Ever wanted to send a message that was only intended for your pal to see? Or perhaps you wanted to try and decipher someone else's covert message.
If so, then this article will teach you all you need to know about making and breaking codes, from the simplest replacement messages to the details of the illustrious Enigma Machine used during World War II.
The author argues that the educational approach is more approachable than what is "conventional" in crypto, even if it is based on formal definitions and proofs of security. The writing style used for all security definitions is uniform, straightforward, and "game-based." See the index of security definitions for an example of security definitions written in this manner (which will make more sense after reading chapters 2 & 4).
The ultimate introduction to each of the three main branches of cryptography—message security, key negotiation, and key management—can be found in this indispensable manual.
You'll be delighted as this humorous book takes you on a code-breaking expedition, teaching you how to solve both straightforward and complex problems and giving you a background on cryptology.