
- English
- ePUB (mobile friendly)
- Available on iOS & Android
The Story of Codebreaking
About this book
To break a code, you have to put yourself in the mind of your enemy in order to probe the strengths and weaknesses of their systems. It's a game of bluff and doublebluff. The Story of Codebreaking describes undercover operations, power struggles, secret alliances, and brilliant feats of teamwork. Those who invent codes and those who break them are remarkable, indefatigable characters. Find out how Mary Queen of Scots smuggled cryptic messages to her accomplices when she was plotting against her cousin Elizabeth I, or discover the methods used by codebreakers during World Wars I and II, most significantly those who cracked Enigma and intercepted Japanese naval messages prior to Pearl Harbor. The sheer doggedness of those who unraveled the Enigma code is thought to have shortened World War II by almost two years. Topics include:
• Ancient ciphers and the art of encoding
• Early spies, subterfuge and skytales
• The making and breaking of Enigma
• Japanese naval codes in World War II
• Cold War cryptography
Frequently asked questions
- Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
- Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Information

CHAPTER 1
ANCIENT CIPHERS
3rd century AD

The art of encoding
China

India
| a | ā | i | ī | u | ū | ṛ | ṝ | ḷ | ḹ | e | a i | o | a u | ṃ | ḩ | ñ | ś | ṣ | s | i | r | l | u |
| k h | g | g h | ṅ | c h | j | j h | ñ | t h | ḍ | d h | ṇ | t h | d | d h | n | p h | b | b h | n | y | r | l | v |
| a | k h | g h | c | t | ñ | n | r | l | y |
| k | g | ṅ | ṭ | p | ṇ | n | ṣ | ...
Table of contents
- Cover
- Title
- Contents
- Introduction: Codemakers versus Codebreakers
- Chapter 1: Ancient Ciphers
- Chapter 2: Arabic Anagramming
- Chapter 3: European Encipherers
- Chapter 4: Breaking the Unbreakable
- Chapter 5: Room 40
- Chapter 6: The Birth of Mechanization
- Chapter 7: Making Enigma
- Chapter 8: Breaking Enigma
- Chapter 9: Bletchley Park
- Chapter 10: Red and Purple
- Chapter 11: The Japanese Naval Codes
- Chapter 12: Cryptology Strikes Back
- Chapter 13: Computer Cryptanalysis
- Chapter 14: Cold War Cryptography
- Chapter 15: Computers Take Over
- Chapter 16: The End of Codebreaking as We Know It?
- Glossary
- Index
- Picture Credits
- Copyright