http://www.clark.net/pub/cme/html/ranno.html
http://www.cis.ohio-state.edu/htbin/rfc/rfc1750.html
http://www.ddj.com/ddj/1994/1994.11/index.htm
Netscape Hole
http://www.ddj.com/ddj/1996/1996 01/wagner.htm
Cryptography Policy & Algorithms Conf: Australia 95
ftp://ftp.cl.cam.ac.uk:/users/rja14/queensland.ps.Z
U. of Cambridge
http://www.cl.cam.ac.uk:80/users/rja14/
Elliptical Curves
http://www.ama.caltech.edu/resources.html
ftp://ftp.mcs.com/mcsnet.users/eh.crypto
ftp://csua.berekely.edu/pub/cypherpunks/ciphers
ftp://ftp.datashopper.dk/pub/users/pethern/file/curve_e
ncrypt_22.sea.hqx
ftp://ftp.dsi.unimi.it/pub/security/crypt/code/curve_en
crypt_22.sea.hqx
quantum cryptography -use of quantum indeterminacy for
encryption & data security
http://www.iro.umontreal.ca/people/crepeau/Biblio-
QC.html
Bibliography on Quantum Cryptography by Gilles Brassard:
http://www.iro.umontreal.ca/labs/theorique/index_en.htm
l
http://vesta.physics.ucla.edu/~smolin/
http://eve.physics.ox.ac.uk/QCresearch/cryptoanalysis/q
c.html
http://eve.physics.ox.ac.uk/QChome.html
USS Pampanino
http://www.maritime.org/ecm2.shmtl
Wavelets for Compression
http://www.mat.sbg.ac.at/~uhl/wav.html
ftp://sable.ox.ac.uk/pub/math/README
ftp://sable.ox.ac.uk/pub/math/cunningham/README
Primes
ftp://sable.ox.ac.uk/pub/math/primes">tables
Lenstra's Large Integer Package
"ftp://sable.ox.ac.uk/pub/math/freelip/
University/Country Ref's
ftp://sable.ox.ac.uk/pub/math/primesrsa129/
ftp://furmint.nectar.cs.cmu.edu/security
http://weber.u.washington.edu/~phantom/cpunk/index.html
ftp://ftp.funet.fi/pub/crypt/cypherpunks
ftp://ftp.psy.uq.oz.au/pub/Crypto
ftp.psy.uq.oz.au/pub/Crypto
ftp://ftp.wimsey.bc.ca/pub/crypto
http://clipper.uvic.ca/crypt
ftp://pgp.rasip.fer.hr
ftp://ftp.datashopper.dk/pub/users/pethern
ftp://ftp.funet.fi/pub/crypt
ftp://garbo.uwasa.fi/pc/security
http://www.cs.hut.fi/ssh/crypto
http://www.cnam.fr/Network/Crypto
ftp://ftp.darmstadt.gmd.de/pub/crypto
ftp://ftp.informatik.uni-hildesheim.de/pub/security/
ftp://ftp.uni-stuttgart.de/pub/doc/security/crypto/
http://www.thur.de/ulf/krypto/index.html
ftp://ftp.informatik.uni-hamburg.de/pub/pgp
ftp://ftp.informatik.uni-hamburg.de/pub/crypt
http://www.cert.dfn.de/eng
ftp://ftp.kfki.hu/pub/packages/security
ftp://ftp.dsi.unimi.it/pub/security/crypt
ftp://utopia.hacktic.nl/pub/replay/pub/disk/
ftp://ftp.unit.no/pub/unix/security
ftp://ftp.kiae.su/unix/crypto
ftp://ftp.sunet.se/pub/security/tools/crypt
ftp://ftp.ox.ac.uk/pub/crypto
ftp://FTP.CSN.ORG/mpj/README
http://www.eff.org/pub/ Net_info/Tools/Crypto/
ftp://ftp.eff.org/pub/Net_info/Tools/Crypto/
RIPEM
ftp://ripem.msu.edu/pub/
ftp://ftp.infonexus.com/pub/
http://ftpsearch.unit.no/ftpsearch/
Bibliographies
http://mnementh.cs.adfa.oz.au/htbin/bib_lpb
http://glimpse.cs.arizona.edu/bib/
http://glimpse.cs.arizon a.edu/cgi-bin/biblio?
query1=cryptography&query2 =&query3=&case=on&error
s=0&maxfiles=200&maxlines=5000
http://liinwww.ira.uka.de/bibliograph y/index.html"
ftp://ftp.doc.ic.ac.uk/computing/bibliographies/Karlsru
he/index.html
http://liinwww.ira.uka.de/bibliography/Theory/crypto.se
curity.html
"ftp://ftp.doc.ic.ac.uk/computing/bibliographies
/Karlsruhe/Theory/computational.number.theory.html
http://theory.lcs.mit.edu/~rivest/homepage.html
http://theory.lcs.mit.edu/~rivest/crypto.bib
http://theory.lcs.mit.edu/~rivest/algorithms2.bib
Cryptography Technical Reports Server
http://www.itribe.net/CTRS
Crypto Reports
http://www.cs.waikato.ac.nz/~sirvine
http://bibd.unl.edu/~stinson/acbib.html
http://bibd.unl.edu/~stinson/ssbib.html
http://triode.apana.org.au:8080/~cskinner/cybanim.html
http://www.isse.gmu.edu/~csis/bibliography/ref_essays.ht
ml
http://www.cs.purdue.edu/coast/archive/data/category_in
dex.html
ftp://coast.cs.purdue.edu/pub/doc/cryptography/
http://www.cs.purdue.edu/coast/archive/data/categ12.html
http://ww w.zblmath.fiz-karlsruhe.de/cgi-bin/LNCS-500-
1000" http://www.zblmath.fiz-karlsruhe.de/cgi-
bin/LNCS-500-1000??
au=&ti=&co=&so=&bi=cryptography&M=40
http://avalon.ira.uka.de/eiss/EISS-Reports/index.html
European Institute for System Security, Univ. Karlsruhe,
Germany
http://avalon.ira.uka.de/eiss/indexe.html
http://www.ens.fr/~grecc/papers.html
http://www.ens.fr/~grecc/index_en.html
http://www.ul b.ac.be/di/scsi/defscsi.html
Brussels Free University, Belgium
http://www.informatik.uni-hildesheim.de/~sirene/lit/
sirene.lit.html http://www.informatik.uni-
hildesheim.de/~sirene/index.html
http://www.swcp.com/~iacr/jofc/jofc.html
Designs, Codes and Cryptography
http://www.isse.gmu.edu/~csis/jcs.html
http://www.tis.com/Home/DataSecurityLetter.html
http://www.byte.com/
http://www.quad ralay.com/www/Crypt/General/crypto-
journals.html
http://www.itd.nrl.navy.mil/ITD/5540/iee e/cipher/
http://www.computer.org
Security & Privacy - Books and Publishers
http://www.cl.cam.ac.uk/users/rja14/#SR
ftp://ftp.cl.cam.ac.uk/users/rja14/
http://www.rsa.com/rsalabs/cryptobytes
http://www2.indigo-net.com/Indigo/Indigo.html
http://www.privacy.org/alert/
gopher://ns1.infor.com/
gopher://ns1.infor.com/77/.bin/s_kw?cryptography
http://www.aegeanpress.com/books/
http://www.wiley.com/
http://www.openmarket.com/info/cryptography/applied_cry
ptography.html
http://www.crcpress.com/PRODS/8521.HTM
http://www.crcpress.com/
http://bibd.unl.edu/~stinson/ssbib.html
http://bibd.unl.edu/~stinson/acbib.html
http://www-mitpress.mit.edu/mitp/recent-books/comp/pgp-
source.html
http://www-mitpress.mit.edu/
http://www.springer-ny.com/
Coonferences: (Crypto, EuroCrypt, AsiaCrypt, etc.)
http://www.bookwire.com/index/publishers.html
http://julmara.ce.chalmers.se/stefan/WWW/sec_bib
_search.html
http://julmara.ce.chalmers.se/Security/
http://theory.l cs.mit.edu/~dmjones/hbp/
http://www.cs.indiana.edu/cstr/search
http://www.kreonet.re.kr/AC96/AC96.html
DSPCS@anaconda.fste.ac.cowan.edu.au
http://www.cl.cam.ac.uk/users/rja14/ihws.html
http://www.informatik.uni-
hildesheim.de/~sirene/conf/Programme/96051216.Eurocrypt9
6
http://www.cl.cam.ac.uk/users/rja14/cp.html
http://www.cl.cam.ac.uk/users/rja14/fse.html
http://www.rsa.com/rsa/conf96/brochure.htm
http://www.cl.cam.ac.uk/users/rja14 /ini.html
ftp://ftp.cl.cam.ac.uk:/users/rja14/queensland.ps.Z
http://www.isse.gmu.edu/~csis/acsac/acsac96-cfp.html
http://www.cci.de/its/cfp-ifip96.html
http://www.itd.nrl.navy.mil/ITD/5540/acm/new-
paradigms.html
http://newark.rutgers.edu/~atluri/atma.html
http://www.isse.gmu.edu/~csis/acsac/acsac95.html
http://csrc.ncsl.nist.gov/ events/
Advanced Surveillance Technologies
http://www.privacy.org/pi/conference/
http://www.cs.pdx.edu/SP96
Intellectual Property Protection in the Global
Information Infrastructure
http://www.nla.gov.au/gii/oecdconf.html
http://www.privacy.org/pi/conference/
proposed export criteria for encryption software
http://csrc.ncsl.nist.gov/keyescrow/
http://www.clark.net/pub/cme/html/in-out.html
http://www.eskimo.com/~joelm
http://www.eskimo.com/~joelm /criteria.txt
http://www.isse.gmu.edu/~pfarrell/nistmeeting.html
FBI Ban
http://www.epic.org/crypto/ban/fbi_dox/
Laws
http://cwis.kub.nl/~frw/people/koops/lawsurvy.htm
http://www.epic.org/cr ypto/legislation/s1587.html
http://www.vtw.org/
http://www.epic.org/crypto/legislation/s1587_analysis.ht
ml http://www.law.miami.edu/~froomkin/personal-u se.txt"
ftp://ftp.cygnus.com/pub/export/itar.in.full
http://www.pls.com:8001/his/usc.html
http://www.epic.org/crypto/
http://www.eff.org/pub/Privacy/ITAR_export/
http://www.qualcomm.com/people/pkarn/export/index.html
http://ssdc.ucsd.edu/gpo/"
http://www.io.org/~samwise/crypto/Introduction.html
http://www.us.net/~steptoe/
http://world.std.com/~franl/crypto.html
authentication protocols http://www.cis.ohio-
state.edu/hypertext/faq/usenet/kerberos-f
aq/user/faq.html
ftp://athena-dist.mit.edu/pub/kerberos
Computer Security & Industrial Cryptography Group
http://www.esat.kuleuven.ac.be
http://www.kuleuven.ac.be
http://www.dice.ucl.ac.be/crypto/crypto.html
http://www.iro.umontreal.ca/labs/theorique/index_en.html
http://www.ens.fr/~grecc/index_en.html
http://lix.polytechnique.fr/~morain/Crypto/crypto.engl
ish.html"
http://www.polytechnique.fr/edu/DEAP/algo.html
http://www.inf.ethz.ch/department/TI/um/group.html
Government
http://ana.arc.nasa.gov/usps/
http://www.cse.dnd.ca/
http://www.itd.nrl.navy.mil/ITD/">NRL-ITD
http://infosec.nosc.mil/infosec.html">Navy INFOSEC
http://hightop.nrl.navy.mil/rainbow.html
http://www.users.interport.net/~sagal/ajax.html
http://www.fbi.gov/
DECA program: (Development of Espionage, Counterin
telligence & Counterterrorism Awareness) deals with
economic, industrial, and technological intelligence
gathering
"http://www.fbi.gov/deca.htm
Also see Cryptolog.html on NCSAFORUM Section 6 for many
other Crypto links.
ON-LINE COURSES
The best course on the INTERNET by far is LANAKI's. It
is 25 Lectures long covering all phases of classical
cryptography. The textbooks are [NICH] Nichols, Randall
K., " Classical Cryptography Course, Volume I," Aegean
Park Press (C-74), ISBN: 0-89412-263-0, Softbound, 8.38
x 10.75 in, xii + 301 pp. Professor Nichols (aka LANAKI)
is the retiring President of the American Cryptogram
Association (ACA) 1994-1996. Classical Cryptography
Volume II was released in February, 1997. [NIC~]
Nichols, Randall K., " Classical Cryptography Course,
Volume II," Aegean Park Press (C-76), ISBN: 0-89412-264-
9, Softbound, 8.38 x 10.75 in, xii + 400 pp. 1996,
$40.00.
Volume I presents the first ten Lectures (of twenty
five) from Mr. Nichols' 1995 and 1996 on-going Classical
Cryptography Course taught to 461 students at all levels
of expertise. Volume I covers such diverse topics as
Aristocrats (the king of cipher puzzles found in many
daily papers), Patristocrats (Aristocrats without word
divisions), Xenocrypts (language ciphers other than
English), Transpos-ition Ciphers, Military Ciphers,
Cryptarithms, the famous German ENIGMA Cipher Machine
(with simulation program disk available),
Polyalphabetics, and special historical ciphers.
Ciphers and their cryptanalytic techniques for solution
are presented. Extensive foreign language data is
supplied.
Classical Cryptography Course Volume I represents the
best in intellectual stimulation - better than chess,
bridge, and couch potatohood combined.
-----------------
Volume II presents Lectures 11 - 20 (of a total of
twenty five) from Mr. Nichols' extremely successful
course in Classical Cryptography taught in 1995 and 1996
to 461 students via the Internet and regular mail.
Volume II covers polyalphabetic substitutions ciphers in
the Vigenere family (Viggy, Variant, Beaufort, Porta,
Gronsfeld, Portax, Gromark), decimation, principles of
symmetry, isologs and superimposition solution
techniques. Volume II describes the difficult aperiodic
cipher systems (Interrupted key, Autoclave, Progressive,
Running Key used in cipher machines) and their analysis
by isomorphs, and repetitions. Cryptarithm solutions
for extended bases are presented. The theory of
coincidences and statistical attacks (kappa, chi, phi)
that are derived from this important theory are
detailed.
Transposition theory and a variety of transposition
ciphers are solved (Columnar, Amsco, Myszkowski,
Cadenus, Grille, Swagman, Auto-Transposition). Volume
II has two chapters on the difficult cipher systems
invented by the famous French cryptographer Delastelle:
Foursquare, Bifid and Trifid. Volume II ends with a
chapter on passwords, law and data protection. Volume
II is a potpourri of advanced topics in classical
cryptography.
Volume II includes over 1600 Cryptographic Resources and
References covering all phases of cryptography:
cryptanalysis, history, legal, social, classical,
modern, NSA, mathematical techniques, recreational,
intelligence, tactical, strategic, national defense,
INFOSEC: offensive and defensive, hardware, software,
standards, public key cryptography, web sources, and
applicable Senate and House bills.
The course is free to ACA members. Two BBS, one
netserver, and the Crypto Drop Box are maintained with a
wealth of information, lectures and computer programs
for the serious student. Professor Nichols shares his 32
years of experience to about 358 students worldwide.
Nothing better on the net for the pricetag. Be prepared
to work and enjoy yourself.
(and permit me a couple of personal plugs)....
BOOK REVIEWS
REVIEW OF CLASSICAL CRYPTOGRAPHY COURSE, VOLUME I
By the honorable Louis Kruh, Editor/Founder CRYPTOLOGIA,
October 1996, Volume XX Number 4.
Nichols, president of the American Cryptogram
Association, 1994-1996, began a course in classical
cryptography in 1995 via the Internet and regular mail.
Presently, at its midpoint, the course is an over-
whelming success with more than 300 participants and
this volume, the first of two, consists of the first ten
lectures. Nichols' goals are to teach the basic
cryptanalytic tools for solving different types of
ciphers while providing some understanding of the
historic context and importance of cipher systems to
communications.
Volume I covers simple substitution, substitution with
variants including complicated types of cipher
alphabets, multiliteral substitutions, Xenocrypts
(substitution ciphers in languages other than English)
cryptarithms, Hill's algebraic cipher, German Enigma
machine, and part I of polyalphabetic substitution
systems.
In a clearly written style, Nichols describes how to
solve each cipher, often with step-by-step examples,
using various techniques. These include position and
frequency tables, vowel selection method, pattern word
attack, consonant-line method, Phi test, Index of
Coincidence, probable words, anagraming, frequency
distribution data, and common digraphs, trigraphs
and tetragraphs for foreign languages, Kasiski method
for periodic ciphers, known word method, symmetry
principles and other techniques.
A minor criticism is the use of three chapters or 1/3 of
the book for Xenocrypts. This is disproportionate by
any measure and additional editing and use of an
appendix for language data would provide a better
balance. Similarly, the Chapter on the German Enigma
stands out like plaintext in the middle of an encrypted
message. The information is interesting but out of
place; it belongs in an appendix.
Another criticism is the decision to have two volumes
instead of one, for no apparent reason. This will
require a second index and another list of references,
which adds to the basic inconvenience of having two
volumes when only one is necessary.
Despite these faults, Nichols has produced an out-
standing contribution to the literature of cryptology.
By way of comparison, in 1939, the American Cryptogram
association sponsored publication of Elementary Crypt-
analysis by Helen F. Gaines. This was the first
comprehensive textbook on the subject published in the
United States and, almost 60 years later, it is still in
print because no other book has come close to its
standard. Now, however, Nichols' book, or at least the
first volume, compares favorably and in some ways is
even better!
REVIEW OF CLASSICAL CRYPTOGRAPHY COURSE, VOLUME I
By the Honorable David Kennedy, Director of Research,
NCSA.
Classical Cryptography Course, Volume I. By
Randall K. Nichols; published by Aegean Park Press,
(714) 586-8811 (phone) (714) 586-8269 (fax); (800) 736 -
3587; 301 pages (with index); $34.80 (American
Cryptogram Association members receive a 20% discount
through ACA or NCSA Members receive a 10% discount if
purchased from the NCSA Bookstore)
In Classical Cryptography Course, Volume I, author
Randall K. Nichols has created a benchmark for serious
students of the science of cryptography. This is a
text. It is for learning, and with it one cannot help
but learn about the foundations of the science. An
outgrowth of Nichols' admitted "labor of love" in the
online Cryptography Courses he teaches over the
Internet, Volume I creates the foundation for
understanding the development of the science.
The ten chapters of this volume lead the student
through simple substitutions, substitutions with
variants, multiliteral substitutions, xenocrypts
(foreign language substitutions), cryptarithms, the
Enigma machine (separate Enigma95 program disk available
direct from the author) and finally to polyalphabetic
substitutions. Seven chapters conclude with problems;
solutions and discussions are provided in an appendix.
The text is indexed with twenty-four pages of references
for further study.
I found Nichols' sense of the history of
cryptography particularly noteworthy. The volume is
liberally salted with citations from history with
applications of the methods developed in the text. From
Revolutionary France through the American Civil War, the
Tammany Hall scandal, Revolutionary Soviet ciphers and
Japanese successes against Chinese codes prior to Pearl
Harbor, the text provides touchstones for student to
understand and relate to.
Phil Zimmermann observed in the documentation to
his Pretty Good Privacy Program to "Beware of Snake
Oil." Among his arguments is this anecdote:
I remember a conversation with Brian Snow, a highly
placed senior cryptographer with the NSA. He said he
would never trust an encryption algorithm designed by
someone who had not "earned their bones" by first
spending a lot of time cracking codes.
Where Schneier's Applied Cryptography is a crash
course in some encryption protocols and algorithms in
use today, Nichols' text begins the teaching of Snake
Oil detection and prevention.
Learning the fundamentals, developed throughout the
text, brings a richer understanding of the science,
it's history and insight into it's possibilities and
some vulnerabilities lurking for the unwary.
Nichols plans for release Volume II in the series
with advanced material on from the online course which
includes statistical attacks and transposition in
February, 1997.
Reviewer: Dave Kennedy, CISSP, is Director of Research
for the National Computer Security Association,
Carlisle, PA. He is a retired Army military police
officer and member of NCSA, ASIS, ISSA and the Computer
Security Institute.
-----------------
For orders or Information Contact: Aegean Park Press,
P.O. Box 2837, Laguna Hills, Ca. 92654. Telephone: 1-
800-736-3587; Fax: 1-714-586-8269. Group discounts
available. WWW Web site: http://www.halcyon.com/books/
Online orders may be made directly to LANAKI at
75542.1003@compuserve.com or RAGYR at aol.com. Volume
I sells for US $28.50 and Volume II sells for US $38.00.
Surface mailing costs are included, as well as, course
discounts. Add $8.00 to each book for overseas costs.
Orders to LANAKI will be signed by the author.
DOC file can be found
here
Back to index