Abstract
Cryptology furnishes an ideal example of the synergy between mathematics and technology. This is illustrated by events before, during, and after World War II: manual methods of encryption were replaced by faster and more secure methods of machine encryption; these methods were then attacked during the war by mathematicians using a combination of mathematics and machines; and after the war machine encryption was in turn eventually supplanted by computers and computer-based encryption algorithms. Random number generation illustrates one aspect of this: physical randomization has been completely replaced by the use of pseudo-random number generators. A particularly striking example of the impact of mathematics on cryptography is the development of public key encryption.
Tracing developments in cryptology can pose interesting challenges for the historian because of a desire for secrecy, but it is occasionally possible to see behind the veil; the last section of this chapter discusses some interesting instances of this.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Banks, D. L. (1996). A conversation with I. J. Good. Statistical Science, 11, 1–19.
Borisov, I. S., et al. (2001). Aleksandr Alekseevich Borovkov (on his 70th birthday). Russian Mathematical Surveys, 56, 1009–1012.
Borovkov, A. A. (2004) Kolmogorov and boundary problems of probability theory. Russian Mathematical Surveys, 59, 91–102.
Brückner, H.-D. (2005). Germany’s first cryptanalysis on the Western Front: Decrypting British and French naval ciphers in World War I. Cryptologia, 29, 1–22.
Budiansky, S. (2000). Battle of wits: The complete story of codebreaking in World War II. New York: Free Press.
Copeland, B. J. (Ed.). (2006). Colossus: The secrets of Bletchley Park’s codebreaking computers. Oxford: Oxford University Press.
Feistel, H. (1973). Cryptography and computer privacy. Scientific American, 228(5), 15–23.
Fienberg, S. E. (1971). Randomization and social affairs: The 1970 draft lottery. Science, 171, 255–261.
Friedman, W. F. (1938–1941). Military cryptanalysis. Washington, DC: US Government Printing Office. [Several subsequent editions, later expanded in collaboration with Lambros D. Callimahos, under the title Military Cryptanalytics.].
Good, I. J. (1950). Probability and the weighing of evidence. New York: Hafner Publishing Company.
Good, I. J. (1976). Early work on computers at Bletchley. Cryptologia, 3, 65–77. Reprinted with an addendum in Annals of the History of Computing, 1, (1979), 38–48.
Good, I. J. (1979). Studies in the history of probability and statistics. XXXVII A. M. Turing’s statistical work in World War II. Biometrika, 66, 393–296.
Good, I. J. (1993). Enigma and Fish. In Hinsley and Stripp (1993) (pp. 149–166).
Good, I. J. (2000). Turing’s anticipation of Empirical Bayes in connection with the cryptanalysis of the Naval Enigma. Journal of Statistical Computing and Simulation, 66, 101–111.
Good, I. J. (2001). Introductory remarks for the article in Biometrika, 66 (1979). A. M. Turing’s Statistical Work in World War II. In J. L. Britton (Ed.), Collected works of A. M. Turing (Vol. 2, pp. 211–223). Elsevier.
Good, I. J. (2006). From Hut 8 to the Newmanry. In Copeland (2006) (pp. 204–222).
Greenberg, J. (2014). Gordon Welchman: Bletchley Park’s architect of Ultra intelligence. London: Frontline Books.
Haynes, J. E., & Klehr, H. (2000). Venona: Decoding Soviet espionage in America. New Haven: Yale University Press.
Hinsley, F. H. (1979–1990). British intelligence in the Second World War (5 Vols.). London: Her Majesty’s Stationery Office.
Hinsley, F. H., & Stripp, A. (1993). Codebreakers: The inside story of Bletchley Park. Oxford: Oxford University Press.
Kahn, D. (1967). The codebreakers: The comprehensive history of secret communication from ancient times to the Internet. New York: Macmillan.
Kahn, D. (2004). The reader of gentlemen’s mail: Herbert O. Yardley and the birth of American codebreaking. New Haven: Yale University Press.
Knuth, D. E. (1997). The art of computer programming (Volume 1: Fundamental algorithms, 3rd ed.). Reading: Addison-Wesley.
Kraft, J. S., & Washington, L. C. (2014). An introduction to number theory with cryptography. Boca Raton: CRC Press.
Moore, J. M. (1975). Aristotle and Xenophon on democracy and oligarchy. University of California Press.
Pearson, E. S. (1990). ‘Student’: A statistical biography of William Sealey Gosset. Oxford: Oxford University Press/Clarendon Press.
Pratt, F. (1939). Secret and urgent: The story of codes and ciphers. New York: Bobbs-Merrill.
Pröse, M. (2006). Chiffriermaschinen und Entzifferungsgeräte im Zweiten Weltkrieg: Technikgeschichte und informatikhistorische Aspekte. Munich: Martin Meidenbauer Verlagsbuchhandlung.
Rand. (1955). A million random digits with 100,000 normal deviates. Illinois: Rand Corporation. Reissued 2001.
Reeds, J., et al. (2015). Breaking teleprinter ciphers at Bletchley Park: An edition of I.J. Good, D. Michie and G. Timms: General report on Tunny with emphasis on statistical methods (1945). Piscataway: IEEE Press.
Rejewski, M. (1981). How Polish mathematicians deciphered the Enigma. Annals of the History of Computing, 3, 213–234.
Rivest, R., Shamir, A., & Adelman, L. (1978). A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 21, 120–126.
Rowlett, F. B. (1998). The story of Magic: Memoirs of an American cryptologic pioneer. Laguna Hills: Aegean Park Press.
Samuels, M. (2016). Ludwig Föppl: A Bavarian cryptanalyst on the Western front. Cryptologia, 40, 355–373.
Sinkov, A. (1968). Elementary cryptanalysis: A mathematical approach. New York: New Mathematical Library, Random House.
Stigler, S. M. (1999). The statistics on the table: The history of statistical concepts and methods. Cambridge: Harvard University Press.
Turing, A. M. (2015). The applications of probability to cryptography. unpublished paper, c. 1941. UK National Archives, HW 25/37, 2012. For a typeset version, see Ian Taylor, arXiv:1505.04714v2 [math.HO].
Weierud, F., & Zabell, S. (2018). German mathematicians and cryptology during World War II. Submitted to Cryptologia.
Welchman, G. (1982). The Hut six story: Breaking the Enigma codes. New York: McGraw-Hill.
Welchman, G. (1986). From Polish bomba to British bombe: The birth of Ultra. Intelligence and National Security, 1, 71–110.
Winterbotham, F. W. (1974). The Ultra secret. London: Weidenfeld and Nicolson.
Yardley, H. O. (1931). The American Black Chamber. Indianapolis: Bobbs-Merrill.
Zabell, S. L. (2012). Commentary on Alan M. Turing: The applications of probability to cryptography. Cryptologia, 36, 191–214.
Zabell, S. L. (2015). Statistics at Bletchley Park. In Reeds et al. (2015) (pp. lxxv–ci).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG, part of Springer Nature
About this chapter
Cite this chapter
Zabell, S. (2018). Cryptology, Mathematics, and Technology. In: Hansson, S. (eds) Technology and Mathematics. Philosophy of Engineering and Technology, vol 30. Springer, Cham. https://doi.org/10.1007/978-3-319-93779-3_7
Download citation
DOI: https://doi.org/10.1007/978-3-319-93779-3_7
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-93778-6
Online ISBN: 978-3-319-93779-3
eBook Packages: Religion and PhilosophyPhilosophy and Religion (R0)