top of page

Effigy Press Group

Public·7 members

Codes And Ciphers John Laffin Pdf 11

Codes and Ciphers: Secret Writing Through the Ages by John Laffin

Codes and ciphers are methods of concealing messages from unauthorized eyes. They have been used throughout history for various purposes, such as military communication, espionage, diplomacy, and personal correspondence. In this book, John Laffin, a prolific Australian author and historian, traces the development of codes and ciphers from ancient times to the modern era, exploring their techniques, uses, and challenges.

Download Zip:

Summary of the Book

The book consists of 11 chapters, each focusing on a different period or aspect of secret writing. The chapters are as follows:

  • Chapter 1: The Beginnings. This chapter covers the origins of codes and ciphers in ancient civilizations, such as Egypt, Mesopotamia, China, India, Greece, and Rome. It also discusses some of the earliest forms of secret writing, such as hieroglyphs, cuneiform, acrostics, anagrams, and steganography.

  • Chapter 2: The Middle Ages. This chapter examines the use of codes and ciphers in medieval Europe and the Islamic world, as well as the contributions of some notable figures, such as Roger Bacon, Albertus Magnus, Leonardo da Vinci, and Johannes Trithemius.

  • Chapter 3: The Renaissance. This chapter explores the advancements in cryptography during the Renaissance period, especially in Italy and France. It also introduces some of the most famous codebreakers and codemakers of this era, such as Leon Battista Alberti, Blaise de Vigenère, François Viète, and Antoine Rossignol.

  • Chapter 4: The Seventeenth Century. This chapter describes the use of codes and ciphers in the political and religious conflicts of the seventeenth century, such as the Thirty Years' War, the English Civil War, and the Glorious Revolution. It also highlights some of the key developments in cryptanalysis, such as frequency analysis and polyalphabetic substitution.

  • Chapter 5: The Eighteenth Century. This chapter focuses on the role of codes and ciphers in the wars and revolutions of the eighteenth century, such as the War of Spanish Succession, the American Revolution, and the French Revolution. It also features some of the most influential cryptographers and cryptanalysts of this period, such as Charles Babbage, Thomas Jefferson, Benjamin Franklin, and Napoleon Bonaparte.

  • Chapter 6: The Nineteenth Century. This chapter reviews the use of codes and ciphers in the industrial and colonial expansion of the nineteenth century, as well as in some notable events, such as the Crimean War, the American Civil War, and the Boer War. It also showcases some of the innovations in cryptography during this time, such as telegraphy, cipher machines, and one-time pads.

  • Chapter 7: The Twentieth Century. This chapter covers the use of codes and ciphers in the two world wars and the Cold War, as well as in some other areas, such as diplomacy, espionage, business, and personal communication. It also presents some of the most remarkable achievements and challenges in cryptography during this century, such as Enigma, Ultra, Purple, Navajo code talkers, Lorenz cipher, Colossus, SIGABA, SIGSALY, Venona project, one-time tape, public-key cryptography, RSA algorithm, DES algorithm, PGP software, quantum cryptography, and digital signatures.

  • Chapter 8: Codes for Fun. This chapter explores some of the recreational aspects of codes and ciphers, such as puzzles, games, hobbies, literature, art, music, movies, television, comics, and cartoons. It also mentions some of the famous fictional characters who have used or encountered secret writing, such as Sherlock Holmes, James Bond, Harry Potter, Indiana Jones, Nancy Drew, Batman, Superman, Spider-Man, Scooby-Doo, SpongeBob SquarePants, and The Simpsons.

  • Chapter 9: Codes for Education. This chapter discusses some of the educational benefits of codes and ciphers, such as developing logical thinking, mathematical skills, linguistic abilities, historical knowledge, and cultural awareness. It also provides some examples of how secret writing can be used in various subjects, such as mathematics, science, language, history, geography, and art.

  • Chapter 10: Codes for the Future. This chapter speculates on some of the possible future trends and challenges in cryptography, such as biometrics, DNA encryption, nanotechnology, quantum computing, artificial intelligence, and cyberwarfare. It also raises some ethical and social issues related to secret writing, such as privacy, security, trust, identity, and freedom.

  • Chapter 11: How to Make and Break Codes and Ciphers. This chapter offers some practical advice and tips on how to create and solve codes and ciphers, as well as some examples of simple and complex methods of secret writing, such as Caesar cipher, Vigenère cipher, Playfair cipher, Hill cipher, Transposition cipher, Rail fence cipher, Scytale cipher, Pigpen cipher, Morse code, Braille code, Binary code, ASCII code, Baconian cipher, Beale ciphers, Zodiac ciphers, and RSA cipher.

Review of the Book

Codes and Ciphers: Secret Writing Through the Ages is a fascinating and informative book that covers a wide range of topics related to cryptography. The author, John Laffin, is an expert in military history and has written over 100 books on various aspects of war and conflict. He has a clear and engaging writing style that makes the book easy to read and understand. He also provides many illustrations, diagrams, tables, charts, and examples to help explain the concepts and techniques of secret writing. The book is well-organized and well-researched, with a comprehensive bibliography and index. The book is suitable for readers of all ages and backgrounds who are interested in learning more about codes and ciphers.

The book is not without some drawbacks, however. The book was first published in 1964, which means that some of the information may be outdated or inaccurate by now. For instance, the book does not cover some of the recent developments in cryptography, such as AES algorithm, blockchain technology, cryptocurrency, and homomorphic encryption. The book also has some errors and typos that may confuse or mislead the readers. For example, on page 11, the author states that "the Egyptians used hieroglyphics for about 3,000 years until about AD 400", which is incorrect because hieroglyphics were used until about AD 300. On page 39, the author states that "the first recorded use of a cipher was by Julius Caesar", which is also incorrect because there are earlier examples of ciphers from other civilizations. On page 152, the author states that "the RSA cipher was invented by three American mathematicians in 1977", which is partially incorrect because one of them was British. These errors and typos could have been avoided or corrected by a more careful editing process.

Overall, Codes and Ciphers: Secret Writing Through the Ages is a valuable and enjoyable book that provides a comprehensive overview of the history and evolution of secret writing. It is a great resource for anyone who wants to learn more about codes and ciphers or to practice their skills in making and breaking them. The book is available for free download from the Internet Archive or for purchase from various online platforms.


Welcome to the group! You can connect with other members, ge...
bottom of page