Publisher: United States Department of the Army 1990
Text contains six parts: Introduction to Cryptanalysis, Monographic Substitution Systems, Polygraphic Substitution Systems, Polyalphabetic Substitution Systems, Transposition Systems, and Analysis of Code Systems. Text also contains exhaustive material to aid in the solution of cipher systems, including frequency distributions, word and pattern tables, as well as utility tables.
Home page url
Download or read it online for free here:
(multiple PDF/PS files)
by Phil Zimmermann
This guide describes how to use PGP to manage your organization’s messages and data. It is an overview of the terminology and concepts of PGP products. It contains discussions of security, privacy, and the vulnerabilities inherent in PGP.
by Alfred Menezes, Paul van Oorschot, Scott Vanstone - CRC-Press
This Handbook will serve as a valuable reference for the novice as well as for the expert who needs a wider scope of coverage within the area of cryptography. It is a necessary and timely guide for professionals who practice the art of cryptography.
by Bodo Moeller - TU Darmstadt
Multiple aspects of public-key cryptography are examined. The author covers the theory of provably secure public-key cryptography and the implementation of exponentiation and multi-exponentiation. An introduction to provable security is provided.
by William F. Friedman - NSA
One of the most well-respected publications on cryptanalysis, as was written by William F. Friedman, one of the true experts in the field. Now declassified by the NSA, this book is key in helping individuals understand and solve cipher systems.