Skip to Main Content
It looks like you're using Internet Explorer 11 or older. This website works best with modern browsers such as the latest versions of Chrome, Firefox, Safari, and Edge. If you continue with this browser, you may see unexpected results.
Browse Mathematics books in the library:
- QA 1-43: General & historical mathematics
- QA 71-90: Instruments and machines, including computers
- QA101-145: Arithmetic
- QA150-272.5: Algebra
- QA273-280: Probabilities & statistics
- QA299-433: Analysis
- QA440-699: Geometry, trigonometry, & topology
- QA801-939: Analytic mechanics
Alan Turing: The Enigma by
Call Number: QA29.T8 H63 1983
Publication Date: 1983
Capturing both the inner and outer drama of Turing’s life, Andrew Hodges tells how Turing’s revolutionary idea of 1936--the concept of a universal machine--laid the foundation for the modern computer and how Turing brought the idea to practical realization in 1945 with his electronic design. The book also tells how this work was directly related to Turing’s leading role in breaking the German Enigma ciphers during World War II, a scientific triumph that was critical to Allied victory in the Atlantic. At the same time, this is the tragic account of a man who, despite his wartime service, was eventually arrested, stripped of his security clearance, and forced to undergo a humiliating treatment program--all for trying to live honestly in a society that defined homosexuality as a crime.
The Mathematics of Secrets: cryptography from Caesar ciphers to digital encryption by
Call Number: Z103 .H664 2017
Publication Date: 2017
Explaining the mathematics of cryptography The Mathematics of Secrets takes readers on a fascinating tour of the mathematics behind cryptography--the science of sending secret messages. Most books about cryptography are organized historically, or around how codes and ciphers have been used, such as in government and military intelligence or bank transactions. Joshua Holden instead shows how mathematical principles underpin the ways that different codes and ciphers operate. Holden focuses on both code making and code breaking and he discusses the majority of ancient and modern ciphers currently known. Holden begins by looking at substitution ciphers, built by substituting one letter or block of letters for another. Explaining one of the simplest and historically well-known ciphers, the Caesar cipher, Holden establishes the key mathematical idea behind the cipher and discusses how to introduce flexibility and additional notation. Holden goes on to explore polyalphabetic substitution ciphers, transposition ciphers, including one developed by the Spartans, connections between ciphers and computer encryption, stream ciphers, and ciphers involving exponentiation. He also examines public-key ciphers, where the methods used to encrypt messages are public knowledge, and yet, intended recipients are still the only ones who are able to read the message. He concludes with a look at the future of ciphers and where cryptography might be headed. Only basic mathematics up to high school algebra is needed to understand and enjoy the book. With a plethora of historical anecdotes and real-world examples, The Mathematics of Secrets reveals the mathematics working stealthily in the science of coded messages.
Parker Hitt: the father of American military cryptology by
Call Number: UB290.H5 S66 2022
Publication Date: 2022-03-22
"The history of war teems with occasions where the interception of dispatches and orders written in plain language has resulted in defeat and disaster for the force whose intentions thus became known at once to the enemy." So begins Colonel Parker Hitt's 1916 Manual for the Solution of Military Ciphers, a foundational text in the history of cryptology. Due largely in part to this manual and Hitt's early cipher inventions, codes became the default communication method for the U.S. military in the twentieth century as codebreakers and cipher machines had proved their worth during World War I. A modified version of Hitt's invention, the M--94 cipher device, was used by the Army for three decades until the Germans decrypted the code during the middle of WWII. To this day, Hitt is known as the "father of American military cryptology." In the first biography of this American hero, historian Betsy Rohaly Smoot brings Hitt's legacy to the fore, chronicling his extraordinary military career and deviation from masculine tropes during the early twentieth century. Smoot reveals that Hitt was a champion for women in the workplace, giving his support to employment of the "Hello Girls," American female telephone operators for the First Army switchboard and working alongside his wife, Genevieve Young Hitt, the first woman to break ciphers for the United States government. Readers of Liza Mundy's Code Girls and David Kahn's The Codebreakers will find an insightful profile of not only an American hero in Parker Hitt's story, but of early military cryptology as well. Drawing from a never-before-seen cache of Hitt's letters, photographs, and diaries, Smoot introduces readers to this unique cryptanalyst's life.
Codes and Ciphers: Julius Caesar, the Enigma, and the internet by
Publication Date: 2001-12-06
The design of code and cipher systems has undergone major changes in modern times. Powerful personal computers have resulted in an explosion of e-banking, e-commerce and e-mail, and as a consequence the encryption of communications to ensure security has become a matter of public interest and importance. This book describes and analyses many cipher systems ranging from the earliest and elementary to the more recent and sophisticated, such as RSA and DES, as well as wartime machines such as the ENIGMA and Hagelin, and ciphers used by spies. Security issues and possible methods of attack are discussed and illustrated by examples. The design of many systems involves advanced mathematical concepts and this is explained in detail in a major appendix. This book will appeal to anyone interested in codes and ciphers as used by private individuals, spies, governments and industry throughout history.
The Comanche Code Talkers of World War II by
Publication Date: 2003-02-01
This text tells the full story of the Comanche Code Talkers. Drawing on interviews with all surviving members of the unit, their original training officer, and fellow soldiers, as well as military records and news accounts, William C. Meadows follows the group from their recruitment and training to their active duty in World War II and on through their postwar lives up to the present. He also provides a comparison of Native American code talking programs, comparing the Comanche Code Talkers with their better-known Navajo counterparts in the Pacific and with other Native Americans who used their languages, coded or not, for secret communication. Meadows sets this history in a larger discussion of the development of Native American code talking in World Wars I and II, identifying two distinct forms of Native American code talking, examining the attitudes of the American military toward Native American code talkers, and assessing the complex cultural factors that led Comanche and other Native Americans to serve their country in this way.
Geniuses at War: Bletchley Park, Colossus, and the dawn of the digital age by
Call Number: D810.C88 P75 2021
Publication Date: 2021-06-22
The dramatic, untold story of the brilliant team whose feats of innovation and engineering created the world's first digital electronic computer--decrypting the Nazis' toughest code, helping bring an end to WWII, and ushering in the information age. Planning the invasion of Normandy, the Allies knew that decoding the communications of the Nazi high command was imperative for its success. But standing in their way was an encryption machine they called Tunny (British English for "tuna"), which was vastly more difficult to crack than the infamous Enigma cipher. To surmount this seemingly impossible challenge, Alan Turing, the Enigma codebreaker, brought in a maverick English working-class engineer named Tommy Flowers who devised the ingenious, daring, and controversial plan to build a machine that would calculate at breathtaking speed and break the code in nearly real time. Together with the pioneering mathematician Max Newman, Flowers and his team produced--against the odds, the clock, and a resistant leadership--Colossus, the world's first digital electronic computer, the machine that would help bring the war to an end. Drawing upon recently declassified sources, David A. Price's Geniuses at War tells, for the first time, the full mesmerizing story of the great minds behind Colossus and chronicles the remarkable feats of engineering genius that marked the dawn of the digital age.
Applied Cryptography by
Publication Date: 1995-11-02
This new edition of the cryptography classic provides you with a comprehensive survey of modern cryptography. The book details how programmers and electronic communications professionals can use cryptography-the technique of enciphering and deciphering messages-to maintain the privacy of computer data. It describes dozens of cryptography algorithms, gives practical advice on how to implement them into cryptographic software, and shows how they can be used to solve security problems. Covering the latest developments in practical cryptographic techniques, this new edition shows programmers who design computer applications, networks, and storage systems how they can build security into their software and systems. What's new in the Second Edition? * New information on the Clipper Chip, including ways to defeat the key escrow mechanism * New encryption algorithms, including algorithms from the former Soviet Union and South Africa, and the RC4 stream cipher * The latest protocols for digital signatures, authentication, secure elections, digital cash, and more * More detailed information on key management and cryptographic implementations