CLASSICAL CRYPTOGRAPHY COURSE BY LANAKI 20 MARCH 1997 Revision 3 COPYRIGHT 1997 ALL RIGHTS RESERVED ANNOTATED CRYPTOGRAPHIC RESOURCES AND REFERENCES ----------- Notes: o Some cipher families are referenced as a group (ex. [TRAN] for Transposition Ciphers: Columnar, Incomplete Columnar, Tramp, Skipping Tramp, etc.) o The Cryptogram, is the bimonthly publication of the American Cryptogram Association. These references are both scholarly and cipher specific. I have updated them through 1996. They are available through the ACA Treasurer at the address in the front of this book or Volume I of my course. o Cryptographic resources presented explore all phases of involvement with cryptography: cryptanalysis, history, legal, social, classical, modern, NSA, mathematical techniques, recreational, intelligence, tactical, strategic, nuclear, National Defense, INFOSEC: Offensive and Defensive, Hardware, and Software. Enjoy. o Public - Key Cryptography references have additional annotations and may have some overlap with reference [NIST90], Lecture 19 on Law and Lectures 20 - 25 on modern issues surrounding cryptography. These references represent state-of the-art 1990 -1993. o About 100 web links to cryptographic sources have been added under the section Web Sources. A wealth of information on all levels is available. o Pertinent cases involving cryptographic issues are cited by primary court. o Senate and House bills are referenced by year and number, if appropriate. ---------- [3627] H. R. 3627, "A Bill to Amend the Export Administration Act of 1979 with respect to the control of computer and related equipment," 1993. [ABRA] Abrams, F., 1993, Big Brother's Here and --Alas -- We Embrace Him, New York Times Magazine, March 21, 1993, pp. 36-37. [ABA ] American Bankers Association, 1979, Management and Use of Personal Identification Numbers, ABA Bank Card Statement, ABA, Catalog No. 207213, 1979. [ACA] ACA and You, "Handbook For Members of the American Cryptogram Association," ACA publications, 1995. [ACA1] Anonymous, "The ACA and You - Handbook For Secure Communications", American Cryptogram Association, 1994. [ACME] "ACME Complete Seven Figure Code", Acme Code Co., 507 West 33 rd St., NYC, NY. No 6015, 1 January 1934. [ACLU] Statement of the American Civil Liberties Union in "Cryptographic Issue Statements Submitted to the Computer System Security and Privacy Advisory Board," by NIST, 27 May 1993, pp. 195-199. [ACM] Association For Computing Machinery, "Codes, Keys and Conflicts: Issues in U.S. Crypto Policy," Report of a Special Panel of ACM U. S. Public Policy Committee (USACM), June 1994. [AD79] L. Adleman, "A subexponential algorithm for the discrete logarithm problem with applications to Cryptography," in 20th Annual Symposium on Foundations of Computer Science, San Juan, Puerto Rico, October 29-31, 1979, pp. 55-60. Silver Spring, MD: IEEE Computer Society Press, 1979. [AD82] L. M. Adleman, "On breaking the iterated Merkle- Hellman public-key cryptosystems," in D. Chaum, R. L. Rivest, and A. T. Sherman, Eds., Advances in Cryptology: proceedings of CRYPTO 82, a Workshop on the Theory and Application of Cryptographic Techniques, Santa Barbara, CA, August 23-25, 1982, pp. 303-308. New York: Plenum Press, 1983. [AD86] L. M. Adleman and K. S. McCurley, "Open problems in number theoretic complexity," in D. S. Johnson, T. Nishizeki, A. Nozaki, and H. S. Wilf, Eds., Discrete Algorithms and Complexity, proceedings of the Japan-US Joint Seminar, Kyoto, Japan, June 4- 6, 1986, pp. 237-262. Orlando, FL: Academic Press, 1987. [AD83] L. M. Adleman, C. Pomerance, and R. S. Rumely, "On distinguishing prime numbers from composite numbers," Annals of Mathematics, Vol. 117, 1983, pp. 173-206. [ADFG] ASTROLABE, "ADFGVX Cipher - The German Field Cipher of 1918," AS53, The Cryptogram, American Cryptogram Association, 1953. [AFM] - 100-80, Traffic Analysis, Department of the Air Force, 1946. [AK83] S. G. Akl, "Digital signatures: a tutorial survey," Computer, Vol. 16, No. 2, February 1983, pp. 15-24. [AK84] S. G. Akl and H. Meijer, "A fast pseudo random permutation generator with applications to cryptology," in G. R. Blakley and D. Chaum, Eds., Lecture Notes in Computer Science Vol. 196: Advances in Cryptology: Proceedings of CRYPTO 84, a Workshop on the Theory and Application of Cryptographic Techniques, Santa Barbara, CA, August 19-22, 1984, pp. 269-275. Berlin/New York: Springer- Verlag, 1985. [ALAN] Turing, Alan, "The Enigma", by A. Hodges. Simon and Schuster, 1983. [ALBA] Alberti, "Treatise De Cifris," Meister Papstlichen, Princeton University Press, Princeton, N.J., 1963. [ALEX] Alexander, D. A., "Secret codes and Decoding," Padell Book Co., New York, 1945. [ALGE] MINIMAX, "Introduction To Algebraic Cryptography," FM51, The Cryptogram, American Cryptogram Association, 1951. [ALKA] al-Kadi, Ibrahim A., Origins of Cryptology: The Arab Contributions, Cryptologia, Vol XVI, No. 2, April 1992, pp. 97-127. [ALP1] PICCOLA, "Lining Up the Alphabets," AM37, The Cryptogram, American Cryptogram Association, 1937. [ALP2] PICCOLA, "Recovering a Primary Number Alphabet," JJ37, The Cryptogram, American Cryptogram Association, 1937. [ALP3] CLEAR SKIES, "Method For Recovering Alphabets," AM46, The Cryptogram, American Cryptogram Association, 1946. [ALP4] PICCOLA, "Lining Up the Alphabets," AM37, The Cryptogram, American Cryptogram Association, 1937. [ALP5] MACHIAVELLI,"Recovery of Incomplete Cipher Alphabets," SO78, The Cryptogram, American Cryptogram Association, 1978. [ALP6] BOZO,"Recovery of Primary Alphabets I," JJ35, The Cryptogram, American Cryptogram Association, 1935. [ALP7] BOZO,"Recovery of Primary Alphabets II," AS35, The Cryptogram, American Cryptogram Association, 1935. [ALP8] ZYZZ,"Sinkov - Frequency-Matching," JA93, The Cryptogram, American Cryptogram Association, 1993. [AMS1] RED E RASER,"AMSCO," ON51, The Cryptogram, American Cryptogram Association, 1951. [AMS2] PHOENIX,"Computer Column: Amsco Encipherment," SO84, The Cryptogram, American Cryptogram Association, 1984. [AMS3] PHOENIX,"Computer Column: Amsco Decipherment," MA85, The Cryptogram, American Cryptogram Association, 1985. [AMS4] PHOENIX,"Computer Column: Amsco Decipherment," MJ85, The Cryptogram, American Cryptogram Association, 1985. [AMS5] PHOENIX,"Computer Column: Amsco Decipherment," JA85, The Cryptogram, American Cryptogram Association, 1985. [AMS6] GUNG HO,"Solving the Amsco," MJ92, The Cryptogram, American Cryptogram Association, 1992. [AN85] American National Standard X9.17-1985, Financial Institution Key Management (Wholesale), American Bankers Association, Washington, DC, 1985. [AN87] M. Annaratone, E. Arnould, T. Gross, H. T. Kung, M. Lam, O. Menzilcioglu, and J. A. Webb, "The Warp computer: architecture, implementation and performance," IEEE Transactions on Computers, Vol. C-36, No. 12, December 1987, pp. 1523-1538. [ANDE] D. Andelman, J. Reeds, On the cryptanalysis of rotor and substitution-permutation networks. IEEE Trans. on Inform. Theory, 28(4), 578--584, 1982. [ANDR] Andrew, Christopher, "For The President's Eyes Only," Harper Collins, New York, 1995. [ANGL] D. Angluin, D. Lichtenstein, Provable Security in Crypto-systems: a survey. Yale University, Department of Computer Science, #288, 1983. [AND1] Andree, Josephine, "Chips from the Math Log," Mu Alpha Theta, 1966. [AND2] Andree, Josephine, "More Chips from the Math Log," Mu Alpha Theta, 1970. [AND3] Andree, Josephine, "Lines from the O.U. Mathematics Letter," Vols. I,II,III, Mu Alpha Theta, 1971, 1971, 1971. [AND4] Andree, Josephine and Richard V., "RAJA Books: a Puzzle Potpourri," RAJA, 1976. [AND5] Andree, Josephine and Richard V., "Preliminary Instructors Manual for Solving Ciphers," Project CRYPTO, Univ of Oklahoma, Norman, OK, 1977. [AND6] Andree, Josephine and Richard V., "Teachers Handbook For Problem Solving and Logical Thinking," Project CRYPTO, Univ of Oklahoma, Norman, OK, 1979. [AND7] Andree, Josephine and Richard V., "Preliminary Instructors Manual for Cryptarithms," Project CRYPTO, Univ of Oklahoma, Norman, OK, 1976. [AND8] Andree, Josephine and Richard V., "Sophisticated Ciphers: Problem Solving and Logical Thinking," Project CRYPTO, Univ of Oklahoma, Norman, OK, 1978. [AND9] Andree, Josephine and Richard V., "Logic Unlocs Puzzles," Project CRYPTO, Univ of Oklahoma, Norman, OK, 1979. [ANDR] Andrew, Christopher, 'Secret Service', Heinemann, London 1985. [ANFI] "American National Standard for Financial Institution Key Management (Wholesale)," ANSI X9.17, Washington Publishing Company, P.O. Box 203, Chardon, OH 44024-0203, telephone (800) 334- 4912. [ANK1] Andreassen, Karl, "Cryptology and the Personal Computer, with Programming in Basic," Aegean Park Press, 1986. [ANK2] Andreassen, Karl, "Computer Cryptology, Beyond Decoder Rings," Prentice-Hall 1988. [ANNA] Anonymous., "The History of the International Code.", Proceedings of the United States Naval Institute, 1934. [ANN1] Anonymous., " Speech and Facsimile Scrambling and Decoding," Aegean Park Press, Laguna Hills, CA, 1981. [AO93] Administrative Office of the United States Courts, 1993, Report on Applications for Orders Authorizing or Approving the Interception of Wire, Oral, or Electronic Communications (Wiretap Report) 1993. [ARI1] OZ,"The Construction of Medium - Difficulty Aristocrats," MA92, The Cryptogram, American Cryptogram Association, 1992. [ARI2] HELCRYPT,"Use of Consonant Sequences for Aristocrats," ON51, The Cryptogram, American Cryptogram Association, 1951. [ARI3] HELCRYPT,"Use of Tri-Vowel Sequences for Aristocrats," JJ52, The Cryptogram, American Cryptogram Association, 1952. [ARI4] AB STRUSE, "Equifrequency Crypts," JF74, The Cryptogram, American Cryptogram Association, 1974. [ARI5] HOMO SAPIENS,"End-letter Count for Aristocrats," FM45, The Cryptogram, American Cryptogram Association, 1945. [ARI6] S-Tuck, "Aristocrat Affixes," ON45, The Cryptogram, American Cryptogram Association, 1945. [ARNE] Arnell, A. (1990). "Handbook of Effective Disaster Recovery Planning: A Seminar Workshop Approach". McGraw-Hill (New York). ISBN 0-07- 002394-8. xxix + 333. Index. [ASA ] "The Origin and Development of the Army Security Agency 1917 -1947," Aegean Park Press, 1978. Collections 190/37/7/1, Box 799, F: 2292, pp 468. [ASA1] Army Security Agency (1948) Historical and Cryptologic Summary of Cryptosystems; ASAG 23; Vol 1. [ASSA] Army Signal Security Agency (1946) History Of Converter M-134-C (Sigaba) Vol I, II And III: available from the US National Archives and Records Administration (NARA); NSA Historical [ASHT] Ashton, Christina, "Codes and Ciphers: Hundreds of Unusual and Secret Ways to Send Messages," Betterway Books, 1988. [ASIR] Anonymous, Enigma and Other Machines, Air Scientific Institute Report, 1976. [ATKI] Atkins, Derek, et. al., "Internet Security: Professional Reference," New Riders, Indianapolis, 1996. [AUG1] D. A. August, "Cryptography and Exploitation of Chinese Manual Cryptosystems - Part I:The Encoding Problem", Cryptologia, Vol XIII, No. 4, October 1989. [AUG2] D. A. August, "Cryptography and Exploitation of Chinese Manual Cryptosystems - Part II:The Encrypting Problem", Cryptologia, Vol XIV, No. 1, August 1990. [AUT1] PICCOLA,"Autokey Encipherment,"DJ36, The Cryptogram, American Cryptogram Association, 1936. [AUT2] PICCOLA,"More about Autokeys,"FM37, The Cryptogram, American Cryptogram Association, 1937. [AUT3] ISKANDER,"Converting an Autokey to a Periodic," "JJ50, The Cryptogram, American Cryptogram Association, 1950. [AUT4] UBET,"Auto-Transposition Cipher," SO62, The Cryptogram, American Cryptogram Association, 1962. [AUT5] BARGE,"Decrypting the Auto-Transposition Cipher," ND63, The Cryptogram, American Cryptogram Association, 1963. [Ban ] Banisar, D., 1993, Statistical Analysis of Electronic Surveillance, presentation at the National Institute of Standards and Technology, Computer System Security and Privacy Advisory Board, June 3, 1993. [BA82] S. K. Banerjee, "High speed implementation of DES," Computers & Security, Vol. 1, No. 3, November 1982, pp. 261-267. [BA63] T. C. Bartee and D. I. Schneider, "Computation with Finite Fields," Information and Control, Vol. 6, 1963, pp. 79-98. [BA80] K. E. Batcher, "Design of a massively parallel processor," IEEE Transactions on Computers, Vol. C-29, No. 9, September 1980, pp. 836-840. [BAC1] SHMOO,"Quicker Baconian Solutions," ND80, The Cryptogram, American Cryptogram Association, 1980. [BAC2] XERXES,"Sir Francis Bacon Cipher," AS36, The Cryptogram, American Cryptogram Association, 1936. [BAC3] AB STRUSE,"Solving a Baconian," JJ48, The Cryptogram, American Cryptogram Association, 1948. [BAC4] B.NATURAL,"Tri-Bac Cipher," JA69, The Cryptogram, American Cryptogram Association, 1969. [BAC5] Anonymous, "Numerical Baconian," JF62, The Cryptogram, American Cryptogram Association, 1962. [BAC6] FIDDLE,"Extended Baconian," SO69, The Cryptogram, American Cryptogram Association, 1969. [BADE] Badeau, J. S. et. al., The Genius of Arab Civilization: Source of Renaissance. Second Edition. Cambridge: MIT Press. 1983. [BAMF] Bamford, James, "The Puzzle Palace: A Report on America's Most Secret Agency," Boston, Houghton Mifflin, 1982. [BANI] Banisar, Dave. CPSR Alert. 13 Jan.1994: n.p. USENET: comp.society.privacy. [BARL] Barlow, John Perry. "Bill O' Rights." Mondo 2000. January, 1994:17-19. [BARB] Barber, F. J. W., "Archaeological Decipherment: A Handbook," Princeton University Press, 1974. [B201] Barker, Wayne G., "Cryptanalysis of The Simple Substitution Cipher with Word Divisions," Course #201, Aegean Park Press, Laguna Hills, CA. 1982. [BALL] Ball, W. W. R., Mathematical Recreations and Essays, London, 1928. [BAR1] Barker, Wayne G., "Course No 201, Cryptanalysis of The Simple Substitution Cipher with Word Divisions," Aegean Park Press, Laguna Hills, CA. 1975. [BAR2] Barker, W., ed., History of Codes and Ciphers in the U.S. During the Period between World Wars, Part II, 1930 - 1939., Aegean Park Press, 1990. [BAR3] Barker, Wayne G., "Cryptanalysis of the Hagelin Cryptograph, Aegean Park Press, 1977. [BAR4] Barker, Wayne G., "Cryptanalysis of the Enciphered Code Problem - Where Additive Method of Encipherment Has Been Used," Aegean Park Press, 1979. [BAR5] Barker, W., ed., History of Codes and Ciphers in the U.S. Prior To World War I," Aegean Park Press, 1978. [BAR6] Barker, W., " Cryptanalysis of Shift-Register Generated Stream Cipher Systems," Aegean Park Press, 1984. [BAR7] Barker, W., ed., History of Codes and Ciphers in the U.S. During the Period between World Wars, Part I, 1919-1929, Aegean Park Press, 1979. [BAR8] Barker, W., ed., History of Codes and Ciphers in the U.S. During World War I, Aegean Park Press, 1979. [BARK] Barker, Wayne G., "Cryptanalysis of The Simple Substitution Cipher with Word Divisions," Aegean Park Press, Laguna Hills, CA. 1973. [BARK2] Barker, Wayne G., "Cryptanalysis of The Double Transposition Cipher," Aegean Park Press, Laguna Hills, CA. 1995. [BARR] Barron, John, '"KGB: The Secret Work Of Soviet Agents," Bantom Books, New York, 1981. [BATE] Bates, R. J., Jr (1992). "Disaster Recovery Planning: Networks, Telecommunications, and Data Communications". McGraw-Hill (New York). ISBN 0- 07-004128-8. 156 + xv. Index, glossary. [BAT1] Bates, R. J., Jr (1994). "Disaster Recovery for LANs: A Planning and Action Guide". McGraw-Hill (New York). ISBN 0-07-004194-6. x + 254. Index. [BAUD] Baudouin, Captain Roger, "Elements de Cryptographie," Paris, 1939. [BAZE] Bazeries, M. le Capitaine, " Cryptograph a 20 rondelles-alphabets," Compte rendu de la 20e session de l' Association Francaise pour l'Advancement des Scienses, Paris: Au secretariat de l' Association, 1892. [BAZ1] Bazeries, les chiffrees secrets devoiles, Paris, 1901. [BAZ1] OZ,"Bazeries Cipher," MA59, The Cryptogram, American Cryptogram Association, 1959. [BAZ2] ALII KIONA,"Bazeries Cipher," F35, The Cryptogram, American Cryptogram Association, 1935. [BAZ3] ZANAC,"A Poker Player's Method to Solve Bazeries Ciphers," JF82, The Cryptogram, American Cryptogram Association, 1982. [BAZ4] HI-FI,"Bazeries Ciphers Revisited," SO64, The Cryptogram, American Cryptogram Association, 1964. [BAZ5] MACHIAVELLI,"Bazeries Cipher - Dutch," ND71, The Cryptogram, American Cryptogram Association, 1971. [BAZ6] MACHIAVELLI,"Bazeries Cipher - English," JF71, The Cryptogram, American Cryptogram Association, 1971. [BAZ7] MACHIAVELLI,"Bazeries Cipher - French," JF71, The Cryptogram, American Cryptogram Association, 1971. [BAZ8] MACHIAVELLI,"Bazeries Cipher - German," MA71, The Cryptogram, American Cryptogram Association, 1971. [BAZ9] MACHIAVELLI,"Bazeries Cipher - Italian," JA71, The Cryptogram, American Cryptogram Association, 1971. [BAZA] MACHIAVELLI,"Bazeries Cipher - Portuguese," SO71, The Cryptogram, American Cryptogram Association, 1971. [BAZB] MACHIAVELLI,"Bazeries Cipher - Spanish," MJ71, The Cryptogram, American Cryptogram Association, 1971. [BAZC] MACHIAVELLI,"Bazeries Cipher - Unknown Language," MJ72, The Cryptogram, American Cryptogram Association, 1972. [BAZD] HANO,"Bazeries Cipher - Swedish," JA81, The Cryptogram, American Cryptogram Association, 1981. [BAZE] D. STRASSE,"Bazeries Cipher - Esperanto," SO74, The Cryptogram, American Cryptogram Association, 1974. [BAZ5] MACHIAVELLI, "Equivalents of 'e' in the Bazeries Cipher" SO72, The Cryptogram, American Cryptogram Association, 1972. [BDKM] Brickell, E., Denning, D., Kent, S., Maher, D. and Tuchman, W., 1993,``SKIPJACK Review: Interim Report, The SKIPJACK Algorithm,'' July 28, 1993, available electronically from cpsr.org. [BEA1] S-TUCK, "Beaufort Auto-key," JJ46, The Cryptogram, American Cryptogram Association, 1946. [BEA2] PICCOLA, "Beaufort Ciphers," JJ36, The Cryptogram, American Cryptogram Association, 1936. [BEA3] LEDGE, "Beaufort Fundamentals (Novice Notes)," ND71, The Cryptogram, American Cryptogram Association, 1971. [BEA4] SI SI, "Comparative Analysis of the Vigenere, Beaufort and Variant Ciphers," JA80, The Cryptogram, American Cryptogram Association, 1980. [BEA5] O'PSHAW, "Porta, A special Case of Beaufort," MA91, The Cryptogram, American Cryptogram Association, 1991. [BECK] Becket, Henry, S. A., "The Dictionary of Espionage: Spookspeak into English," Stein and Day, 1986. [BEKE] H. Beker, F. Piper, Cipher Systems. Wiley, 1982. [BEES] Beesley, P., "Very Special Intelligence", Doubleday, New York, 1977. [BELL] Bell, E. T., Men of Mathematics, New York: Simon and Shuster, 1937. [BENN] Bennett, William, R. Jr., "Introduction to Computer Applications for Non-Science Students," Prentice-Hall, 1976. (Interesting section on monkeys and historical cryptography) [BEN1] John Bennett, Analysis of the Encryption Algorithm Used in the WordPerfect Word Processing Program. Cryptologia 11(4), 206--210, 1987. [BERG] H. A. Bergen and W. J. Caelli, File Security in WordPerfect 5.0. Cryptologia 15(1), 57--66, January 1991. [BERN] Bernstein, T., A. B. Bhimani, E. Schultz, & C. A. Siegel (1996). "Internet Security for Business". John Wiley & Sons (New York). ISBN 0-471-13752- 9. xii + 452. Index. [BERN] Berners-Lee, T. "Hypertext Markup Language (HTML)", draft-ieft-iiir-html-01, June 1993. (expired working draft) [BERY] BERYL,"The Turning Grille," ND92, The Cryptogram, American Cryptogram Association, 1992. [BER1] BERYL,"The Diagrafid Cipher - Part II," ND93, The Cryptogram, American Cryptogram Association, 1993. [BETH] T. Beth, Algorithm engineering for public key algorithms. IEEE Selected Areas of Communication, 1(4), 458--466, 1990. [BFS] Beth, T., Frisch, M. and Simmons, G. (Eds.), 1992, Public Key Cryptography: State of the Art and Future Directions, Lecture Notes in Computer Science, No. 578, Springer-Verlag, 1992. [BIF1] ESP, "4-Square Method for C. M. Bifid," SO92, The Cryptogram, American Cryptogram Association, 1992. [BIF2] GALUPOLY, "6X6 Bifid," JA62, The Cryptogram, American Cryptogram Association, 1962. [BIF3] DR. CRYPTOGRAM, "Bifid and Trifid Cryptography," MJ59, The Cryptogram, American Cryptogram Association, 1959. [BIF4] TONTO, "Bifid Cipher," JJ45, The Cryptogram, American Cryptogram Association, 1945. [BIF5] GOTKY, "Bifid Cipher with Literal Indices Only," FM47, AM47, The Cryptogram, American Cryptogram Association, 1947. [BIF6] SAI CHESS, "Bifid-ian Timesaver," ON48, The Cryptogram, American Cryptogram Association, 1948. [BIF7] LABRONICUS, "Bifid Period by Pattern," ND89, The Cryptogram, American Cryptogram Association, 1989. [BIF8] TONTO, "Bifid recoveries," ON50, The Cryptogram, American Cryptogram Association, 1950. [BIF9] GIZMO, "Bifid Period Determination Using a Digraphic Index of Coincidence," JF79, The Cryptogram, American Cryptogram Association, 1979. [BIFA] GALUPOLY, "Bifid with Conjugated Matrices," JF60, The Cryptogram, American Cryptogram Association, 1960. [BIFB] XAMAN EK, "Bifid Workshop, Part 1 - Encoding a Bifid," MA93, The Cryptogram, American Cryptogram Association, 1993. [BIFC] XAMAN EK, "Bifid Workshop, Part 2 - Problem Setup," MJ93, The Cryptogram, American Cryptogram Association, 1993. [BIFD] XAMAN EK, "Bifid Workshop, Part 3 - Tip Placement," JA93, The Cryptogram, American Cryptogram Association, 1993. [BIFE] XAMAN EK, "Bifid Workshop, Part 4 - Solving a Bifid," SO93, The Cryptogram, American Cryptogram Association, 1993. [BIFF] DUBIOUS and GALUPOLY, " Chi-Square Test for Bifids," JA60, The Cryptogram, American Cryptogram Association, 1960. [BIFG] FIDDLE, "C. M. Bifid, Simplified Solution," MJ73, The Cryptogram, American Cryptogram Association, 1973. [BIFH] ZYZZ, "Conjugated Matrix Bifid, Modified Solving Technique," SO92, The Cryptogram, American Cryptogram Association, 1992. [BIFI] X.GOTKY, "Delastelle Bifid Cipher," AS45, The Cryptogram, American Cryptogram Association, 1945. [BIFJ] D.MORGAN, "Finding the Period in a Bifid," JJ46, The Cryptogram, American Cryptogram Association, 1946. [BIFK] S-TUCK, "Finding the Period in a Bifid," AM46, The Cryptogram, American Cryptogram Association, 1946. [BIFL] S-TUCK, "Finding the Period in Bifids," ON44, The Cryptogram, American Cryptogram Association, 1944. [BIFM] ROGUE, "General Probabilities of Part Naturals in Bifid, Trifid" JA70, The Cryptogram, American Cryptogram Association, 1970. [BIFN] B.NATURAL, "In Line Bifid Method," MA62, The Cryptogram, American Cryptogram Association, 1962. [BIFO] ABC, "Short Cut in a Bifid," SO61, The Cryptogram, American Cryptogram Association, 1961. [BIFP] ROGUE, "Specific Probabilities of Part Naturals in Bifid, Trifid" SO70, The Cryptogram, American Cryptogram Association, 1970. [BIFQ] ROGUE, "Split Half Method For Finding A Period of Bifid," MA71, The Cryptogram, American Cryptogram Association, 1971. [BIFR] ABC, "Twin Bifids - A Probable Word Method," JA62, The Cryptogram, American Cryptogram Association, 1962. [BIFS] GALUPOLY, "Twin Bifids," MJ60, JA60, The Cryptogram, American Cryptogram Association, 1960. [BIGR] PICCOLA, "Use of Bigram Tests" AS38, The Cryptogram, American Cryptogram Association, 1938. [BIGE] Bigelow, Robert P., Legal Issues in Computer Security 1995 by Robert P. Bigelow. [BIHS] E. Biham and A. Shamir, Differential cryptanalysis of DES-like cryptosystems. Journal of Cryptology, vol. 4, #1, 3--72, 1991. [BiSh] Biham, E. and Shamir, A., 1993, Differential Cryptanalysis of the Data Encryption Standard, Springer-Verlag 1993. [BISH] E. Biham, A. Shamir, Differential cryptanalysis of Snefru, Khafre, REDOC-II, LOKI and LUCIFER. In Proceedings of CRYPTO '91, ed. by J. Feigenbaum, 156--171, 1992. [BL84] I. F. Blake, R. Fuji-Hara, R. C. Mullin, and S. A. Vanstone, "Computing logarithms in finite fields of characteristic two," SIAM Journal on Algebraic and Discrete Methods, Vol. 5, No. 2, June 1984, pp. 276-285. [B84b] I. F. Blake, R. C. Mullin, and S. A. Vanstone, "Computing logarithms in GF(2n)," in G. R. Blakley and D. Chaum, Eds., Lecture Notes in Computer Science Vol. 196: Advances in Cryptology: Proceedings of CRYPTO 84, a Workshop on the Theory and Application of Cryptographic Techniques, Santa Barbara, CA, August 19-22, 1984, pp. 73-82. Berlin/New York: Springer-Verlag, 1985. [BLAZ] Blaze, Matt. "Notes on key escrow meeting with NSA." 2Feb. 1994. USENET: alt.privacy.clipper. [BL83] G. R. Blakley, "A computer algorithm for calculating the product AB modulo M," IEEE Transactions on Computers, Vol. C-32, No. 5, May 1983, pp. 497-500. [Blaz] Blaze, M., 1994, ``Protocol Failure in the Escrowed Encryption Standard,'' May 31, 1994. [Blum] Blum, H., 1993, Gangland: How the FBI Broke the Mob, Simon & Schuster, New York 1993. [BL84] M. Blum and S. Micali, "How to generate crypto- graphically strong sequences of pseudo-random bits," SIAM Journal on Computing, Vol. 13, No. 4, November 1984, pp. 850-864. [BLK] Blackstock, Paul W. and Frank L Schaf, Jr., "Intelligence, Espionage, Counterespionage and Covert Operations," Gale Research Co., Detroit, MI., 1978. [BLOC] Bloch, Gilbert and Ralph Erskine, "Exploit the Double Encipherment Flaw in Enigma", Cryptologia, vol 10, #3, July 1986, p134 ff. (29) [BLUE] Bearden, Bill, "The Bluejacket's Manual, 20th ed., Annapolis: U.S. Naval Institute, 1978. [BODY] Brown, Anthony - Cave, "Bodyguard of Lies", Harper and Row, New York, 1975. [BOLI] Bolinger, D. and Sears, D., "Aspects of Language," 3rd ed., Harcourt Brace Jovanovich,Inc., New York, 1981. [BOLO] Bologna, J. (1993). "Handbook on Corporate Fraud: Prevention, Detection, Investigation". Butterworth-Heinemann (Boston). ISBN 0-7506- 9243-X. xii + 308. Index. [BORI] BORIQUA, " The Langosta Cipher," ND59, The Cryptogram, American Cryptogram Association, 1959. [BOSW] Bosworth, Bruce, "Codes, Ciphers and Computers: An Introduction to Information Security," Hayden Books, Rochelle Park, NJ, 1990. [BOWE] Bowers, William Maxwell, "The Bifid Cipher, Practical Cryptanalysis, II, ACA, 1960. [BOW1] Bowers, William Maxwell, "The Trifid Cipher," Practical Cryptanalysis, III, ACA, 1961. [BOW2] Bowers, William Maxwell, "The Digraphic Substitution," Practical Cryptanalysis, I, ACA, 1960. [BOW3] Bowers, William Maxwell, "Cryptographic ABC'S: Substitution and Transposition Ciphers," Practical Cryptanalysis, IV, ACA, 1967. [BOWN] Bowen, Russell J., "Scholar's Guide to Intelligence Literature: Bibliography of the Russell J. Bowen Collection," National Intelligence Study Center, Frederick, MD, 1983. [BO81] K. S. Booth, "Authentication of signatures using public key encryption," Communications of the ACM, Vol. 24, No. 11, November 1981, pp. 772-774. [BOYA] J. Boyar, Inferring Sequences Produced by Pseudo- Random Number Generators. Journal of the ACM, 1989. [BP82] Beker, H., and Piper, F., " Cipher Systems, The Protection of Communications", John Wiley and Sons, NY, 1982. [BR75] D. K. Branstad, "Encryption protection in computer data communications," in Proceedings of the 4th Data Communications Symposium, October 7- 9, 1975, pp. 8.1 -8.7. IEEE. [BR79] G. Brassard, "A note on the complexity of cryptography," IEEE Transactions on Information Theory, Vol. IT-25, No. 2, March 1979, pp. 232- 233. [B83a] G. Brassard, "Relativized cryptography," IEEE Transactions on Information Theory, Vol. IT-29, No. 6, November 1983, pp. 877- 894. [BR88] G. Brassard, Lecture Notes in Computer Science Vol. 325: Modern Cryptology: a Tutorial. Berlin/New York: Springer-Verlag, 1988. [BR83] R. P. Brent and H. T. Kung, "Systolic VLSI arrays for linear-time GCD computation," in F. Anceau and E. J. Aas, Eds., VLSI 83, proceedings of the IFIP TC 10/WG 10.5 International Conference on VLSI, Trondheim, Norway, August 16-19, 1983, pp. 145- 154. Amsterdam /New York: North-Holland, 1983. [B83b] R. P. Brent, H. T. Kung, and F. T. Luk, "Some linear-time algorithms for systolic arrays," in R. E. A. Mason, Ed., IFIP Congress Series Vol. 9: Information Processing 83, proceedings of the IFIP 9th World Congress, Paris, France, September 19-23, 1983, pp. 865-876. Amsterdam/New York: North-Holland, 1983. [BRIC] Brickell, E., et al., "SKIPJACK Review Interim Report: The SKIPJACK Algorithm", 28 July 1993, Posted on sci.crypt. [Broa] Broad, W., 1992, ``Evading the Soviet Ear at Glen Cove,'' Science, Vol. 217 (3), September, 1982, pp 910-911. [BR82] E. F. Brickell, "A fast modular multiplication algorithm with application to two key cryptography," in D. Chaum, R. L. rivest, and A. T. Sherman, Eds., Advances in Cryptology: proceedings of CRYPTO '82, a Workshop on the Theory and Application of Cryptographic Techniques, Santa Barbara, CA, August 23-25, 1982, pp. 51-60. New York: Plenum Press, 1983. [B83c] E. F. Brickell, "Solving low density knapsacks," in D. Chaum, Ed., Advances in Cryptology: proceedings of CRYPTO 83, a Workshop on the Theory and Application of Cryptographic Techniques, Santa Barbara, CA, August 22-24, 1983, pp. 25-37. New York: Plenum Press, 1984. [BR84] E. F. Brickell, "Breaking iterated knapsacks," in G. R. Blakley and D. Chaum, Eds., Lecture Notes in Computer Science Vol. 196: Advances in Cryptology: Proceedings of CRYPTO 84, a Workshop on the Theory and Application of Cryptographic Techniques, Santa Barbara, CA, August 19-22, 1984, pp. 342-358. Berlin /New York: Springer- Verlag, 1985. [BR89] E. F. Brickell, "A survey of hardware implementations of RSA," in G. Brassard, Ed., Lecture Notes in Computer Science Vol. 435: Advances in Cryptology -Proceedings of CRYPTO '89, pp. 368- 370. Berlin/New York: Springer- Verlag, 1990. [BR88] E. F. Brickell and A. M. Odlyzko, "Cryptanalysis: a survey of recent results," Proceedings of the IEEE, Vol. 76, No. 5, May 1988, pp. 578-593. [BR76] H. S. Bright and R. L. Enison, "Cryptography using modular software elements," in S. Winkler, Ed., AFIPS Conference Proceedings Vol. 45: National Computer Conference, New York, NY, June 7-10, 1976, pp. 113-123. Montvale, NJ: AFIPS Press, 1976. [BRAG] G. Brassard, Modern Cryptology: a tutorial. Spinger-Verlag, 1988. [BRAS] Brasspounder, "Language Data - German," MA89, The Cryptogram, American Cryptogram Association, 1989. [BREN] Brennecke, J., "Die Wennde im U-Boote- Krieg:Ursachen und Folgren 1939 - 1943," Herford, Koehler, 1984. [BRIK] E. Brickell, J. Moore, M. Purtill, Structure in the S-boxes of DES. In Proceedings of CRYPTO '86, A. M. Odlyzko ed., 3--8, 1987. [BRIG] Brigman,Clarence S., "Edgar Allan Poe's Contribution to Alexander's Weekly Messenger," Davis Press, 1943. [BRIT] Anonymous, "British Army Manual of Cryptography", HMF, 1914. [BROG] Broglie, Duc de, Le Secret du roi: Correspondance secrete de Louis XV avec ses agents diplomatiques 1752-1774, 3rd ed. Paris, Calmann Levy, 1879. [BROO] Brook, Maxey, "150 Puzzles in Cryptarithmetic," Dover, 1963. [BROP] L. Brown, J. P ieprzyk, J. Seberry, LOKI - a cryptographic primitive for authentication and secrecy applications. In Proceedings of AUSTCRYPT 90, 229--236, 1990. [BROW] Brownell, George, A. "The Origin and Development of the National Security Agency, Aegean Park Press, 1981. [BRO1] L. Brown, A proposed design for an extended DES, Computer Security in the Computer Age. Elsevier Science Publishers B.V. (North Holland), IFIP, W. J. Caelli ed., 9--22, 1989. [BRYA] Bryan, William G., "Practical Cryptanalysis - Periodic Ciphers -Miscellaneous", Vol 5, American Cryptogram Association, 1967. [Bupc] Burrows, J. (Director, National Computer and Telecommunications Laboratory, National Institute of Standards and Technology), 1994, private communication, March 11, 1994. [BUGS] Anonymous, "Bugs and Electronic Surveillance," Desert Publications, 1976. [BUON] Buonafalce, Augusto, "Giovan Battista Bellaso E Le Sue Cifre Polialfabetiche," Milano, 1990 [BURL] Burling, R., "Man's Many Voices: Language in Its Cultural Context," Holt, Rinehart & Winston, New York, 1970. [BWO] "Manual of Cryptography," British War Office, Aegean Park Press, Laguna Hills, Ca. 1989. reproduction 1914. [Caba] Caba, S., 1994, ``FBI Nets Stanfa in Mob Sweep,'' Philadelphia Inquirer, March 18, 1994, Sec. A. [CA87] T. R. Caron and R. D. Silverman, "Parallel implementation of the quadratic scheme," Journal of Supercomputing, Vol. 1, No. 3, 1987. [CAD1] NIP N. BUD,"Cadenus - A Lesson in Practical Cryptography," SO55, The Cryptogram, American Cryptogram Association, 1955. [CAD2] BERYL,"Cadenus Xenocrypt Note," SO91, The Cryptogram, American Cryptogram Association, 1991. [CAD3] PHOENIX,"Computer Column :Cadenus," SO89, The Cryptogram, American Cryptogram Association, 1989. [CAEL] H. Gustafson, E. Dawson, W. Caelli, Comparison of block ciphers. In Proceedings of AUSCRYPT '90, J. Seberry and J. Piepryzk eds., 208--220, 1990. [CAMP] K. W. Campbell, M. J. Wiener, Proof the DES is Not a Group. In Proceedings of CRYPTO '92, 1993. [CAMN] Campen, A. D., D. H. Dearth, & R. T. Goodden, eds. (1996). "Cyberwar: Security, Strategy, and Conflict in the Information Age". AFCEA International Press (Fairfax, VA). ISBN 0- 916159-26-4. vii + 296. [CAND] Candela, Rosario, "Isomorphism and its Application in Cryptanalytics, Cardanus Press, NYC 1946. [CARJ] John Carrol and Steve Martin, The Automated Cryptanalysis of Substitution Ciphers. Cryptologia 10(4), 193--209, 1986. [CARL] John Carrol and Lynda Robbins, Automated Cryptanalysis of Polyalphabetic Ciphers. Cryptologia 11(4), 193--205, 1987. [CAR1] Carlisle, Sheila. Pattern Words: Three to Eight Letters in Length, Aegean Park Press, Laguna Hills, CA 92654, 1986. [CAR2] Carlisle, Sheila. Pattern Words: Nine Letters in Length, Aegean Park Press, Laguna Hills, CA 92654, 1986. [CASE] Casey, William, 'The Secret War Against Hitler', Simon & Schuster, London 1989. [CAVA] Cavazos, E. & G. Morin (1996). "Cyberspace and the Law: Your Rights and Duties in the On-Line World". MIT Press (Cambridge, MA). ISBN 0-262- 53123-2. 220 pp. Index. [CCF] Foster, C. C., "Cryptanalysis for Microcomputers", Hayden Books, Rochelle Park, NJ, 1990. [CHAN] Chandler, J., D. Arrington, and L. Gill, "Issues Regarding the Use of Cryptographic Technologies in the Commercial Sector," George Washington University, National Law Center, 1993. [CHA1] Chandler, J., D. Arrington, and L. Gill, "Foreign Encryption Technology Controls," George Washington University, National Law Center, 1993. [CHAP] Chapman, D. B. & E. D. Zwicky (1995). "Building Internet Firewalls". O'Reilly & Associates (Sebastopol, CA). ISBN 1-56592-124-0. xxvi + 517. Index. [CHAU] Chaum, D., 'Achieving Electronic Privacy,' Scientific American vol. 267, no. 2 (August 1992): 96-101. [CHES] Cheswick, W. & S. Bellovin (1994). "Firewalls and Internet Security: Repelling the Wily Hacker". Addison Wesley (Reading, MA). ISBN 0- 201-63357-4. xiv + 306. Index. [CHE1] ABAKUSAN, " A tip for Checkerboard Solution," AS40, The Cryptogram, American Cryptogram Association, 1940. [CHE2] X.GOTSKY, " On the Checkerboard, AS44,The Cryptogram, American Cryptogram Association, 1944. [CHE3] QUARTERNION, "Straddling Checkerboard, " MA76, The Cryptogram, American Cryptogram Association, 1976. [CHE4] PICCOLA, "The Checkerboard Alphabet, " DJ34, The Cryptogram, American Cryptogram Association, 1934. [CHE5] SI SI, "The Hocheck Cipher Examined, " JA90, The Cryptogram, American Cryptogram Association, 1990. [CHE5] SI SI, "The Checkerway Cipher Examined, " MJ90, The Cryptogram, American Cryptogram Association, 1990. [CHE6] GEMINATOR, "The Homophonic Checkerboard, " MA90, The Cryptogram, American Cryptogram Association, 1990. [CHE6] GEMINATOR, "The Checkerway Cipher, " JF90, The Cryptogram, American Cryptogram Association, 1990. [CHEC] CHECHEM,"On the Need for a Frequency Counter," AM48, The Cryptogram, American Cryptogram Association, 1948. [CHIP] "Chipping Away At Privacy?" Washington Post. 30 May, 1993 H1,H4. USENET: alt.security.clipper. [CHOI] Interview with Grand Master Sin Il Choi.,9th DAN, June 25, 1995. [CHOM] Chomsky, Norm, "Syntactic Structures," The Hague: Mouton, 1957. [CROC] Crocker, S., 'Internet Privacy Enhanced Mail,' The Third CPSR Cryptography and Privacy Conference Source Book, 7 June 1993. [CHUN] Chungkuo Ti-erh Lishih Tangankuan, ed "K'ang-Jih chengmien chanch'ang," Chiangsu Kuchi Ch'upansheh, 1987., pp. 993-1026. [CCIT] CCITT, Draft Recommendation X.509: The Directory -Authentication Framework. Gloucester, November 1987. [CI] FM 34-60, Counterintelligence, Department of the Army, February 1990. [Cinq] Cinquegrana, A., 1989, ``The Walls (and Wires) Have Ears: The Background and First Ten Years of the Foreign Intelligence Surveillance Act of 1978,'' 137 University of Pennsylvania Law Review 793, 814-815 (1989). [CO87] H. Cohen and A. K. Lenstra, "Implementation of a new primality test," Mathematics of Computation, Vol. 48, No. 177, January 1987, pp. 103-121. [CO84] H. Cohen and H. W. Lenstra, Jr., "Primality testing and Jacobi sums," Mathematics of Computation, Vol. 42, No. 165, January 1984, pp. 297-330. [CO80] Control Data Corporation, CDC CYBER 200 Model 205 Computer System. Minneapolis, MN, 1980. [COP4] D. Coppersmith, "Fast evaluation of logarithms in fields of characteristic two," IEEE Transactions on Information Theory, Vol. IT-30, No. 4, July 1984, pp. 587-594. [COP5] D. Coppersmith, "Another birthday attack," in H. C. Williams, Ed., Lecture Notes in Computer Science Vol. 218: Advances in Cryptology - CRYPTO '85, proceedings of a Conference on the Theory and Applications of Cryptographic Techniques, Santa Barbara, CA, August 18-22, 1985, pp. 14-17. Berlin/New York: Springer- Verlag, 1986. [CO87] D. Coppersmith, "Cryptography," IBM Journal of Research and Development, Vol. 31, No. 2, March 1987, pp. 244-248. [CO86] D. Coppersmith, A. M. Odlyzko, and R. Schroeppel, "Discrete logarithms in GF(p)," Algorithmica, Vol. 1, No. 1, 1986, pp. 1-15. [COBB] Cobb, S. T. (1995). "NCSA Guide to PC and LAN Security". McGraw-Hill (New York). ISBN 0-07- 912168-3. xviii + 717. Index. [CONS] S-TUCK and BAROKO, "Consonant-Line and Vowel-Line Methods," MA92, The Cryptogram, American Cryptogram Association, 1992. [CONT] F.R.CARTER,"Chart Showing Normal Contact Percentages," AM53, The Cryptogram, American Cryptogram Association, 1953. [CON1] S-TUCK."Table of Initial and Second-Letter Contacts," DJ43, The Cryptogram, American Cryptogram Association, 1943. [COMM] Communications Security Establishment (1993). "The Canadian Trusted Computer Product Evaluation Criteria" Version 3.0e. Canadian System Security Centre, CSE. Available from Criteria Coordinator / S5B InfoSec Standards and Evaluations / Communications Security Establishment / P.O. Box 9703 Terminal / Ottawa K1G 3Z4. Tel. 613-991- 7331; fax 613-991-7323; e-mail criteria@manitou.cse.dnd.ca [COM1] Communications Security Establishment (1992). "Trusted Systems Environment Guideline". CID/09/17 (Ottawa). iii + 38. [COUR] Courville, Joseph B., "Manual For Cryptanalysis Of The Columnar Double Transposition Cipher, by Courville Associates., South Gate, CA, 1986. [CLAR] Clark, Ronald W., 'The Man who broke Purple', Weidenfeld and Nicolson, London 1977. [COLE] Collier, Jacot de Boinod et, "Marconi Master of Space," 1935. [COLF] Collins Gem Dictionary, "French," Collins Clear Type Press, 1979. [COLG] Collins Gem Dictionary, "German," Collins Clear Type Press, 1984. [COLI] Collins Gem Dictionary, "Italian," Collins Clear Type Press, 1954. [COLL] Collins Gem Dictionary, "Latin," Collins Clear Type Press, 1980. [COLP] Collins Gem Dictionary, "Portuguese," Collins Clear Type Press, 1981. [COLR] Collins Gem Dictionary, "Russian," Collins Clear Type Press, 1958. [COLS] Collins Gem Dictionary, "Spanish," Collins Clear Type Press, 1980. [COPP] Coppersmith, Don.,"IBM Journal of Research and Development 38, 1994. [CONJ] ZYZZ,"Conjugated Matrix Bifid: Modified Solving Techniques," SO92, The Cryptogram, American Cryptogram Association, 1992. [COVT] Anonymous, "Covert Intelligence Techniques Of the Soviet Union, Aegean Park Press, Laguna Hills, Ca. 1980. [CR80] Cray Research, Inc., Cray 1-S Series Hardware Reference Manual. Mendota Heights, MN, June 1980. [CR85] Cray Research, Inc., Cray X-MP Series of Computer Systems. Mendota Heights, MN, August 1985. [CREM] Cremer, Peter E.," U-Boat Commander: A Periscope View of The Battle of The Atlantic," New York, Berkley, 1986. [CROC] Crocker, S., 'Internet Privacy Enhanced Mail,' The Third CPSR Cryptography and Privacy Conference Source Book, 7 June 1993. [CRON] Cronin, D. J. (1986). "Microcomputer Data Security: Issues and Strategies for Business". Brady Books, Prentice-Hall (New York). ISBN 0- 89303-672-2. xvii + 281. Index. [CROT] Winter, Jack, "Solving Cryptarithms," American Cryptogram Association, 1984. [CRO1] CROTALUS, "The Sidewinder Cipher," SO92, The Cryptogram, American Cryptogram Association, 1992. [CRYP] "Selected Cryptograms From PennyPress," Penny Press, Inc., Norwalk, CO., 1985. [CRY1] NYPHO'S ROBOT, "Cryptometry Simplified," DJ40, FM41, AM41, The Cryptogram, published by the American Cryptogram Association, 1940, 1941, 1941. [CRY2] AB STRUSE, "Non-Ideomorphic Solutions," AM51, The Cryptogram, published by the American Cryptogram Association, 1951. [CRY3] MINIMAX, "Problems in Cryptanalysis - A Transposition that cannot be Anagrammed," MA60, The Cryptogram, published by the American Cryptogram Association, 1960. [CRY4] FAUSTUS, "Science of Cryptanalysis," AS32, The Cryptogram, published by the American Cryptogram Association, 1932. [CRY5] FAUSTUS, "Science of Cryptanalysis,The " JA91, The Cryptogram, published by the American Cryptogram Association, 1991. [CRY6] BEAU NED, "Semi-Systems in Crypt-Cracking," FM36, The Cryptogram, published by the American Cryptogram Association, 1936. [CRY7] Y.NOTT, "Systems Of Systems," ON35, The Cryptogram, published by the American Cryptogram Association, 1935. [CULL] Cullen, Charles G., "Matrices and Linear Transformations," 2nd Ed., Dover Advanced Mathematics Books, NY, 1972. [CUNE] CHECHACO, "The Decipherment of Cuneiform," JJ33, The Cryptogram, published by the American Cryptogram Association, 1933. [DAGA] D'agapeyeff, Alexander, "Codes and Ciphers," Oxford University Press, London, 1974. [DALT] Dalton, Leroy, "Topics for Math Clubs," National Council of Teachers and Mu Alpha Theta, 1973. [DAN] Daniel, Robert E., "Elementary Cryptanalysis: Cryptography For Fun," Cryptiquotes, Seattle, WA., 1979. [DATA] Datapro, Inc., Datapro Report on Encryption Devices, Delran, NJ, March 1993. [DAVA] David, F. Games, Gods and Gambling, New York: Haftner, 1962. [DA83] D. W. Davies, "Applying the RSA digital signature to electronic mail," Computer, Vol. 16, No. 2, February 1983, pp. 55- 62. [DA80] D. W. Davies and W. L. Price, "The application of digital signatures based on public key cryptosystems," NPL Report DNACS 39/80, National Physics Laboratory, Teddington, Middlesex, England, December 1980. [DA83] J. A. Davis and D. B. Holdridge, "Factorization using the quadratic sieve algorithm," in D. Chaum, Ed., Advances in Cryptology: proceedings of CRYPTO 83, a Workshop on the Theory and Application of Cryptographic Techniques, Santa Barbara, CA, August 22-24, 1983, pp. 103-113. New York: Plenum Press, 1984. [DA84] J. A. Davis, D. B. Holdridge, and G. J. Simmons, "Status report on factoring," in T. Beth, N. Cot, and I. Ingemarsson, Eds., Lecture Notes in Computer Science Vol. 209: Advances in Cryptology: Proceedings of EUROCRYPT 84, a Workshop on the Theory and Application of Cryptographic Techniques, Paris, France, April 9- 11, 1984, pp. 183-215. Berlin/New York: Springer- Verlag, 1985. [DAVE] Davies, D. W. & W. L. Price (1989). "Security for Computer Networks: An Introduction to Data Security in Teleprocessing and Electronic Funds Transfer, 2nd edition". Wiley (New York). ISBN 0-471-92137-8. xx + 377. Index. [DAVI] Da Vinci, "Solving Russian Cryptograms", The Cryptogram, September-October, Vol XLII, No 5. 1976. [DAVJ] M. Davio, J. Goethals, Elements of cryptology. in Secure Digital Communications, G. Longo ed., 1-- 57, 1983. [DAWS] Dawson, Donald A., "Cryptanalysis of the Single Rotor Cipher Machine," C-73, Aegean Park Press, 1996. [DE83] R. DeMillo and M. Merritt, "Protocols for data security," Computer, Vol. 16, No. 2, February 1983, pp. 39-51. [DE79] D. E. Denning, "Secure personal computing in an insecure network," Communications of the ACM, Vol. 22, No. 8, August 1979, pp. 476-482. [D83a] D. E. Denning, "Protecting public keys and signature keys," Computer, Vol. 16, No. 2, February 1983, pp. 27-35. [DE81] D. E. Denning and G. M. Sacco, "Timestamps in key distribution protocols," Communications of the ACM, Vol. 24, No. 8, August 1981, pp. 533-536. [DE83] D. E. R. Denning, Cryptography and Data Security. Reading, MA: Addison-Wesley, 1983. [DDKM] Delaney, D., Denning, D., Kaye, J. and McDonald, A., 1993, ``Wiretap Laws and Procedures: What Happens When the U.S. Government Taps A Line,'' Sept. 23, 1993, available electronically from cpsr.org. [Denn] Denning, D., 1994, ``Encryption and Law Enforcement,'' Feb. 21, 1994, available electronically from cpsr.org. [DEN1] Denning, D., 'To tap or not to tap?'Communications of the ACM, vol. 36, no. 3 (March 1993): 25-44. [DGBB] Denning, D., Godwin, M., Bayse, W., Rotenberg, M., Branscomb, L., Branscomb, A., Rivest, R., Grosso, A. and Marx, G., 1993, ``To Tap or Not to Tap,'' Communications of the ACM, Vol. 36 (3), March 1993 , pp. 24-44. [DEAC] Deacon, R., "The Chinese Secret Service," Taplinger, New York, 1974. [DEAU] Bacon, Sir Francis, "De Augmentis Scientiarum," tr. by Gilbert Watts, (1640) or tr. by Ellis, Spedding, and Heath (1857,1870). [DELA] Delastelle, F., Traite' Elementaire de Cryptographie, Mathematiques appliquees, gauthier-Villars, Paris, 1902. [DEL1] Delastelle, F., Cryptographie nouvelle assurant l'inviolabilite' absolue des correspondances chiffrees Maire of Saint-Malo, P. Dubreuil, Paris, 1893. [DEL2] Delastelle, F., Cryptographie universelle, Paris, 1893. [DENN] Denning, Dorothy Elizabeth Robling. "The Clipper Chip Will Block Crime."Newsday: USENET:alt.privacy.clipper. [DENN] Denning, Dorothy E. R.," Cryptography and Data Security," Reading: Addison Wesley, 1983. [DERN] Dern, D. P. (1994). "The Internet Guide for New Users". McGraw-Hill (New York). ISBN 0-07- 016511-4. xxvii + 570. Index. [DESM] Desmedt, Y., Y. Frankel, and M. Yung, "A Scientific Statement on the Clipper Chip Technology and Alternatives," paper distributed at the Clipper session of the 16th National Computer Security Conference, 21 September 1993. [DEVO] Deavours, Cipher A. and Louis Kruh, Machine Cryptography and Modern Cryptanalysis, Artech, New York, 1985. [DEV1] Deavours, C. A., "Breakthrough '32: The Polish Solution of the ENIGMA," Aegean Park Press, Laguna Hills, CA, 1988. [DEV2] Deavours, C. A. and Reeds, J.,"The ENIGMA," CRYPTOLOGIA, Vol I No 4, Oct. 1977. [DEV3] Deavours, C. A.,"Analysis of the Herbern Cryptograph using Isomorphs," CRYPTOLOGIA, Vol I No 2, April, 1977. [DEV4] Deavours, C. A., "Cryptographic Programs for the IBM PC," Aegean Park Press, Laguna Hills, CA, 1989. [DEVR] HOMO SAPIENS, "De Vries Cipher," SO60, The Cryptogram, The American Cryptogram Association, 1960. [DIG1] DENDAI, "Digrafid, A Footnote to Tip Placement," SO84, The Cryptogram, The American Cryptogram Association, 1984. [DIG2] B. NATURAL, "Digrafid, Cipher solution," MJ61, The Cryptogram, The American Cryptogram Association, 1961. [DIG3] KNUTE, "Digrafid Cipher," SO60, The Cryptogram, The American Cryptogram Association, 1960. [DIG4] THE RAT, "The Buzzsaw, an Enhanced Digrafid," JA83, The Cryptogram, The American Cryptogram Association, 1983. [DIG5] BERYL, "Digrafid, Cipher," SO93, The Cryptogram, The American Cryptogram Association, 1993. [DI82] W. Diffie, "Conventional versus public key cryptosystems," in G. J. Simmons, Ed., Secure Communications and Asymmetric Cryptosystems, pp. 41-72. Boulder, CO: Westview Press, 1982. [DI84] W. Diffie, "Network security problems and approaches," Proceedings of the National Electronics Conference, Vol. 38, 1984, pp. 292- 314. [DI86] W. Diffie, "Communication security and national security business, technology, and politics," Proceedings of the National Communications Forum, Vol. 40, 1986, pp. 734-751. [DI88] W. Diffie, "The first ten years of public-key cryptography," Proceedings of the IEEE, Vol. 76, No. 5, May 1988, pp. 560-577. [DI76] W. Diffie and M. E. Hellman, "Multiuser cryptographic techniques," in S. Winkler, Ed., AFIPS Conference Proceedings Vol. 45: National Computer Conference, New York, NY, June 7-10, 1976, pp. 109-112. Montvale, NJ: AFIPS Press, 1976. [D76b] W. Diffie and M. E. Hellman, "New directions in cryptography," IEEE Transactions on Information Theory, Vol. IT-22, No. 6, November 1976, pp. 644-654. [DF87] W. Diffie, B. O'Higgins, L. Strawczynski, and D. Steer, "An ISDN secure telephone unit," Proceedings of the National Communications Forum, Vol. 41, No. 1, 1987, pp. 473-477. [DI79] W. Diffie, M. Hellman, Privacy and Authentication: An introduction to cryptography. IEEE proceedings, 67(3), 397--427, 1979. [Di78] Diffie, W., 1978, ``Data Security for EFT and Automated Business,'' New Problems - New Solutions, San Jose, California, SBS Publishing, 1978. [Di82] Diffie, W., 1982, ``Cryptographic Technology: Fifteen Year Forecast,'' in Gustavus J. Simmons, Secure Communications and Asymmetric Cryptosystems, AAAS Selected Symposium No. 69, Westview Press, 1982. [D83d] Y. Desmedt, J. Vandewalle, and R. J. M. Govaerts, "A critical analysis of the security of knapsack public key algorithms," IEEE Transactions on Information Theory, Vol. IT-30, No. 4, July 1984, pp. 601-611. [DOA1] Department of the Army (1945) Crypto-Operating Instructions for Converter M-134-C (short title: SIGQZF-2) [DOA2] Department of the Army (1946) Crypto-Operating Instructions for Converter M-134-C (short title: SIGQZF-3) [DOA3] Department of the Army (1949) ASAM 1/1 Crypto- Operating Instructions for ASAM 1. Note the new designation of ASAM 1 for the ECM Mark II after the war. [DoCB] Department of Commerce Briefing re Escrowed Encryption Standard, 1994, Department of Commerce, February, 4, 1994, Washington, DC. [DoJB] Department of Justice Briefing re Escrowed Encryption Standard, 1994, Department of Commerce, February, 4, 1994,Washington, DC. [DONI] Donitz, Karl, Memoirs: Ten Years and Twenty Days, London: Weidenfeld and Nicolson, 1959. [DOUB] TIBEX, " A Short Study in doubles ( Word beginning or ending in double letters)," FM43, The Cryptogram, published by the American Cryptogram Association, 1943. [DO81] J. D. Dixon, "Asymptotically fast factorization of integers," Mathematics of Computation, Vol. 36, No. 153, January 1981, pp. 255-260. [DO81] D. Dolev and A. C. Yao, "On the security of public key protocols," in 22nd Annual Symposium on Foundations of Computer Science, Nashville, TN, October 28-30, 1981, pp. 350-357. Silver Spring, MD: IEEE Computer Society Press, 1981. [DOW] Dow, Don. L., "Crypto-Mania, Version 3.0", Box 1111, Nashua, NH. 03061-1111, (603) 880-6472, Cost $15 for registered version and available as shareware under CRYPTM.zip on CIS or zipnet. [DOW1] Diffie, W., van Oorschot, P. and Wiener, M., 1992, ``Authentication and Authenticated Key Exchanges,'' in , Designs, Codes, and Cryptography, Volume 2, Number 2, 1992, pp. 107-- 125. [DPSW] Digital Privacy and Security Working Group, white paper on key escrow encryption technology, 30 September 1993. [DU90] S. R. Dusse and B. S. Kaliski, Jr., "A cryptographic library for the Motorola DSP 56000," presented at EUROCRYPT '90, Aarhuis, DEnmark, May 21-24, 1990. [EDUC] OZ, "Educational Cryptography," MA89, The Cryptogram, The American Cryptogram Association, 1989. [EELL] Eells, Richard, and P. Nehemkis, "Corporate Intellegence and Espionage," Macmillian, London, 1984. [EFF ] Electronic Frontier Foundation. EFF Announces Its Official Policy onCryptography and Privacy. N.p.: EFF, 8 Dec. 1993. ftp.eff.org file. [EFF1] Electronic Frontier Foundation. General Information About the Electronic Frontier Foundation. N.p.: EFF, ftp.eff.org file. [EFF2] Electronic Frontier Foundation. EFF Wan ts You (to add your voice tothe crypto fight!) N.p.: EFF, 7 Feb. 1994, USENET:alt.privacy.clipper. [ERMA] Erman, M. David, et al. Computers, Ethics, and Society. OxfordUniversity Press, 1990. [EH78] W. F. Ehrsam, S. M. Matyas, C. H. Meyer, and W. L. Tuchman, "A cryptographic key management scheme for implementing the Data Encryption Standard," IBM Systems Journal, Vol. 17, No. 2, 1978, pp. 106-125. [EIIC] Ei'ichi Hirose, ",Finland ni okeru tsushin joho," in Showa gunji hiwa: Dodai kurabu koenshu, Vol 1, Dodai kurabu koenshu henshu iinkai, ed., (Toyko: Dodai keizai konwakai, 1987), pp 59-60. [ELCY] Gaines, Helen Fouche, Cryptanalysis, Dover, New York, 1956. [ A text that every serious player should have!] [ELLI] Carl M. Ellison, A Solution of the Hebern Messages. Cryptologia, vol. XII, #3, 144-158, Jul 1988. [EL85] T. ElGamal, "A public key cryptosystem and a signature scheme based on discrete logarithms," IEEE Transactions on Information Theory, Vol. IT- 31, No. 4, July 1985, pp. 469-472. [E85b] T. ElGamal, "On computing logarithms over finite fields," in H. C. Williams, Ed., Lecture Notes in Computer Science Vol. 218: Advances in Cryptology -CRYPTO '85, proceedings of a Conference on the Theory and Applications of Cryptographic Techniques, Santa Barbara, CA, August 18-22, 1985, pp. 396-402. Berlin/New York: Springer- Verlag, 1986. [ENIG] Tyner, Clarence E. Jr., and Randall K. Nichols, "ENIGMA95 - A Simulation of Enhanced Enigma Cipher Machine on A Standard Personal Computer," for publication, November, 1995. [EPST] Epstein, Sam and Beryl, "The First Book of Codes and Ciphers," Ambassador Books, Toronto, Canada, 1956. [EQUI] THE OAK, "An Equi-Frequency Cipher System," JA55, The Cryptogram, The American Cryptogram Association, 1955. [ERSK] Erskine, Ralph, "Naval Enigma: The Breaking of Heimisch and Triton," Intelligence and National Security 3, Jan. 1988. [EVEN] S. Even, O. Goldreich, DES-like functions can generate the alternating group. IEEE Trans. on Inform. Theory, vol. 29, #6, 863--865, 19 83. [EVES] Eve's H, Introduction to the History of Mathematics, 4th ed., New York: holt, rinehart and winston, 1964. [EYRA] Eyraud, Charles, "Precis de Cryptographie Moderne'" Paris, 1953. [FARR] Farrow, R. (1991). "UNIX Systems Security: How to Protect Your Data and Prevent Intruders". Addison-Wesley (Reading, MA). ISBN 0-201-57030- 0. vii + 278. Index. [F186] FIPS 186, "Digital Signature Standard (DSS)", specifies a Digital Signature Algorithm appropriate for applications requiring a digital rather than a written signature. [F185] FIPS 185, "Escrowed Encryption Standard (EES)", specifies a voluntary technology available for protecting telephone communications (e.g., voice, fax, modem). [F180] FIPS 180, "Secure Hash Standard (SHS)", specifies a Secure Hash Algorithm (SHA) for use with the Digital Signature Standard. Additionally, for applications not requiring a digital signature, the SHA is to be used whenever a secure hash algorithm is required for federal applications. [F462] FIPS 46-2, "Data Encryption Standard (DES)", provides the technical specifications for the DES. [F113] FIPS 113, "Computer Data Authentication", specifies a Data Authentication Algorithm, based upon the DES, which may be used to detect unauthorized modifications to data, both intentional and accidental. The Message Authentication Code as specified in ANSI X9.9 is computed in the same manner as the Data Authentication Code as specified in this standard. [F140] FIPS 140-1, "Security Requirements for Cryptographic Modules", establishes the physical and logical security requirements for the design and manufacture of modules implementing NIST- approved cryptographic algorithms. [F171] FIPS 171, "Key Management Using ANSI X9.17", adopts ANSI X9.17 and specifies a particular selection of options for the automated distribution of keying material by the federal government using the protocols of ANSI X9.17. [FE87] U. Feige, A. Fiat, and A. Shamir, "Zero knowledge proofs of identity," in Proceedings of the Nineteenth Annual ACM Symposium on Theory of Computing, New York, NY, May 25-27, 1987, pp. 210- 217. New York: ACM, 1987. [FEI1] H. Feistel, Cryptography and Computer Privacy. Scientific American, 228(5), 15--23, 1973. [FEI2] H. Feistel, H, W. Notz, J. Lynn Smith. Some cryptographic techniques for machine-to-machine data communications, IEEE proceedings, 63(11), 1545--1554, 1975. [FISA] Foreign Intelligence Surveillance Act, 50 U.S.C. Sec. 1801 , et seq. [FI86] A. Fiat and A. Shamir, "How to prove yourself: practical solutions to identification and signature problems," in A. M. Odlyzko, Ed., Lecture Notes in Computer Science Vol. 263: Advances in Cryptology -CRYPTO '86, proceedings of a Conference on the Theory and Applications of Cryptographic Techniques, Santa Barbara, CA, August 11-15, 1986, pp. 186-194. Berlin/New York: Springer- Verlag, 1987. [FIBO] LOGONE BASETEN, "Use of Fibonacci Numbers in Cryptography," JF69, The Cryptogram, published by the American Cryptogram Association, 1969. [FIDD] FIDDLE, (Frederick D. Lynch, Col.) "An Approach to Cryptarithms," ACA Publications, 1964. [FID1] FIDDLE, " The International Chess Cable Code," MJ55, The Cryptogram, American Cryptogram Association, 1955. [FING] HELCRYPT, "Cryptography in Fingerprinting," FM51, The Cryptogram, published by the American Cryptogram Association, 1951. [FIRE] FIRE-O, "A Tool for Mathematicians: Multiplicative Structures," The Cryptogram, Vol. XXXVI, No 5, 1977. [FISH] Fisher, R. P. (1984). "Information Systems Security". Prentice-Hall (Englewood Cliffs, NJ). ISBN 0-13-464727-0. viii + 240. Index. [FL78] R. Flynn and A. S. Campasano, "Data dependent keys for a selective encryption terminal," in S. P. Ghosh and L. Y. Liu, Eds., AFIPS Conference Proceedings Vol. 47: National Computer Conference, Anaheim, CA, June 5-8, 1978, pp. 1127-1129. Montvale, NJ: AFIPS Press, 1978. [FL] Anonymous, The Friedman Legacy: A Tribute to William and Elizabeth Friedman, National Security Agency, Central Security Service, Center for Cryptological History,1995. [FLI1] Flicke, W. F., "War Secrets in the Ether - Volume I," Aegean Park Press, Laguna Hills, CA, 1977. [FLIC] Flicke, W. F., "War Secrets in the Ether - Volume II," Aegean Park Press, Laguna Hills, CA, 1977. [FLIC] Flicke, W. F., "War Secrets in the Ether," Aegean Park Press, Laguna Hills, CA, 1994. [FM34] Field Manual 34-40-2 "Basic Cryptanalysis", Department of Army, GPO 1990-729/952, 13 September, 1990. (Authored by ACA member Walt Howe) [FOOT] George FOOT,"An Introduction to Modern Cryptography ," SO96, The Cryptogram, American Cryptogram Association, 1996. [FORE] DELAC, "Solving a Foreign Periodic by Lining Up the Alphabets," JJ46, The Cryptogram, published by the American Cryptogram Association, 1946. [FOR1] VULPUS, "Four-Square Cipher," JA63, The Cryptogram, The American Cryptogram Association, 1963. [FOR2] FIDDLE, "Further Comments on Solution of Four- Square Ciphers by Probable Word Method," FM50, The Cryptogram, The American Cryptogram Association, 1950. [FOR3] GALUPOLY, "Numerical Four-Square Cipher," MA62, MJ62, The Cryptogram, The American Cryptogram Association, 1962. [FOR4] SAI CHESS, "Sharpshooting the Four-Square Cipher," AM49,JJ49, The Cryptogram, The American Cryptogram Association, 1949. [FOR5] B. NATURAL, "Solution of Type II-X Four-Square Cipher," MJ62, The Cryptogram, The American Cryptogram Association, 1962. [FOR6] FIDDLE, "Solutionof Four-Square Ciphers by Probable Word Method," DJ49, The Cryptogram, The American Cryptogram Association, 1949. [FORS] Forester, T. & P. Morrison (1990). "Computer Ethics: Cautionary Tales and Ethical Dilemmas in Computing". MIT Press (Cambridge, MA). ISBN 0- 262-06131-7. vi + 193. Index. [FORT] Forester, T., ed. (1991). "Computers in the Human Context: Information Technology, Productivity and People". MIT Press (Cambridge, MA). ISBN 0-262- 56050-X. xii + 548. Index. [FOWL] Fowler, Mark and Radhi Parekh, " Codes and Ciphers, - Advanced Level," EDC Publishing, Tulsa OK, 1994. (clever and work) [FRAA] Friedman, William F. , "American Army Field Codes in The American Expeditionary Forces During the First World War, USA 1939. [FRAB] Friedman, W. F., Field Codes used by the German Army During World War. 1919. [FRAN] Franks, Peter, "Calculator Ciphers," Information Associates, Champaign, Il. 1980. [FRA1] SI SI, "Analysis and Optimization of the Fractionated Morse Cipher," ND81, The Cryptogram, The American Cryptogram Association, 1981. [FRA2] B. NATURAL, "Elementary Study of the Fractionated Morse Cipher," AS51, The Cryptogram, The American Cryptogram Association, 1951. [FRA3] X.GOTKY, "Fractionated Morse Cipher," AM50, The Cryptogram, The American Cryptogram Association, 1950. [FRA4] CROTALUS, "Fractionated Morse Frequencies Reissued," MA93, The Cryptogram, The American Cryptogram Association, 1993. [FRA5] RIG R. MORTIS, "Fractionated Morse Keyword Recovery," MA60, The Cryptogram, The American Cryptogram Association, 1960. [FRA6] LAMONT CRANSTON, "Fractionated Morse Made Easy," JA92, The Cryptogram, The American Cryptogram Association, 1992. [FRA7] MOOJUB, "General Break For Fractionated Morse," AS51, The Cryptogram, The American Cryptogram Association, 1951. [FRA8] FIDDLE, "Periodic Fractionated Morse," AS54, The Cryptogram, The American Cryptogram Association, 1954. [FRAK] Franklin, Charles E. H., "Business Guide to Privacy and Data Protection Legislation," ICC Publishing, Kluwer Law International, The Hague, 1996. [FRE] Friedman, William F. , "Elements of Cryptanalysis," Aegean Park Press, Laguna Hills, CA, 1976. [FREA] Friedman, William F. , "Advanced Military Cryptography," Aegean Park Press, Laguna Hills, CA, 1976. [FREB] Friedman, William F. , "Elementary Military Cryptography," Aegean Park Press, Laguna Hills, CA, 1976. [FREC] Friedman, William F., "Cryptology," The Encyclopedia Britannica, all editions since 1929. A classic article by the greatest cryptanalyst. [FRSG] Friedman, William F., "Solving German Codes in World War I, " Aegean Park Press, Laguna Hills, CA, 1977. [FR1] Friedman, William F. and Callimahos, Lambros D., Military Cryptanalytics Part I - Volume 1, Aegean Park Press, Laguna Hills, CA, 1985. [FR2] Friedman, William F. and Callimahos, Lambros D., Military Cryptanalytics Part I - Volume 2, Aegean Park Press, Laguna Hills, CA, 1985. [FR3] Friedman, William F. and Callimahos, Lambros D., Military Cryptanalytics Part III, Aegean Park Press, Laguna Hills, CA, 1995. [FR4] Friedman, William F. and Callimahos, Lambros D., Military Cryptanalytics Part IV, Aegean Park Press, Laguna Hills, CA, 1995. [FR5] Friedman, William F. Military Cryptanalysis - Part I, Aegean Park Press, Laguna Hills, CA, 1980. [FR6] Friedman, William F. Military Cryptanalysis - Part II, Aegean Park Press, Laguna Hills, CA, 1980. [FR7] Friedman, William F. and Callimahos, Lambros D., Military Cryptanalytics Part II - Volume 1, Aegean Park Press, Laguna Hills, CA, 1985. [FR8] Friedman, William F. and Callimahos, Lambros D., Military Cryptanalytics Part II - Volume 2, Aegean Park Press, Laguna Hills, CA, 1985. [FR22] Friedman, William F., The Index of Coincidence and Its Applications In Cryptography, Publication 22, The Riverbank Publications, Aegean Park Press, Laguna Hills, CA, 1979. [FRS6] Friedman, W. F., "Six Lectures On Cryptology," National Archives, SRH-004. [FR8] Friedman, W. F., "Cryptography and Cryptanalysis Articles," Aegean Park Press, Laguna Hills, CA, 1976. [FR9] Friedman, W. F., "History of the Use of Codes," Aegean Park Press, Laguna Hills, CA, 1977. [FRZM] Friedman, William F.,and Charles J. Mendelsohn, "The Zimmerman Telegram of January 16, 1917 and its Cryptographic Background," Aegean Park Press, Laguna Hills, CA, 1976. [Freh] Freeh, L., 1994, Written Statement before the Subcommittee on Technology and the Law of the Committee of the Judiciary, United States Senate and the Subcommittee on Civil and Constitutional Rights of the Committee on the Judiciary, House of Representatives, March 18, 1994, Washington, DC. [FROM] Fromkin, V and Rodman, R., "Introduction to Language," 4th ed.,Holt Reinhart & Winston, New York, 1988. [FRS] Friedman, William F. and Elizabeth S., "The Shakespearean Ciphers Examined," Cambridge University Press, London, 1957. [FUMI] Fumio Nakamura, Rikugun ni okeru COMINT no hoga to hatten," The Journal of National Defense, 16-1 (June 1988) pp85 - 87. [GA79] M. R. Garey and D. S. Johnson, Computers and Intractability. New York: W. H. Freeman, 1979. [GALL] Gallery, S. M., ed. (1987). "Computer Security: Readings from `Security Management' Magazine". Butterworths (Boston). ISBN 0-409-90084-2. xvi + 301. Index. [GAJ] Gaj, Krzysztof, "Szyfr Enigmy: Metody zlamania," Warsaw Wydawnictwa Komunikacji i Lacznosci, 1989. [GAR1] Gardner, Martin, "536 Puzzles and Curious Problems," Scribners, 1967. [GAR2] Gardner, Martin, "Mathematics, Magic, and Mystery ," Dover, 1956. [GAR3] Gardner, Martin, "New Mathematical Diversions from Scientific American," Simon and Schuster, 1966. [GAR4] Gardner, Martin, "Sixth Book of Mathematical Games from Scientific American," Simon and Schuster, 1971. [GARL] Garlinski, Jozef, 'The Swiss Corridor', Dent, London 1981. [GAR1] Garlinski, Jozef, 'Hitler's Last Weapons', Methuen, London 1978. [GAR2] Garlinski, Jozef, 'The Enigma War', New York, Scribner, 1979. [GARF] Garfinkel, S. & G. Spafford (1991). "Practical UNIX Security". O'Reilly & Assoc (Sebastopol, CA). ISBN 0-937175-72-2. xxvii + 481. Index. Available from the NCSA. [GARO] G. Garon, R. Outerbridge, DES watch: an examination of the sufficiency of the Data Encryption Standard for financial institutions in the 1990's. Cryptologia, vol. XV, #3, 177--193, 1991. [GASS] Gasser, M. (1988). "Building a Secure Computer System". Van Nostrand Reinhold (New York). ISBN 0-442-23022-2. [GE] "Security," General Electric, Reference manual Rev. B., 3503.01, Mark III Service, 1977. [GERH] Gerhard, William D., "Attack on the U.S., Liberty," SRH-256, Aegean Park Press, 1981. [GERM] "German Dictionary," Hippocrene Books, Inc., New York, 1983. [GI77] J. Gill, "Computational complexity of probabilistic Turing machines," SIAM Journal on Computing, Vol. 6, No. 4, December 1977, pp. 675-695. [GILE] Giles, Herbert A., "Chinese Self-Taught," Padell Book Co., New York, 1936? [GIVI] Givierge, General Marcel, " Course In Cryptography," Aegean Park Press, Laguna Hills, CA, 1978. Also, M. Givierge, "Cours de Cryptographie," Berger-Levrault, Paris, 1925. [GLEN] Gleason, Norma, "Fun With Codes and Ciphers Workbook," Dover, New York, 1988. [GLE1] Gleason, Norma, "Cryptograms and Spygrams," Dover, New York, 1981. [GLEA] Gleason, A. M., "Elementary Course in Probability for the Cryptanalyst," Aegean Park Press, Laguna Hills, CA, 1985. [GLOV] Glover, D. Beaird, "Secret Ciphers of the 1876 Presidential Election," Aegean Park Press, Laguna Hills, CA, 1991. [GODD] Goddard, Eldridge and Thelma, "Cryptodyct," Marion, Iowa, 1976 [GOOD] I. J. Good, Good Thinking: the foundations of probability and its applications. University of Minnesota Press, 1983. [GOOE] Goodell, J. (1996). "The Cyberthief and the Samurai: The True Story of Kevin Mitnick--and the Man Who Hunted Him Down". Dell (New York). ISBN 0-440-22205-2. xix + 328. [GO84] S. Goldwasser and S. Micali, "Probabilistic encryption," Journal of Computer and System Sciences, Vol. 28, No. 2, April 1984, pp. 270- 299. [GO89] S. Goldwasser, S. Micali, and C. Rackoff, "The knowledge complexity of interactive proof systems," SIAM Journal on Computing, Vol. 18, No. 1, February 1989, pp. 186-208. [GO88] S. Goldwasser, S. Micali, and R. L. Rivest, "A digital signature scheme secure against adaptive chosen-message attacks," SIAM Journal on Computing, Vol. 17, No. 2, April 1988, pp. 281- 308. [G84b] J. Gordon, "Strong RSA keys," Electronics Letters, Vol. 20, No. 12, June 7, 1984, pp. 514- 516. [GO84] J. A. Gordon, "Strong primes are easy to find," in T. Beth, N. Cot, and I. Ingemarsson, Eds., Lecture Notes in Computer Science Vol. 209: Advances in Cryptology: Proceedings of EUROCRYPT 84, a Workshop on the Theory and Application of Cryptographic Techniques, Paris, France, April 9- 11, 1984, pp. 216-223. Berlin/New York: Springer-Verlag, 1985. [GR88] J. Grollman and A. L. Selman, "Complexity measures for public-key cryptosystems," SIAM Journal on Computing, Vol. 17, No. 2, April 1988, pp. 309-335. [GORD] Gordon, Cyrus H., " Forgotten Scripts: Their Ongoing Discovery and Decipherment," Basic Books, New York, 1982. [GORE] Gore, Al. Interview. By Lawrence J. Magid. Microtimes 8 Feb. 1994:26-31. [GOR1] Gore, Al. Remarks (as prepared). Royce Hall. University of CaliforniaLos Angeles. 11 Jan. 1994. ftp.eff.org file. [GOR2] Gore, Al. Statement of the Vice President. White House: Office of the Vice President. 4, Feb. 1994. ftp.eff.org file . [Gold] Goldman V. United States, 316 U.S. 129, 1942. [GRA1] Grandpre: "Grandpre, A. de--Cryptologist. Part 1 'Cryptographie Pratique - The Origin of the Grandpre', ISHCABIBEL, The Cryptogram, SO60, American Cryptogram Association, 1960. [GRA2] Grandpre: "Grandpre Ciphers", ROGUE, The Cryptogram, SO63, American Cryptogram Association, 1963. [GRA3] Grandpre: "Grandpre", Novice Notes, LEDGE, The Cryptogram, MJ75, American Cryptogram Association,1975 [GRAH] Graham, L. A., "Ingenious Mathematical Problems and Methods," Dover, 1959. [GRAN] Grant, E. A., "Kids Book of Secret Codes, Signals and Ciphers, Running Press, 1989. [GRAP] DR. CRYPTOGRAM,"The Graphic Position Chart (On Aristocrats)," JF59, The Cryptogram, American Cryptogram Association, 1959. [GREU] Greulich, Helmut, "Spion in der Streichholzschachtel: Raffinierte Methoden der Abhortechnik, Gutersloh: Bertelsmann, 1969. [GRI1] ASAP,"An Aid For Grille Ciphers," SO93, The Cryptogram, American Cryptogram Association, 1993. [GRI2] DUN SCOTUS,"Binary Number Grille," JA60, The Cryptogram, American Cryptogram Association, 1960. [GRI3] S-TUCK,"Grille Solved By the Tableaux Method," DJ42, The Cryptogram, American Cryptogram Association, 1942. [GRI4] The SQUIRE,"More About Grilles," ON40,DJ40, The Cryptogram, American Cryptogram Association, 1940, 1940. [GRI5] OMAR,"Rotating Grille Cipher," FM41, The Cryptogram, American Cryptogram Association, 1941. [GRI6] S-TUCK,"Solving The Grille. A New Tableaux Method," FM44, The Cryptogram, American Cryptogram Association, 1944. [GRI7] LABRONICUS,"Solving The Turning Grille," JF88, The Cryptogram, American Cryptogram Association, 1988. [GRI8] BERYL,"The Turning Grille," ND92, The Cryptogram, American Cryptogram Association, 1992. [GRI9] SHERLAC and S-TUCKP,"Triangular Grilles," ON45, The Cryptogram, American Cryptogram Association, 1945. [GRIA] SHERLAC,"Turning Grille," ON49, The Cryptogram, American Cryptogram Association, 1949. [GRIB] DUN SCOTUS,"Turning (by the numbers)," SO61, The Cryptogram, American Cryptogram Association, 1961. [GRIC] LEDGE,"Turning Grille (Novice Notes)," JA77, The Cryptogram, American Cryptogram Association, 1977. [GRO1] DENDAI, DICK," Analysis of Gromark Special,"ND74, The Cryptogram, American Cryptogram Association, 1974. [GRO2] BERYL," BERYL'S Pearls: Gromark Primers by hand calculator," ND91, The Cryptogram, American Cryptogram Association, 1991. [GRO3] MARSHEN," Checking the Numerical Key,"JF70, The Cryptogram, American Cryptogram Association, 1970. [GRO4] PHOENIX," Computer Column: Gronsfeld -> Gromark," "MJ90, The Cryptogram, American Cryptogram Association, 1990. [GRO5] PHOENIX," Computer Column: Perodic Gromark," MJ90 The Cryptogram, American Cryptogram Association, 1990. [GRO6] ROGUE," Cycles for Gromark Running Key," JF75, The Cryptogram, American Cryptogram Association, 1975. [GRO7] DUMBO," Gromark Cipher," MA69, JA69, The Cryptogram, American Cryptogram Association, 1969. [GRO8] DAN SURR," Gromark Club Solution," MA75, The Cryptogram, American Cryptogram Association, 1975. [GRO9] B.NATURAL," Keyword Recovery in Periodic Gromark," SO73, The Cryptogram, American Cryptogram Association, 1973. [GROA] D.STRASSE," Method For Determining Term of Key," MA75, The Cryptogram, American Cryptogram Association, 1975. [GROB] CRUX," More On Gromark Keys," ND87, The Cryptogram, American Cryptogram Association, 1987. [GROC] DUMBO," Periodic Gromark ," MA73, The Cryptogram, American Cryptogram Association, 1973. [GROD] ROGUE," Periodic Gromark ," SO73, The Cryptogram, American Cryptogram Association, 1973. [GROE] ROGUE," Theoretical Frequencies in the Gromark," MA74, The Cryptogram, American Cryptogram Association, 1974. [GRON] R.L.H., "Condensed Analysis of a Gronsfeld," AM38, ON38,The Cryptogram, American Cryptogram Association, 1938,1938. [GRON] Groner, J., 'When it Comes to Software, U.S. Sees Military Hardware; Concern over Spread of Encryption Codes Hurts Exports,' The Connecticut Law Tribune, 21 December 1992, p. 12. [GROU] Groueff, Stephane, "Manhattan Project: The Untold Story of the Making of the Atom Bomb," Little, Brown and Company,1967. [GRN1] CHARMER, "Gronsfeld," AS44, The Cryptogram, American Cryptogram Association, 1944. [GRN2] PICCOLA, "Gronsfeld Cipher," ON35, The Cryptogram, American Cryptogram Association, 1935. [GRN3] S-TUCK, "Gronsfeld Cipher," AS44, The Cryptogram, American Cryptogram Association, 1944. [GSA] General Services Administration, 1992, Offices of Congressional Affairs, Memo of May 5, 1992, in , The Third CPSR Cryptography and Privacy Conference Source Book, June 7, 1993, Washington, DC. [GUNG] GUNG HO, (Courville, J. B.), Manual for Cryptanalysis of the Columnar Double Transp- osition Cipher, South Gate, CA, 1986. [GUST] Gustave, B., "Enigma:ou, la plus grande 'enigme de la guerre 1939-1945." Paris:Plon, 1973. [GYLD] Gylden, Yves, "The Contribution of the Cryptographic Bureaus in the World War," Aegean Park Press, 1978. [GYL1] Gylden, Yves, "Chiffrebyraernas insatser i varldskriget till lands," Stockholm, 1931. [HA88] J. Hastad, "Solving simultaneous modular equations of low degree," SIAM Journal on Computing, Vol. 17, No. 2, April 1988, pp. 336- 341. [HA87] S. Hawkinson, "The FPS T Series: a parallel vector supercomputer," in W. J. Karplus, Ed., Multiprocessors and Array Processors, pp. 147- 155. San Diego: Simulation Councils Inc., 1987. [HA86] J. P. Hayes, T. Mudge, Q. F. Stout, S. Colley, and J. Palmer, "A microprocessor-based hypercube supercomputer," IEEE Micro, Vol. 6, No. 5, October 1986, pp. 6-17. [HA88] M. E. Haykin and R. B. J. Warnar, "Smart card technology: new methods for computer access control," NIST Special Publication 500-157, September 1988. [HA] Hahn, Karl, " Frequency of Letters", English Letter Usage Statistics using as a sample, "A Tale of Two Cities" by Charles Dickens, Usenet SCI.Crypt, 4 Aug 1994. [HAFT] Haftner, Katie and John Markoff, "Cyberpunk," Touchstine, 1991. [HAFN] Hafner, K. & J. Markoff (1991). "Cyberpunk: Outlaws and Hackers on the Computer Frontier". Touchstone Books, Simon & Schuster (New York). ISBN 0-671-77879-X. 368. Index. [HAGA] Hagamen,W. D. et. al., "Encoding Verbal Information as Unique Numbers," IBM Systems Journal, Vol 11, No. 4, 1972. [HAGH] Hahn, H. & R. Stout (1995). "The Internet Yellow Pages, Second Edition". Osborne McGraw-Hill (Bereley, CA). ISBN 0-07-882098-7. xxxvi + 812. Index. [HARR] Harris, Zellig, "A Grammar of English on Mathematical Principles," John Wiley, 1992. [HASS] Hassig, L. & J. W. Shanks (1986), eds. "Computer Security". One of the series, "Understanding Computers". TIME-LIFE (541 North Fairbanks Court / Chicago, IL 60611). ISBN 0-8094-5670-2. 128 pp. Index. [HAUG] Haugh, J. J., R. E. Burney, G. L. Dean & L. H. Tisch (1992). "Toll Fraud and Telabuse: A Multibillion Dollar National Problem". Telecommunications Advisors Inc (Portland, OR). ISBN 0-9632634-2-0. 399 + 431 pp. [HAWA] Hitchcock, H. R., "Hawaiian," Charles E. Tuttle, Co., Toyko, 1968. [HAWC] Hawcock, David and MacAllister, Patrick, "Puzzle Power! Multidimensional Codes, Illusions, Numbers, and Brainteasers," Little, Brown and Co., New York, 1994. [HE81] P. S. Henry, "Fast decryption algorithm for the knapsack cryptographic system," Bell System Technical Journal, Vol. 60, No. 5, May-June 1981, pp. 767-773. [HE64] I. N. Herstein, Topics in Algebra. Waltham: Blaisdell, 1964. [HEBR] COMET, "First Hebrew Book (of Cryptology)," JF72, The Cryptogram, published by the American Cryptogram Association, 1972. [HELD] Gilbert, "Top Secret Data Encryption Techniques," Prentice Hall, 1993. (great title..limited use) [HELL] M. Hellman, The mathematics of public key cryptography. Scientific American, 130--139, 1979. [HEMP] Hempfner, Philip and Tania, "Pattern Word List For Divided and Undivided Cryptograms," unpublished manuscript, 1984. [HEPP] Hepp, Leo, "Die Chiffriermaschine 'ENIGMA'", F- Flagge, 1978. [HEW] HEW Advisory Committee on Automated Personnel Data Systems, Records, Computers and the Rights of Citizens, 1973, Washington, DC. [HI85] D. Hillis, The Connection Machine. Cambridge, MA: MIT Press, 1985. [HIDE] Hideo Kubota, " Zai-shi dai-go kokugun tokushu joho senshi." unpublished manuscript, NIDS. [HIER] ISHCABIBEL, "Hieroglyphics: Cryptology Started Here, MA71, The Cryptogram, American Cryptogram Association, 1971. [HILL] Hill, Lester, S., "Cryptography in an Algebraic Alphabet", The American Mathematical Monthly, June-July 1929. [HIL1] Hill, L. S. 1929. Cryptography in an Algebraic Alphabet. American Mathematical Monthly. 36:306- 312. [HIL2] Hill, L. S. 1931. Concerning the Linear Transformation Apparatus in Cryptography. American Mathematical Monthly. 38:135-154. [HINS] Hinsley, F. H., "History of British Intelligence in the Second World War", Cambridge University Press, Cambridge, 1979-1988. [HIN2] Hinsley, F. H. and Alan Strip in "Codebreakers - Story of Bletchley Park", Oxford University Press, 1994. [HIN3] Hinsley, F. H., et. al., "British Intelligence in The Second World War: Its Influence on Strategy and Operations," London, HMSO vol I, 1979, vol II 1981, vol III, 1984 and 1988. [HISA] Hisashi Takahashi, "Military Friction, Diplomatic Suasion in China, 1937 - 1938," The Journal of International Studies, Sophia Univ, Vol 19, July, 1987. [HIS1] Barker, Wayne G., "History of Codes and Ciphers in the U.S. Prior to World War I," Aegean Park Press, Laguna Hills, CA, 1978. [HITT] Hitt, Parker, Col. " Manual for the Solution of Military Ciphers," Aegean Park Press, Laguna Hills, CA, 1976. [HO81] R. W. Hockney and C. R. Jesshope, Parallel Computers: Architecture, Programming and Algorithms. Bristol: Adam Hilger, 1981. [HO78] E. Horowitz and S. Sahni, Fundamentals of Computer Algorithms. Rockville: Computer Science Press, 1978. [HODG] Hodges, Andrew, "Alan Turing: The Enigma," New York, Simon and Schuster, 1983. [HOFF] Hoffman, Lance J., editor, "Building In Big Brother: The Cryptographic Policy Debate," Springer-Verlag, N.Y.C., 1995. ( A useful and well balanced book of cryptographic resource materials. ) [HOF1] Hoffman, Lance. J., et. al.," Cryptography Policy," Communications of the ACM 37, 1994, pp. 109-17. [HOF3] Hoffman, L. J. (1990), ed. "Rogue Programs: Viruses, Worms, and Trojan Horses". Van Nostrand Reinhold (NY). ISBN 0-442-00454-0. xii+384. Index. [Hof4] Hoffman, L. J., 'Clipping Clipper,' Communications of the ACM vol. 36, no. 9 (September 1993): 15-17. [HOLM Holmes, W. J., "Double-Edged Secrets: U.S. Naval Intelligence Operations in the Pacific During WWII", Annapolis, MD: Naval Institute Press, 1979. [HOM1] Homophonic: A Multiple Substitution Number Cipher", S-TUCK, The Cryptogram, DJ45, American Cryptogram Association, 1945. [HOM2] Homophonic: Bilinear Substitution Cipher, Straddling," ISHCABIBEL, The Cryptogram, AS48, American Cryptogram Association, 1948. [HOM3] Homophonic: Computer Column:"Homophonic Solving," PHOENIX, The Cryptogram, MA84, American Cryptogram Association, 1984. [HOM4] Homophonic: Hocheck Cipher,", SI SI, The Cryptogram, JA90, American Cryptogram Association, 1990. [HOM5] Homophonic: "Homophonic Checkerboard," GEMINATOR, The Cryptogram, MA90, American Cryptogram Association, 1990. [HOM6] Homophonic: "Homophonic Number Cipher," (Novice Notes) LEDGE, The Cryptogram, SO71, American Cryptogram Association, 1971. [HUGH] Hughes, L. J., Jr (1995). "Actually Useful Internet Security Techniques". New Riders Publishing (Indianapolis, IN). ISBN 1-56205-508- 9. xv + 378. Index. [HUNT] D. G. N. Hunter and A. R. McKenzie, Experiments with Relaxation Algorithms for Breaking Simple Substitution Ciphers. Computer Journal 26(1), 1983. [HUTT] Hutt, A. E., S. Bosworth & D. B. Hoyt, editors (1995). "Computer Security Handbook, Third Edition". John Wiley & Son (New York). ISBN 0- 471-01907-0. [HW84] K. Hwang and F. A. Briggs, Computer Architecture and Parallel Processing. New York: McGraw-Hill, 1984. [HYDE] H. Montgomery Hyde, "Room 3603, The Story of British Intelligence Center in New York During World War II", New York, Farrar, Straus, 1963. [IAB-90] IAB Privacy and Security Research Group, "Privacy enhancement for Internet electronic mail: Part I: Message encipherment and authentication procedures," RFC 1113B, December 18, 1990. [IBM1] IBM Research Reports, Vol 7., No 4, IBM Research, Yorktown Heights, N.Y., 1971. [ICOV] Icove, D., K. Seger, W. VonStorch (1995). "Computer Crime: A Crime Fighter's Handbook." Eugene Spafford, editor. O'Reilly & Associates (Sebastopol, CA). ISBN 1-56592-086-4. [IC1 ] GIZMO, "Bifid Period Determination Using a Digraphic Index of Coincidence, JF79, The Cryptogram, American Cryptogram Association, 1979. [IC2 ] PHOENIX, "Computer Column: Applications of the Index of Coincidence, JA90, The Cryptogram, American Cryptogram Association, 1990. [IC3 ] PHOENIX, "Computer Column: Digraphic Index of Coincidence, ND90, The Cryptogram, American Cryptogram Association, 1990. [IC4 ] PHOENIX, "Computer Column: Index of Coincidence (IC), JA82, The Cryptogram, American Cryptogram Association, 1982. [IC5 ] PHOENIX, "Computer Column: Index of Coincidence, (correction) MA83, The Cryptogram, American Cryptogram Association, 1983. [IFTS] Information Infrastructure Task Force, The National Information Infrastructure: Agenda for Action, Department of Commerce, 15 September 1993. [IMPE] D'Imperio, M. E, " The Voynich Manuscript - An Elegant Enigma," Aegean Park Press, Laguna Hills, CA, 1976. [INDE] PHOENIX, Index to the Cryptogram: 1932-1993, ACA, 1994. [INDU] Industry Canada (1994). "Privacy and the Canadian Information Highway". Available from Distribution Services / Industry Canada / Room 208D, East Tower / 235 Queen Street / Ottawa K1A 0H5. Tel. 613-954-5716; fax 613-954-6436. PW/GSC catalog #C2-229/1-1994. ISBN 0-662-61370- 8. SIT PU 0025-94-03. [IRD ] International Resource Development, Data, Fax, and Voice Encryption Equipment Worldwide, Report #782 (December 1991), New Canaan, CT, pp. 267- 271. [Irvi] Irvine v. California, 347 U.S. 128, 1954. [ISO-87] International Organization for Standards, Draft International Standard ISO/DIS 7498-2, Information processing systems - Open Systems Interconnection Model - Part 2: Security Architecture, 1987. [ITAL] Italian - English Dictionary, compiled by Vittore E. Bocchetta, Fawcett Premier, New York, 1965. [ITAR] International Traffic in Arms Regulation (ITAR), 22 CFR 120-130. [JAPA] Martin, S.E., "Basic Japanese Conversation Dictionary," Charles E. Tuttle Co., Toyko, 1981. [JAPH] "Operational History of Japanese Naval Communications, December 1941- August 1945, Monograph by Japanese General Staff and War Ministry, Aegean Park Press, 1985. [JOH0] Johnson, Brian, 'The Secret War', Arrow Books, London 1979. [JOHN] Johnson, D.B., Matyas, S.M., Le, A.V., Wilkins, J.D., "Design of the Commercial Data Masking Facility Data Privacy Algorithm," Proceedings 1st ACM Conference on Computer & Communications Security, November 1993, Fairfax, VA., pp. 93-96. [JU82] R. R. Jueneman, "Analysis of certain aspects of output feedback mode," in D. Chaum, R. L. Rivest, and A. T. Sherman, Eds., Advances in Cryptology - proceedings of CRYPTO 82, a Workshop on the Theory and Application of Cryptographic Techniques, Santa Barbara, CA, August 23-25, 1982, pp. 99-127. New York: Plenum Press, 1983. [JU86] R. R. Jueneman, "A high speed manipulation detection code," in A. M. Odlyzko, Ed., Lecture Notes in Computer Science Vol. 263: Advances in Cryptology -CRYPTO '86, proceedings of a Conference on Theory and Applications of Cryptographic Techniques, Santa Barbara, CA, August 11-15, 1986, pp. 327-346. Berlin/New York: Springer-Verlag, 1987. [KABA] Kabay, M. E. (1996). "The NCSA Guide to Enterprise Security: Protecting Information Assets". McGraw-Hill (New York). ISBN 0-07- 033147-2. 388 pp. Index. [KALI] Kaliski, B. "The MD2 Message-Digest Algorithm", RFC1319, April 1992 [KADI] al-Kadi, Ibrahim A., Cryptography and Data Security: Cryptographic Properties of Arabic, Proceedings of the Third Saudi Engineering Conference. Riyadh, Saudi Arabia: Nov 24-27, Vol 2:910-921., 1991. [KAHN] Kahn, David, "The Codebreakers", Macmillian Publishing Co. , 1967. [KAH1] Kahn, David, "Kahn On Codes - Secrets of the New Cryptology," MacMillan Co., New York, 1983. [KAH2] Kahn, David, "An Enigma Chronology", Cryptologia Vol XVII,Number 3, July 1993. [KAH3] Kahn, David, "Seizing The Enigma: The Race to Break the German U-Boat Codes 1939-1943 ", Houghton Mifflin, New York, 1991. [KAMD] J. Kam, G. Davida, A structured design of substitution-permutation encryption networks. IEEE Trans. Information Theory, 28(10), 747-- 753, 1978. [KAPO] Kapor, Mitchell. Testimony. "Telecommunications InfrastructureLegislation And Proposals." Telecommunications And Finance HouseEnergy And Commerce Commi ttee. Washington DC, 24Oct. 1991. ftp.eff.org file. [KARA] Karalekas, Anne, "History of the Central Intelligence Agency," Aegean Park Press, Laguna Hills, CA, 1977. [KASI] Kasiski, Major F. W. , "Die Geheimschriften und die Dechiffrir-kunst," Schriften der Naturforschenden Gesellschaft in Danzig, 1872. [KAS1] Bowers, M. W., {ZEMBIE} "Major F. W. Kasiski - Cryptologist," The Cryptogram, XXXI, JF, 1964. [KAS2] ----, "Kasiski Method," JF64,MA64, The Cryptogram, American Cryptogram Association, 1964. [KAS3] PICCOLA, "Kasiski Method for Periodics," JJ35,AS35, The Cryptogram, American Cryptogram Association, 1935, 1935. [KAS4] AB STRUSE, "Who was Kasiski?" SO76, The Cryptogram, American Cryptogram Association, 1976. [KATZ] Katzen, Harry, Jr., "Computer Data Security,"Van Nostrand Reinhold, 1973. [Katz] Katz v United States, 389 U.S. 347, 1967. [KENN] Ellen Alderman and Carolyn Kennedy, The Right To Privacy, Knopf Publishing, New York, 1995. [KENT] Sherman Kent, "Strategic Intelligence for American World Policy" Princetone University Press, Princeton, NJ 1966. [Kent] Kent, S., 1993, ``Internet Privacy Enhanced Mail,'' Communications of the ACM, Vol. 36 (8), pp. 48-59, August 1993. [KERC] Kerckhoffs, "la Cryptographie Militaire, " Journel des Sciences militaires, 9th series, IX, (January and February, 1883, Libraire Militaire de L. Baudoin &Co., Paris. English trans. by Warren T, McCready of the University of Toronto, 1964 [KEY0] S-TUCK, " 5X5 Key Squares and How to Solve Them" AS44, The Cryptogram, American Cryptogram Association, 1944. [KEY1] S-TUCK, " Mixed Squares...Columnar Takeout From Keyword Block" DJ46, The Cryptogram, American Cryptogram Association, 1946. [KEY2] S-TUCK, " Recovery of a 5X5 Keyword Square" ON46, The Cryptogram, American Cryptogram Association, 1946. [KEY3] ARACHNE, " Square Dealing: The Polybius Square, Part I- Introduction and History," JF93, The Cryptogram, American Cryptogram Association, 1993. [KEY4] ARACHNE, " Square Dealing: The Polybius Square, Part II-Tri Square Application," MA93, The Cryptogram, American Cryptogram Association, 1993. [KEY5] ARACHNE, " Square Dealing: The Polybius Square, Part III-Bifid Application," MJ93, The Cryptogram, American Cryptogram Association, 1993. [KEY6] ARACHNE, " Square Dealing: The Polybius Square, Part IV-Reconstruction of Phillips Squares," JA93, The Cryptogram, American Cryptogram Association, 1993. [KH79] L. G. Khacian, "A polynomial algorithm in linear programming," Dokl. Akad. Nauk. SSSR 244, pp. 1093-1096. English translation in Soviet Math. Dokl. 20, pp. 191-194. [Kinz] Kinzer, S., 1992, ``East Germans Face Their Accusers,'' New York Times Magazine, April 12, 1992. [KINN] P. Kinnucan, Data encryption gurus: Tuchman and Meyer. Cryptologia, vol. II #4, 371--XXX, 1978. [KING] King and Bahler, Probabilistic Relaxation in the Cryptanalysis of Simple Substitution Ciphers. Cryptologia 16(3), 215--225, 1992. [KINB] King and Bahler, An Algorithmic Solution of Sequential Homophonic Ciphers. Cryptologia 17(2), in press. [KL79] C. S. Kline and G. J. Popek, "Public key vs. conventional key encryption," in R. E. Merwin, Ed., AFIPS Conference Proceedings Vol. 48: National Computer Conference, June 4-7, 1979, New York, NY, pp. 831-837. Montvale, NJ: AFIPS Press, 1979. [KN81] D. E. Knuth, The Art of Computer Programming, Vol. 2: Seminumerical Algorithms. Reading, MA: Addison-Wesley, 1981. [K78b] L. M. Kohnfelder, "On the signature reblocking problem in public-key cryptosystems," Communications of the ACM, Vol. 21, No. 2, February 1978, p. 179. [KP1 ] PICCOLA, "The Key Phrase Cipher," ON37, The Cryptogram, American Cryptogram Association, 1937. [KP2 ] S-TUCK, "The Key Phrase Cipher," ON43, The Cryptogram, American Cryptogram Association, 1943. [KP3 ] LEDGE, "The Key Phrase Cipher," JF75, The Cryptogram, American Cryptogram Association, 1975. [Novice Notes] [KP4 ] TRIODE, "Thought on the The Key Phrase Cipher," JF69, The Cryptogram, American Cryptogram Association, 1969. [KP5 ] DE SAURAIS, "Stamp out Cockneyed Key Phrase Cipher," JA69, The Cryptogram, American Cryptogram Association, 1969. [KNUT] D. E. Knuth, The Art of Computer Programming, volume 2: Seminumerical Algorithms. Addison- Wesley, 1981. [KOBI] Kobayashi et T. Ochiai, "Meromorphic mappings into compact complex spaces of general type," Invent. Math. 31 (1975), 7-16. [KOBL] Koblitz, Neal, " A Course in Number Theory and Cryptography, 2nd Ed, Springer-Verlag, New York, 1994. [KOCH] Martin Kochanski, A Survey of Data Insecurity Packages. Cryptologia 11(1), 1--15, 1987. [KOCM] Martin Kochanski, Another Data Insecurity Package. Cryptologia 12(3), 165--177, 1988. [KOHL] Kohls, D., and Lance J. Hoffman, "TurboTrade: A National Information Infrastructure Cost/Risk/Benefit Model," Report GWU-IIST-93-17, Department of Electrical Engineering and Computer Science, The George Washington University, Washington, D. C., September 1993. [KOHL] Kohl, J., and Neuman, C., "The Kerberos Authentication Service (V5)", RFC1510, September 1993. [KONH] Konheim, Alan G., "Cryptography -A Primer" , John Wiley, 1981, pp 212 ff. [KORD] Kordemsky, B., "The Moscow Puzzles," Schribners, 1972. [KOTT] Kottack, Phillip Conrad, "Anthropology: The Exploration Of Human Diversity," 6th ed., McGraw- Hill, Inc., New York, N.Y. 1994. [KOZA] Kozaczuk, Dr. Wladyslaw, "Enigma: How the German Machine Cipher was Broken and How it Was Read by the Allies in WWI", University Pub, 1984. [KOZC] W. Kozaczuk, Enigma. University Publications of America, 1984 ov, Elementary Cryptanalysis. Math. Assoc. Am. 1966. [KO78] L. M. Kohnfelder, "A method for certification," MIT Laboratory for Computer Science, Cambridge, MA, May 1978. [KO81] A. G. Konheim, Cryptography: a Primer. New York: John Wiley & Sons, 1981. [KO85] J. Kowalik, Ed., Parallel MIMD Computation: the HEP supercomputer and its Applications. Cambridge, MA: MIT Press, 1985. [Krav] Kravitz, D., Digital Signature Algorithm, U.S. Patent Number 5231668, applied for July 26, 1991, received July 27, 1993. [KR86] E. Kranakis, Primality and Cryptography. Chichester/New York: John Wiley & Sons, 1986. [KRAI] Kraitchek, "Mathematical Recreations," Norton, 1942, and Dover, 1963. [KROL] Krol, E. (1992). "The Whole Internet User's Guide & Catalog". O'Reilly & Associates (Sebastopol, CA). ISBN 1-56592-025-2. xxiv + 376. Index. [KOZA] Kozaczuk, Wladyslaw, "ENIGMA," How the German Machine Cipher was Broken, and How It was Read by the Allies in World War Two," Ksiazka i Wiedza, Warsaw, 1984. [KU82] H. T. Kung, "Why systolic architectures," Computer, Vol. 15, No. 1, January 1982, pp. 37- 46. [KU78] H. T. Kung and C. Leiserson, "Systolic arrays (for VLSI)," in I. S. Duff and G. W. Stewart, Eds., Sparse Matrix Proceedings, pp. 245-282. Philadelphia: SIAM, 1978. [KU82b] S. Y. Kung, K. S. Arun, R. J. Gal-Ezer, and D. V. B. Rao, "Wavefront array processor: language, architecture, and applications," IEEE Transactions on Computers, Vol. C-31, No. 11, November 1982, pp. 1054-1066. [KULL] Kullback, Solomon, Statistical Methods in Cryptanalysis, Aegean Park Press, Laguna Hills, Ca. 1976. [KUL1] Soloman Kullback, Information Theory and Statistics. Dover, 1968. [Ladn] LADNER System, 1984, , Operation and Maintenance Manual, Part No. ON332500, Prepared for Maryland Procurement Office, Ft. George G. Meade, MD, December 1, 1984. [Land] Landau, S., 1988, ``Zero Knowledge and the Department of Defense,'' , Notices of the American Mathematical Society (Special Article Series), Vol. 35, No. 1 (1988), pp.5-12. [LaOd] LaMacchia, B. and Odlyzko, A., 1991, Computation of Discrete Logarithms in Prime Fields, in , Design, Codes, and Cryptography, Vol. 1, 1991, pp. 47-62. [LA84] J. C. Lagarias, "Performance analysis of Shamir's attack on the basic Merkle-Hellman knapsack system," in J. Paredaens, Ed., Lecture Notes in Computer Science Vol. 172: Automata, Languages and Programming: 11th Colloquium, Antwerp, Belgium, July 16-20, 1984, pp. 312-323. Berlin/New York: Springer-Verlag, 1984. [LA83] J. C. Lagarias and A. M. Odlyzko, "Solving low- density subset sum problems," in 24th Annual Symposium on Foundations of Computer Science, Tucson, AZ, November 7-9, 1983, pp. 1-10. Silver Spring, MD: IEEE Computer Society Press, 1983. Revised version in Journal of the Association for Computing Machinery, Vol. 32, No. 1, January 1985, pp. 229-246. [LA83] S. Lakshmivarahan, "Algorithms for public key cryptosystems: theory and application," Advances in Computers, Vol. 22, 1983, pp. 45-108. [LA71] B. A. Laws, Jr. and C. K. Rushforth, "A cellular- array multiplier for GF(2m)," IEEE Transactions on Computers, Vol. 20, No. 12, December 1971, pp. 1573-1578. [LAFF] Laffin, John, "Codes and Ciphers: Secret Writing Through The Ages," Abelard-Schuman, London, 1973. [LAI] Lai, Xuejia, "On the Design and Security of Block Ciphers," ETH Series in Information Processing 1, 1992. (Article defines the IDEA Cipher) [LAI] Lai, X. "On the Design and Security of Block Ciphers," ETH Series in Information Processing, v. 1, Konstanz: Hartung-Gorre Verlag, 1992. (Article defines the IDEA Cipher) [LAIM] Lai, Xuejia, and James L. Massey, "A Proposal for a New Block Encryption Standard," Advances in Cryptology -Eurocrypt 90 Proceedings, 1992, pp. 55-70. [LAKE] Lakoff, R., "Language and the Women's Place," Harper & Row, New York, 1975. [LAKS] S. Lakshmivarahan, Algorithms for public key cryptosystems. In Advances in Computers, M. Yovtis ed., 22, Academic Press, 45--108, 1983. [LAN0] Lang., S., - "Hyperbolic and Diophantine analysis, a paraitre," Bull. AMS, 1986. [LANG] Langie, Andre, "Cryptography," translated from French by J.C.H. Macbeth, Constable and Co., London, 1922. [LAN1] Langie, Andre, "Cryptography - A Study on Secret Writings", Aegean Park Press, Laguna Hills, CA. 1989. [LAN2] Langie, Andre, and E. A. Soudart, "Treatise on Cryptography, " Aegean Park Press, Laguna Hills, CA. 1991. [LATI] BRASSPOUNDER, "Latin Language Data, "The Cryptogram," July-August 1993. [LAUE] Lauer, Rudolph F., "Computer Simulation of Classical Substitution Cryptographic Systems" Aegean Park Press, 1981, p72 ff. [Lewi] Lewis, P., 1994, ``IRS Tries On-Line Filing,''New York Times, February 19, 1994, Sec. D. [LE82] D. J. Lehman, "On primality tests," SIAM Journal on Computing, Vol. 11, No. 2, May 1982, pp. 374- 375. [LE76] D. H. Lehmer, "Strong Carmichael numbers," Journal of the Australian Mathematical Society, Vol. 21 (Series A), 1976, pp. 508- 510. [LE79] A. Lempel, "Cryptology in transition," ACM Computing Surveys, Vol. 11, No. 4, December 1979, pp. 285-303. [LE82] A. K. Lenstra, H. W. Lenstra, Jr., and L. Lovasz, "Factoring polynomials with rational coefficients," Mathematische Annalen, Vol. 261, 1982, pp. 515-534. [LE90] A. K. Lenstra, H. W. Lenstra, Jr., M. S. Manasse, and J. M. Pollard, "The number field sieve." [LE89] A. K. Lenstra and M. S. Manasse, "Factoring by electronic mail," to appear in proceedings of EUROCRYPT '89. [LE83] H. W. Lenstra, Jr., "Integer programming with a fixed number of variables," Mathematics of Operations Research, Vol. 8, No. 4, November 1983, pp. 538-548. [LE86] H. W. Lenstra, Jr., "Primality testing," in J. W. de Bakker et al., Eds., Mathematics and Computer Science, CWI Monographs, I, pp. 269-287. Amsterdam/New York: North-Holland, 1986. [LE87] H. W. Lenstra, Jr., "Factoring integers with elliptic curves," Annals of Mathematics, Vol. 126, 1987, pp. 649-673. [LE81] H. R. Lewis and C. H. Papadimitriou, Elements of the Theory of Computation. Englewood Cliffs, NJ: Prentice-Hall, 1981. [LEAR] Leary, Penn, " The Second Cryptographic Shakespeare," Omaha, NE [from author] 1994. [LEA1] Leary, Penn, " Supplement to The Second Cryptographic Shakespeare," Omaha, NE [from author] 1994. [LEAU] Leaute, H., "Sur les Mecanismes Cryptographiques de M. de Viaris," Le Genie Civil, XIII, Sept 1, 1888. [LEDG] LEDGE, "NOVICE NOTES," American Cryptogram Association, 1994. [ One of the best introductory texts on ciphers written by an expert in the field. Not only well written, clear to understand but as authoritative as they come! ] [LED1] LEDGE, "Basic Patterns in Base Eleven and Twelve Arithmetic (Part 1) ," The Cryptogram, American Cryptogram Association, Vol XLIII, No. 5, 1977. [LED2] LEDGE, "Basic Patterns in Base Eleven and Twelve Arithmetic (Part 2) ," The Cryptogram, American Cryptogram Association, Vol XLIII, No. 6, 1977. [LEMP] A. Lempel, Cryptology in transition, Computing Surveys, 11(4), 285--304, 1979. [LENS] Lenstra, A.K. et. al. "The Number Field Sieve," Proceedings of the 22 ACM Symposium on the Theory of Computing," Baltimore, ACM Press, 1990, pp 564-72. [LEN1] Lenstra, A.K. et. al. "The Factorization of the Ninth Fermat Number," Mathematics of Computation 61 1993, pp. 319-50. [LEVY] Levy, Steven. "Crypto Rebels." WIRED May-June 1993: 54-61. [LEWF] Lewis, Frank, "Problem Solving with Particular Reference to the Cryptic (or British) Crossword and other 'American Puzzles', Part One," by Frank Lewis, Montserrat, January 1989. [LEW1] Lewis, Frank, "The Nations Best Puzzles, Book Six," by Frank Lewis, Montserrat, January 1990. [LEWI] Lewin, Ronald, 'Ultra goes to War', Hutchinson, London 1978. [LEWN] Lewin, Ronald, 'The American Magic - Codes, ciphers and The Defeat of Japan', Farrar Straus Giroux, 1982. [LEWY] Lewy, Guenter, "America In Vietnam", Oxford University Press, New York, 1978. [LEVI] Levine, J., U.S. Cryptographic Patents 1861- 1981, Cryptologia, Terre Haute, In 1983. [LEV1] Levine, J. 1961. Some Elementary Cryptanalysis of Algebraic Cryptography. American Mathematical Monthly. 68:411-418 [LEV2] Levine, J. 1961. Some Applications of High- Speed Computers to the Case n =2 of Algebraic Cryptography. Mathematics of Computation. 15:254-260 [LEV3] Levine, J. 1963. Analysis of the Case n =3 in Algebraic Cryptography With Involuntary Key Matrix With Known Alphabet. Journal fuer die Reine und Angewante Mathematik. 213:1-30. [LINA] Anonomous, "Decrypment of Minoan Linear A," MJ64, The Cryptogram, American Cryptogram Association, 1964. [LI89] J. Linn and S. T. Kent, "Privacy for DARPA- Internet mail," in Proceedings of the 12th National Computer Security Conference, Baltimore, MD, October 10-13, 1989, pp. 215-229. [Link] M/A-COM LINKABIT Corporation, 1983, , LC76 DES Data Encryption/Decryption Unit: Product Brochure, August, 1983. [LINN] Linn J. "Privacy Enhancement for Internet Electronic Mail: Part I: Message Encryption and Authentication Procedures", RFC1421, Feb 1993. [LISI] Lisicki, Tadeusz, 'Dzialania Enigmy', Orzet Biaty, London July-August, 1975; 'Enigma i Lacida', Przeglad lacznosci, London 1974- 4; 'Pogromcy Enigmy we Francji', Orzet Biaty, London, Sept. 1975.' [LION] LIONEL,"A Tool for Patristocrat Tip Placement ," JA95 3, The Cryptogram, American Cryptogram Association, 1995. [LITT] Littman, J. (1996). "The Fugitive Game: Online with Kevin Mitnick--The Inside Story of the Great Cyberchase". Little, Brown and Company (Boston). ISBN 0-316-5258-7. x + 383. [LUBY] C. Rackoff, M. Luby, How to construct psuedorandom permutations from psuedorandom functions. SIAM Journal of Computing, vol. 17, #2, 373--386, 1988. [LUCK] Michael Lucks, A Constraint Satisfaction Algorithm for the Automated Decryption of Simple Substitution Ciphers. In CRYPTO '88. 598--605, 1979. [LYNC] Lynch, Frederick D., "Pattern Word List, Vol 1.," Aegean Park Press, Laguna Hills, CA, 1977. [LYN1] Lynch, Frederick D., "An Approach To Cryptarithms," ACA, 1976. [LYND] Lynch, D. C. & M. T. Rose (1993). "Internet System Handbook". Addison-Wesley Publishing Co. (Reading, MA). ISBN 0-201-56741-5. xxxii + 790. Index. [LYSI] Lysing, Henry, aka John Leonard Nanovic, "Secret Writing," David Kemp Co., NY 1936. [MA81] D. MacMillan, "Single chip encrypts data at 14 Mb/s," Electronics, Vol. 54, No. 12, June 16, 1981, pp. 161-165. [MA88] J. L. Massey, "An introduction to contemporary cryptology," Proceedings of the IEEE, Vol. 76, No. 5, May 1988, pp. 533-549. [MA78] S. M. Matyas and C. H. Meyer, "Generation, distribution, and installation of cryptographic keys," IBM Systems Journal, Vol. 17, No. 2, 1978, pp. 126-137. [MACB] Macbeth, J. C. H., "The Marconi International Code," 1920. - "Secret Ciphering for the Marconi International Code," 1920. [MACF] MacFarlane, A. Lectures on Ten British Mathematicians of the Nineteen Century, Math. Mono. No 17, New York: John Wiley, 1916. [MACI] Macintyre, D., "The Battle of the Atlantic," New York, Macmillan, 1961. [MADA] Madachy, J. S., "Mathematics on Vacation," Scribners, 1972. [MAGN] Magne, Emile, Le plaisant Abbe de Boisrobert, Paris, Mecure de France, 1909. [MANN] Mann, B.,"Cryptography with Matrices," The Pentagon, Vol 21, Fall 1961. [MANS] Mansfield, Louis C. S., "The Solution of Codes and Ciphers", Alexander Maclehose & Co., London, 1936. [MAN1] Mansfield, L.C.S, "One Hundred Problems in Cipher. London, 1936. [MARO] Marotta, Michael, E. "The Code Book - All About Unbreakable Codes and How To Use Them," Loompanics Unlimited, 1979. [This is a terrible book. Badly written, without proper authority, unprofessional, and prejudicial to boot. And, it has one of the better illustrations of the Soviet one-time pad with example, with three errors in cipher text, that I have corrected for the author.] [MARS] Marshall, Alan, "Intelligence and Espionage in the Reign of Charles II," 1660-1665, Cambridge University, New York, N.Y., 1994. [MASS] J. Massey, An introduction to contemporary cryptology, IEEE proceedings, 76(5), 533--549, 1988. [MART] Martin, James, "Security, Accuracy and Privacy in Computer Systems," Prentice Hall, Englewood Cliffs, N.J., 1973. [MAST] Lewis, Frank W., "Solving Cipher Problems - Cryptanalysis, Probabilities and Diagnostics," Aegean Park Press, Laguna Hills, CA, 1992. [MATS] Matsui, M., 1993, ``Linear Cryptanalysis of DES Cipher,'' in Proceedings Eurocrypt 1993. [MATT] Matthews, T., Shadows Dancing: Japanese Espionage Against the West, 1939-1945, St. Martins, Press, New York, 1993. [MAU] Mau, Ernest E., "Word Puzzles With Your Microcomputer," Hayden Books, 1990. [MAVE] Mavenel, Denis L., Lettres, Instructions Diplomatiques et Papiers d' Etat du Cardinal Richelieu, Historie Politique, Paris 1853-1877 Collection. [MAYA] Coe, M. D., "Breaking The Maya Code," Thames and Hudson, New York, 1992. [MYSZ] Myszkowski, E., Cryptographie Indechiffrable, Paris, 1902. [MAZU] Mazur, Barry, "Questions On Decidability and Undecidability in Number Theory," Journal of Symbolic Logic, Volume 54, Number 9, June, 1994. [MC89] K. S. McCurley, "The discrete logarithm problem," preprint. [MC78] R. J. McEliece, "A public-key cryptosystem based on algebraic coding theory," DSN Progress Report 42-44, Jet Propulsion Laboratory, 1978, pp. 114- 116. [ME78] R. C. Merkle, "Secure communications over insecure channels," Communications of the ACM, Vol. 21, No. 4, April 1978, pp. 294-299. [ME82] R. C. Merkle, Secrecy, Authentication, and Public Key Systems. Ann Arbor: UMI Research Press, 1982. [ME82b] R. C. Merkle, "Protocols for public key cryptosystems," in G. J. Simmons, Ed., Secure Communications and Asymmetric Cryptosystems, pp. 73-104. Boulder, CO: Westview Press, 1982. [ME89] R. C. Merkle, "One way hash functions and DES," preprint. [M78b] R. C. Merkle and M. E. Hellman, "Hiding information and signatures in trapdoor knapsacks," IEEE Transactions on Information Theory, Vol. 24, No. 5, September 1978, pp. 525- 530. [MELL] Mellen G. 1981. Graphic Solution of a Linear Transformation Cipher. Cryptologia. 5:1-19. [MEND] Mendelsohn, Capt. C. J., Studies in German Diplomatic Codes Employed During World War, GPO, 1937. [MERK] Merkle, Ralph, "Secrecy, Authentication and Public Key Systems," Ann Arbor, UMI Research Press, 1982. [MER1] Merkle, Ralph, "Secure Communications Over Insecure Channels," Communications of the ACM 21, 1978, pp. 294-99. [MER2] Merkle, Ralph and Martin E. Hellman, "On the Security of Multiple Encryption ," Communications of the ACM 24, 1981, pp. 465-67. [MER3] Merkle, Ralph and Martin E. Hellman, "Hiding Information and Signatures in Trap Door Knapsacks," IEEE Transactions on Information Theory 24, 1978, pp. 525-30. [MER4] R. Merkle, Fast software encryption functions. In Proceedings of CRYPTO '90, Menezes and Vanstone ed., 476--501, 1991. [MESC] Meschkowski, H., "Ways of Thought of Great Mathematicians, tr by John Dyer-Bennet. San Francisco: Holden-Day 1948. [MEYE] C. Meyer and S. Matyas, Cryptography: A new dimension in computer security. Wiley, 1982. [MEYR] C. Meyer, Ciphertext/plaintext and ciphertext/key dependence vs. number of rounds for the Data Encryption Standard. AFIPS Conference proceedings, 47, 1119--1126, 1978. [MI76] G. L. Miller, "Riemann's hypothesis and tests for primality," Journal of Computer and System Sciences, Vol. 13, No. 3, December 1976, pp. 300-317. [MI88] V. M. Milutinovic, Computer Architecture: Concepts and Systems. New York: North-Holland, 1988. [MICR] MICROPOD,"The Solution of a Two Square," JA95, The Cryptogram, American Cryptogram Association, 1995. [MICA] Micali, S., Fair Cryptosystems, Report MIT/LCS/TR-579.b, MIT Laboratory for Computer Science, Cambridge, Mass, November 1993. [MILL] Millikin, Donald, " Elementary Cryptography ", NYU Bookstore, NY, 1943. [MIL0] Miller, C. (1993). "Information Technology Security Handbook". PW/GSC, catalog #P35- 73/1993. ISBN 0-662-59922-5. [MIL1] Miller, C. (1993). "Microcomputer and LAN Security". PW/GSC, catalog #P35-72/1993. ISBN 0-662-59921-7. [MILE] Miller, S. E. (1996). "Civilizing Cyberspace: Policy, Power and the Information Superhighway". ACM Press by Addison-Wesley (Reading, MA). ISBN 0-201-84760-4. xvii + 413. Index. [Mint] Mintz, J., 1992, ``Intelligence Community in Breach with Business,'' Washington Post, April 30, 1992, Sec. A. [MINT] Mintz J., and J. Schwartz, "Encryption Program Draws Fresh Attacks," The Washington Post, 18 September 1993, p. C1. [MO85] P. L. Montgomery, "Modular multiplication without trial division," Mathematics of Computation, Vol. 44, No. 170, April 1985, pp. 519-521. [MO88] J. H. Moore, "Protocol failures in cryptosystems," Proceedings of the IEEE, Vol. 76, No. 5, May 1988, pp. 594-602. [MO75] M. A. Morrison and J. Brillhart, "A method of factoring and the factorization of F7," Mathematics of Computation, Vol. 29, No. 129, January 1975, pp. 183-205. [MODE] Modelski, Tadeusz, 'The Polish Contribution to the Ultimate Allied Victory in the Second World War', Worthing (Sussex) 1986. [MOOR] Moore, D. T., and M. Waller, "Cloak and Cipher," Bobbs-Merrill, New York, 1962. [MORB] EUREKA, "A Bit More To the Morbit Cipher," MJ64, The Cryptogram, American Cryptogram Association, 1964. [MORB] EUREKA, "A Bit More To the Morbit Cipher," MJ64, The Cryptogram, American Cryptogram Association, 1964. [MOR1] THE BRUIN, "A Pollux/Morbit Hybrid Cipher," MA88, The Cryptogram, American Cryptogram Association, 1988. [MOR2] NIP N. BUD, "Comments on Breaking the Morbit Cipher," MA64, The Cryptogram, American Cryptogram Association, 1964. [MOR3] CROATULUS, "Entering the Morbit with Plaintext H," SO68, The Cryptogram, American Cryptogram Association, 1968. [MOR4] EUREKA, "Morbit Cipher," JF64, The Cryptogram, American Cryptogram Association, 1964. [MOR5] CRUX, "Morbit Diagraph Analysis," MA90, The Cryptogram, American Cryptogram Association, 1990. [MOR6] LEDGE, "Morbit Cipher," SO75, The Cryptogram, American Cryptogram Association, 1975. [MOR7] MARSHEN, "On Morbit Variants," ND64, The Cryptogram, American Cryptogram Association, 1964. [MOR8] THE DOC, "Pollux/Morbit Challenge Solved," SO88, The Cryptogram, American Cryptogram Association, 1988. [MORS] FIDDLE, "Morse Code in Three Languages, International, ," DJ53, The Cryptogram, American Cryptogram Association, 1953. [MOR1] LAMONT CRANSTON,"Fractionated Morse," JA92, The Cryptogram, American Cryptogram Association, 1992. [MRAY] Mrayati, Mohammad, Yahya Meer Alam and Hassan al- Tayyan., Ilm at-Ta'miyah wa Istikhraj al-Mu,amma Ind al-Arab. Vol 1. Damascus: The Arab Academy of Damascus., 1987. [MULL] Mulligan, Timothy," The German Navy Examines its Cryptographic Security, Oct. 1941, Military affairs, vol 49, no 2, April 1985. [Myer] Myers, F., 1979, ``A Data Link Encryption System,'' National Telecommunications Conference, Washington, D.C. November 27-29, 1979, pp. 43.5.1-43.5.8. [MYER] Myer, Albert, "Manual of Signals," Washington, D.C., USGPO, 1879. [MYSK] PHOENIX, "Myszkowski Deciphering Program," JA87, The Cryptogram, American Cryptogram Association, 1987. [MYS1] PHOENIX, "Myszkowski Deciphering Program- Conclusion," ND87, The Cryptogram, American Cryptogram Association, 1987. [MYS2] QUINCE, "Redefence al la Myszkowski," JF92, The Cryptogram, American Cryptogram Association, 1992. [MYS3] DELAC, "Myszkowski Transposition," AS46, The Cryptogram, American Cryptogram Association, 1946. [MYS4] S-TUCK, "Myszkowski Transposition," AM52, The Cryptogram, American Cryptogram Association, 1952. [MYS5] B.NATURAL, "Simplifing the Myszkowski," JF59, The Cryptogram, American Cryptogram Association, 1959. [MYS6] AB STRUSE, "Solving the Myszkowski," AM48, The Cryptogram, American Cryptogram Association, 1948. [MYS7] CROTALUS, "Railfence and Redefence as Special Cases of the Myszkowski," JA80, The Cryptogram, American Cryptogram Association, 1980. [MYSZ] Myszkowski, Emile V.T., "Cryptographie indechiffrable basee sur de nouvelles combinaisons rationelles." Paris 1902. 69 pg 8 vol.,NN, DLC, Boston Public Library, John Crerar Library, Great Britian War Office Library, Belgium War Library, BN. [NA77] National Bureau of Standards, Federal Information Processing Standards Publication 46: Data Encryption Standard, January 15, 1977. [NA80] National Bureau of Standards, Federal Information Processing Standards Publication 81: DES Modes of Operation, December 2, 1980. [NA81] National Bureau of Standards, Federal Information Processing Standards Publication 74: Guidelines for Implementing and Using the NBS Data Encryption Standard, April 1, 1981. [NBS] National Bureau of Standards, "Data Encryption Standard," FIPS PUB 46-1, 1987. [NBS] National Bureau of Standards, 1977, Data Encryption Standard, Federal Information Processing Standard 46, January 1977, Washington, DC. [NCSS] National Computer Security Center (1983-). "Rainbow Series" (so-called). Monographs on many aspects of information systems security. For an excellent summary of the series and its topics, see Appendix E of Russell & Gangemi (below), p. 359 ff. [NE78] R. M. Needham and M. D. Schroeder, "Using encryption for authentication in large networks of computers," Communications of the ACM, Vol. 21, No. 12, December 1978, pp. 993-999. [Neu ] Neumann, P., 1994 , Computer-Related Risks, ACM Press (Addison-Wesley), 1994. [NIXX] National Institute of Standards and Technology, 1991, Publication XX: Announcement and Specifications for a Digital Signature Standard (DSS), August 19, 1991, Washington, DC. [N185] National Institute of Standards and Technology, 1994, Federal Information Processing Standards Publication 185, Escrowed Encryption Standard}, February 9, 1994, Washington, DC. [N186] National Institute of Standards and Technology, 1994, Federal Information Processing Standards Publication 186: Digital Signature Standard (DSS), May 19, 1994, Washington, DC. [NI94] National Institute of Standards and Technology, 1994, Approval of Federal Information Processing Standards Publication 185, Escrowed Encryption Standard, Federal Register, Vol. 59, No. 27, February 9, 1994, Washington, DC. [NISA] National Institute of Standards and Technology and National Security Agency, 1989, Memorandum of Understanding between the Director of the National Institute of Standards and Technology and the Director of the National Security Agency concerning the Implementation of Public Law 100- 235, March 24, 1989, Washington, DC. [NIBL] Niblack, A. P., "Proposed Day, Night and Fog Signals for the Navy with Brief Description of the Ardois Hight System," In Proceedings of the United States Naval Institute, Annapolis: U. S. Naval Institute, 1891. [NICO] PHOENIX, "Nicodemus," ND88, The Cryptogram, American Cryptogram Association, 1988. [NICa] BERYL, "How to Finish Deciphering a Nicodemus," SO92, The Cryptogram, American Cryptogram Association, 1992. [NICb] S-TUCK, "Decrypting the Nicodemus," AM52, The Cryptogram, American Cryptogram Association, 1952. [NICc] FIDDLE, "Method for Solving the Nicodemus," JF60, The Cryptogram, American Cryptogram Association, 1960. [NICd] DELEC, "Nicodemus Cipher," AS49, The Cryptogram, American Cryptogram Association, 1949. [NICe] LEDGE, "Nicodemus Cipher," SO72, The Cryptogram, American Cryptogram Association, 1972. [NICH] Nichols, Randall K., " Classical Cryptography Course, Volume I," Aegean Park Press (C-74), ISBN: 0-89412-263-0, Softbound, 8.38 x 10.75 in, xii + 301 pp. Mr. Nichols (aka LANAKI) is the outgoing President of the American Cryptogram Association (ACA). In his truly great book, he covers the following: Volume I covers such diverse topics as Aristocrats (the king of puzzles found in the daily paper), Patristocrat (single language Aristocrats without word divisions), Xenocrypts (language ciphers other than English), Transposition ciphers, Military Ciphers, Cryptarithms, Polyalphabetics, Cipher Machines such as the ENIGMA (with simulation disk available) and special ciphers used in history, as well as their modern day equivalents. Ciphers and cryptanalytic techniques for solution are presented. [NIC~] Nichols, Randall K., " Classical Cryptography Course, Volume II," Aegean Park Press (C-76), ISBN: 0-89412-264-9, Softbound, 8.38 x 10.75 in, xii + 400 pp. 1996, $40.00. Volume II presents Lectures 11 - 20 (of a total of twenty five) from Mr. Nichols' extremely successful course in Classical Cryptography taught in 1995 and 1996 to 358 students via the Internet and regular mail. Volume II covers polyalphabetic substitutions ciphers in the Vigenere family (Viggy, Variant, Beaufort, Porta, Gronsfeld, Portax, Gromark), decimation, principles of symmetry, isologs and superimposition solution techniques. Volume II describes the difficult aperiodic cipher systems (Interrupted key, Autoclave, Progressive, Running Key used in cipher machines) and their analysis by isomorphs, and repetitions. Cryptarithm solutions for extended bases are presented. The theory of coincidences and statistical attacks (kappa, chi, phi) that are derived from this important theory are detailed. Transposition theory and a variety of transposition ciphers are solved (Columnar, Amsco, Myszkowski, Cadenus, Grille, Swagman, Auto-Transposition). Volume II has two chapters on the difficult cipher systems invented by the famous French cryptographer Delastelle: Foursquare, Bifid and Trifid. Volume II ends with a chapter on passwords, law and data protection. Volume II is a potpourri of advanced topics in classical cryptography. Volume II includes over 1600 Cryptographic Resources and References covering all phases of cryptography: cryptanalysis, history, legal, social, classical, modern, NSA, mathematical techniques, recreational, intelligence, tactical, strategic, national defense, INFOSEC: offensive and defensive, hardware, software, standards, public key cryptography, web sources, and applicable Senate and House bills. Readers are encouraged to expand their knowledge in the many directions possible to them through this section. [NIC1] Nichols, Randall K., "Xeno Data on 10 Different Languages," ACA-L, August 18, 1995. [NIC2] Nichols, Randall K., "Chinese Cryptography Parts 1-3," ACA-L, August 24, 1995. [NIC3] Nichols, Randall K., "German Reduction Ciphers Parts 1-4," ACA-L, September 15, 1995. [NIC4] Nichols, Randall K., "Russian Cryptography Parts 1-3," ACA-L, September 05, 1995. [NIC5] Nichols, Randall K., "A Tribute to William F. Friedman", NCSA FORUM, August 20, 1995. [NIC6] Nichols, Randall K., "Wallis and Rossignol," NCSA FORUM, September 25, 1995. [NIC7] Nichols, Randall K., "Arabic Contributions to Cryptography,", in The Cryptogram, ND95, ACA, 1995. [NIC8] Nichols, Randall K., "U.S. Coast Guard Shuts Down Morse Code System," The Cryptogram, SO95, ACA Publications, 1995. [NIC9] Nichols, Randall K., "PCP Cipher," NCSA FORUM, March 10, 1995. [NICX] Nichols, R. K., Keynote Speech to A.C.A. Convention, "Breaking Ciphers in Other Languages.," New Orleans, La., 1993. [NICK] Nickels, Hamilton, "Codemaster: Secrets of Making and Breaking Codes," Paladin Press, Boulder, CO., 1990. [NIHL] PHOENIX," Computer Column: Nihilist Substitution," MA88, The Cryptogram, American Cryptogram Association, 1988. [NIH1] PHOENIX," Computer Column: Nihilist Substitution," MJ88, The Cryptogram, American Cryptogram Association, 1988. [NIH2] PHOENIX," Computer Column: Nihilist Substitution," JA88, The Cryptogram, American Cryptogram Association, 1988. [NIH3] PHOENIX," Computer Column: Nihilist Substitution," JA89, The Cryptogram, American Cryptogram Association, 1989. [NIH4] FIDDLE and CLEAR SKYS," FIDDLE'S slide for Nihilist Number Substitution," ON48, The Cryptogram, American Cryptogram Association, 1948. [NIH5] RIG R. MORTIS," Mixed Square Nihilist," JA60, The Cryptogram, American Cryptogram Association, 1960. [NIH6] PICCOLA," Nihilist Number Cipher," AS37, The Cryptogram, American Cryptogram Association, 1937. [NIH7] PICCOLA," Nihilist Transposition," DJ38, The Cryptogram, American Cryptogram Association, 1938. [NIST90] PUBLIC-KEY CRYPTOGRAPHY, James Nechvatal Security Technology Group National Computer Systems Laboratory National Institute of Standards and Technology Gaithersburg, MD 20899 [NORM] Norman, Bruce, 'Secret Warfare', David & Charles, Newton Abbot (Devon) 1973. [NORW] Marm, Ingvald and Sommerfelt, Alf, "Norwegian," Teach Yourself Books, Hodder and Stoughton, London, 1967. [NRC ] National Research Council (1991). "Computers at Risk: Safe Computing in the Information Age". National Academy Press (Washington, DC). ISBN 0- 309-04388-3. xv + 302. Available from the NCSA. [NSA] NSA's Friedman Legacy - A Tribute to William and Elizabeth Friedman, NSA Center for Cryptological [NSA1] Masked Dispatches: Cryptograms and Cryptology in American History, 1775 -1900. Series 1, Pre World War I Volume I, National Security Agency, Central Security Service, NSA Center for Cryptological History, 1993. [NULL] PICCOLA, "Null Cipher," ON34, The Cryptogram, American Cryptogram Association, 1934. [NUL1] ISHCABIBEL, "Null Cipher," JJ45, The Cryptogram, American Cryptogram Association, 1945. [NUL2] HELLCRYPT, "Nullifing the Null Cipher," ON49, The Cryptogram, American Cryptogram Association, 1945. [NUL3] BUNYIP, "NULLX: The Patristocrat Null Cipher," SO91, The Cryptogram, American Cryptogram Association, 1991. [NWCS] National Commission for the Review of Federal and State Laws relating to Wiretapping and Electronic Surveillance, 1976, Commission Studies, Washington, 1976, Washington, DC. [OD84] A. M. Odlyzko, "Cryptanalytic attacks on the multiplicative knapsack cryptosystem and on Shamir's fast signature scheme," IEEE Transactions on Information Theory, Vol. IT-30, No. 4, July 1984, pp. 594-601. [OD8b] A. M. Odlyzko, "Discrete logarithms in finite fields and their cryptographic significance," in T. Beth, N. Cot, and I. Ingemarsson, Eds., Lecture Notes in Computer Science Vol. 209: Advances in Cryptology: Proceedings of EUROCRYPT 84, a Workshop on the Theory and Application of Cryptographic Techniques, Paris, France, April 9-11, 1984, pp. 224-314. Berlin/New York: Springer- Verlag, 1985. [OHAV] OHAVER, M. E., "Solving Cipher Secrets," Aegean Park Press, 1989. [OHA1] OHAVER, M. E., "Cryptogram Solving," Etcetera Press, 1973. [OKLA] Andre, Josephine and Richard V. Andree, "Cryptarithms," Unit One, Problem Solving and Logical Thinking, University of Oklahoma, Norman, Ok. Copy No: 486, 1976. [OKLI] Andre, Josephine and Richard V. Andree, " Instructors Manual For Cryptarithms," Unit One, Problem Solving and Logical Thinking, University of Oklahoma, Norman, Ok. Copy No: 486, 1976. [Olm] Olmstead v. United States, 277 U.S. 438, 1928. [OPS] Office of the Press Secretary, The White House, 1993, statement on the Clipper Chip Initiative, April 16, 1993, Washington, DC. [OP20] "Course in Cryptanalysis," OP-20-G', Navy Department, Office of Chief of Naval Operations, Washington, 1941. [OPSH] O'PSHAW,"Bifid Statistical Period Determination Using a Contingency Table Chi-Square," JA95, The Cryptogram, American Cryptogram Association, 1995. [OR86] G. A. Orton, M. P. Roy, P. A. Scott, L. E. Peppard, and S. E. Tavares, "VLSI implementation of public-key encryption algorithms," in A. M. Odlyzko, Ed., Lecture Notes in Computer Science Vol. 263: Advances in Cryptology - CRYPTO '86, proceedings of a Conference on the Theory and Applications of Cryptographic Techniques, Santa Barbara, CA, August 11-15, 1986, pp. 277-301. Berlin/New York: Springer-Verlag, 1987. [ORAN] The ``Orange Book'' is DOD 520 0.28-STD, published December 1985 as part of the ``rainbow book'' series. Write to Department of Defense, National Security Agency, ATTN: S332, 9800 Savage Road, Fort Meade, MD 20755-6000, and ask for the Trusted Computer System Evaluation Criteria. Or call 301-766-8729. The ``Orange Book'' will eventually be replaced by the U.S. Federal Criteria for Information Technology Security (FC) online at the NIST site [FTPNS], which also contains information on other various proposed and active federal standards. [ORE ] Ore, Oystein, Number Theory and Its History, New York: McGraw-Hill, 1948. [OCNO] Office of Chief of Naval Operations (1943) Memorandum Communication Improvement Item. available from the NARA, Pacific Sierra Regional Archive, RG 181-58-3224, 12th ND Commandants Office General Correspondence, A6-2(1) Complaints -Discrepencies, Security-etc. [OTA] "Defending Secrets, Sharing Data: New Locks and Keys for Electronic Information," Office of Technology Assessment, 1988. [OTA1] OTA (1993). "Protecting Privacy in Computerized Medical Information". U.S. Congress Office of Technology Assessment. U.S. Government Printing Office #OTA-TCT-576 (Washington, DC). ISBN 0-16- 042074-1. viii + 157. Index. [OZK ] OZ,"Variation in Letter Frequency with Cipher Length or Where Did All Those K's Come From? ," SO59, The Cryptogram, American Cryptogram Association, 1959. [P235] Computer Security Act of 1987, Public Law 100-235 (H.R. 145), 101 Stat. 1724-1730. [PA87] W. Patterson, Mathematical Cryptology for Computer Scientists and Mathematicians. Totowa, NJ: Rowman & Littlefield, 1987. [Park] Parker, D., 1983, Fighting Computer Crime, Charles Scribner's, New York, 1983. [PATR] PICCOLA, "Patristocrat: A method for Finding Repeated Sequences," JF92, The Cryptogram, American Cryptogram Association, 1992. [PAT1] PICCOLA, "Patristocrat: Vowel Spotting and Digraphs ," ND91, The Cryptogram, American Cryptogram Association, 1991. [PAT2] PICCOLA, "Patristocrat: Finding Repeated Sequences," AM34, The Cryptogram, American Cryptogram Association, 1934. [PAT3] PICCOLA, "Patristocrat: Vowel Spotting and Digraphs ," FM34, The Cryptogram, American Cryptogram Association, 1934. [PAT4] FLEETFOOT, "Patristocrat: Column Insight," SO90, The Cryptogram, American Cryptogram Association, 1990. [PAT5] AECUS, "Patristocrat Tip Placement," SO90, The Cryptogram, American Cryptogram Association, 1990. [PAT6] LAMONT CRANSTON, "Patristocrat: Rookie Guide To Solving," JA91, The Cryptogram, American Cryptogram Association, 1991. [PAT7] MICROPOD, "Solution of a K2 Patristocrat," MJ91, The Cryptogram, American Cryptogram Association, 1991. [PAT8] FAUSTUS, "Patristocrat: Solution of Straight Substitution Crypts ," ON32, SO91, The Cryptogram, American Cryptogram Association, 1932,1991. [PATT] Wayne Patterson, Mathematical Cryptology for Computer Scientists and Mathematicians. Rowman & Littlefield, 1987. [PCSG] Public Cryptography Study Group, 1981, Report of the Public Cryptography Study Group, American Council on Education, February 1981. [PE86] R. C. Peralta, "A simple and fast probabilistic algorithm for computing square roots modulo a prime number," IEEE Transactions on Information Theory, Vol. 32, No. 6, November 1986, pp. 846- 847. [PEAR] "Pearl Harbor Revisited," U.S. Navy Communications Intelligence, 1924-1941, U.S. Cryptological History Series, Series IV, World War II, Volume 6, NSA CSS , CH-E32-94-01, 1994. [PECK] Peck, Lyman C., "Secret Codes, Remainder Arithmetic, and Matrices," National Counsil of Teachers of Mathematics, Washington, D.C. 1971. [PELE] S. Peleg and A. Rosenfeld, Breaking Substitution Ciphers Using a Relaxation Algorithm. CACM 22(11). [PERI] Y.KNOTT, "Aid For Solving Periodic Ciphers, JJ42, The Cryptogram, American Cryptogram Association, 1942. [PER1] S-TUCK, "Finding the Period in Periodic Ciphers, AS44, The Cryptogram, American Cryptogram Association, 1944 [PER2] SCHMOO, "Refinement for Simple Periodic Ciphers, MJ80, The Cryptogram, American Cryptogram Association, 1980. [PER3] LEANDER and PICCOLA, "Some Odds and Ends On Periodic Ciphers, AM40, The Cryptogram, American Cryptogram Association, 1940. [PER4] R.E. GILMAN, "To Find the Period in Any Periodic Ciphers, JJ43, The Cryptogram, American Cryptogram Association, 1943. [PERR] Perrault, Charles, Tallement des Reaux, Les Historiettes, Bibliotheque del La Pleiade, Paris 1960, pp 256-258. [PETE] Peterson, I., 'Encrypting Controversy,' Science News, 19 June 1993, 394-396. [PFLE] Pfleeger, C. P. (1989). "Security in Computing". Prentice-Hall (Englewood Cliffs, NJ). ISBN 0-13- 798943-1. xxi + 538. Index. [PGP] Garfinkel, Simson, "PGP: Pretty Good Privacy," O'reilly and Associates, Inc. Sebastopol, CA. 1995. [PHL ] PHIL,"System Identification by General Frequencies," AM48, The Cryptogram, American Cryptogram Association, 1948. [PHIL] K. SEA, "Comments On The Phillips Cipher," AM51, The Cryptogram, American Cryptogram Association, 1951. [PHI1] PHOENIX, "Phillips Crib Dragging," JA91, The Cryptogram, American Cryptogram Association, 1991. [PHI2] O'PSHAW "Mechanization of the Phillips Cipher," ND90, The Cryptogram, American Cryptogram Association, 1990. [PHI3] LEDGE, "More on the Phillips Cipher," JA72, The Cryptogram, American Cryptogram Association, 1972. [PHI4] CALIMAR, "Phillips Cipher," MA84, The Cryptogram, American Cryptogram Association, 1984. [PHI5] GLENDALE, "The Phillips Cipher," ON47, The Cryptogram, American Cryptogram Association, 1947. [PHI6] O.G. WIZ, "Phillips System," AS32, The Cryptogram, American Cryptogram Association, 1932. [PHI7] B.NATURAL, "Phillips Cipher with Mixed square," AM50, The Cryptogram, American Cryptogram Association, 1950. [PHI8] LEDGE, "Phillips," MJ72, The Cryptogram, American Cryptogram Association, 1972. [PHIP] Phillips, H., "My Best Puzzles in Logic and Reasoning," Dover, 1961. [PHOT] PHOTON, "Headline Puzzles by Paul Derthick," for publication, 1 September, 1996. (With permission of NSA and Mr. Derthick's estate)) [Pil ] Piller, C., 1993, ``Privacy in Peril,'' MacWorld,July 1993, pp. 8 - 14. [PIER] Pierce, Clayton C., "Cryptoprivacy", 325 Carol Drive, Ventura, Ca. 93003, 1994. [PIE1] Pierce, Clayton C., "Privacy, Cryptography, and Secure Communication ", 325 Carol Drive, Ventura, Ca. 93003, 1977. [PLAY] ZEMBIE, "Playfair Cipher: Anyone For," JF68, The Cryptogram, American Cryptogram Association, 1968. [PLA1] SCHMOO, "Asymetrical Playfair Cipher," MJ88, The Cryptogram, American Cryptogram Association, 1988. [PLA2] PHOENIX, "Playfair Square," MJ84, The Cryptogram, American Cryptogram Association, 1984. [PLA3] PHOENIX, "Playfair Square Reconstruction," JA84, The Cryptogram, American Cryptogram Association, 1984. [PLA4] PHOENIX, "Seriated Playfair ," SO88, The Cryptogram, American Cryptogram Association, 1988. [PLA5] S-TUCK, "First Principles of Playfair Cipher," JJ49, The Cryptogram, American Cryptogram Association, 1949. [PLA6] MI TAI TAI, "FracFair Cipher," JA66, The Cryptogram, American Cryptogram Association, 1966. [PLA7] SCRYER, "Key Reconstruction for Asymetric Playfair Cipher," JA89, The Cryptogram, American Cryptogram Association, 1989. [PLA8] THE SQUIRE, "Mixed Sequence Playfairs," DJ41, The Cryptogram, American Cryptogram Association, 1941. [PLA9] MARSHEN, "More On George Ashton's Playfair Cipher ," JA68, The Cryptogram, American Cryptogram Association, 1968. [PLAa] S-TUCK, "New Layout for the Playfair Cipher," JJ42, The Cryptogram, American Cryptogram Association, 1942. [PLAb] THE RAT, "Octafair Cipher -Version of Playfair Cipher ," MA91, The Cryptogram, American Cryptogram Association, 1991. [PLAc] PICCOLA, "Playfair Cipher," ON38, The Cryptogram, American Cryptogram Association, 1938. [PLAd] LEDGE, "Playfair Cipher," SO74, The Cryptogram, American Cryptogram Association, 1974. [PLAe] AB STRUSSE, "Playfair Symposium," SO84, The Cryptogram, American Cryptogram Association, 1984. [PLAf] Leonard, C.A., "Seriated Playfair ," JF38, The Cryptogram, American Cryptogram Association, 1938. [PO78] S. C. Pohlig and M. E. Hellman, "An improved algorithm for computing logarithms over GF(p) and its cryptographic significance," IEEE Transactions on Information Theory, Vol. IT-24, No. 1, January 1978, pp. 106-110. [PO84] C. Pomerance, "The quadratic sieve factoring algorithm," in T. Beth, N. Cot, and I. Ingemarsson, Eds., Lecture Notes in Computer Science Vol. 209: Advances in Cryptology: proceedings of EUROCRYPT 84, a Workshop on the Theory and Application of Cryptographic Techniques, Paris, France, April 9-11, 1984, pp. 169- 182. Berlin/New York: Springer-Verlag, 1985. [PO86] C. Pomerance, "Fast, rigorous factorization and discrete logarithm algorithms," in D. S. Johnson, T. Nishizeki, A. Nozaki, and H. S. Wilf, Eds., Discrete Algorithms and Complexity, proceedings of the Japan-US Joint Seminar, Kyoto, Japan, June 4- 6, 1986, pp. 119-143. Orlando, FL: Academic Press, 1987. [PO88] C. Pomerance, J. W. Smith, and R. Tuler, "A pipeline architecture for factoring large integers with the quadratic sieve algorithm," SIAM Journal on Computing, Vol. 17, No. 2, April 1988, pp. 387-403. [PO78] G. J. Popek and C. S. Kline, "Encryption protocols, public key algorithms and digital signatures in computer networks," in R. A. DeMillo, D. P. Dobkin, A. K. Jones, and R. J. Lipton, Eds., Foundations of Secure Computation, pp. 133-153. New York: Academic Press, 1978. [PO79] G. L. Popek and C. S. Kline, "Encryption and secure computer networks," ACM Computing Surveys, Vol. 11, No. 4, December 1979, pp. 331-356. [PODE] Podesta, J., White House memo to Jerry Berman, Digital Privacy and Security Working Group, on Key Escrow Encryption Technology, July 29, 1993. [POLL] Pollard, H. The Theory of Algebraic Numbers, Carus Mathematical Mono., No. 9, New York: John Wiley, 1950. [POLU] PHOENIX, "Pollux Cipher Separators," SO83, The Cryptogram, American Cryptogram Association, 1983. [POLa] MEROMA, "Locating the X's in the Pollux Cipher ," MJ75, The Cryptogram, American Cryptogram Association, 1975. [POLb] B.NATURAL, "Pollux Cipher," SO74, The Cryptogram, American Cryptogram Association, 1974. [POLc] DUN SCOTUS, "Pollux Cipher," JF68, The Cryptogram, American Cryptogram Association, 1968. [POLd] FLORDELIS "How to Solve the Pollux Cipher," JA83, The Cryptogram, American Cryptogram Association, 1983. [POLI] CRYPTOGRAPHY: POLICY AND TECHNOLOGY TRENDS, Hoffman, Lance, Faraz A. Ali, Steven L. Heckler,Ann Huybrechts, December 1, 1993 ,Revised January 30, 1994, under contract DE-AC05- 84OR21400 [POLL] L. Harris and Associates, Harris-Equifax Consumer Privacy Survey 1992, New York: Louis Harris and Associates, 1992. [POLY] Polya, G., "Mathematics and Plausible Reasoning," Princeton Press, 1954. [POL1] Polya, G., "How To Solve It.," Princeton Press, 1948. [POPE] Pope, Maurice, "The Story of Decipherment: From Egyptian Hieroglyphic to Linear B., Thames and Hudson Ltd., 1975. [PORG] Barker, Wayne G. "Cryptograms in Portuguese," Aegean Park Press, Laguna Hills, CA., 1986. [PORT] AB STRUSE, "Breaking the Porta Auto-Key Cipher," ON49, The Cryptogram, American Cryptogram Association, 1949. [POR1] SOLDJER C, "Easier Porta ," MA89, The Cryptogram, American Cryptogram Association, 1989. [POR2] CODEX, "Keyed Alphabet Porta," MJ85, The Cryptogram, American Cryptogram Association, 1985. [POR3] O'PSHAW, "Porta Cipher- Special Case of the Beaufort," MA91, The Cryptogram, American Cryptogram Association, 1991. [POR4] X.GOTKY, "Porta Auto-Key Cipher," AM44, The Cryptogram, American Cryptogram Association, 1944. [POR5] LEDGE, "Porta Cipher," MA72, The Cryptogram, American Cryptogram Association, 1972. [POR6] X.GOTKY, "Short Cut For Lining up Porta Alphabets," AS46, The Cryptogram, American Cryptogram Association, 1946. [POR7] X.GOTKY, "ShortCuts For Lining up Porta Alphabets," FM43, The Cryptogram, American Cryptogram Association, 1943. [POR8] PICCOLA, "Some Odds and Ends On the Porta Cipher," JJ40, The Cryptogram, American Cryptogram Association, 1940. [PORa] Aliandro, Hygino, "The Portuguese-English Dictionary," Pocket Books, New York, N.Y., 1960. [PORX] RED E. RASER, "Portax Cipher," JJ53, The Cryptogram, American Cryptogram Association, 1953. [POX1] LEDGE, "Portax Cipher," JF73, The Cryptogram, American Cryptogram Association, 1973. [POX2] S-TUCK, "Portax Cipher Period Finding," FM50, The Cryptogram, American Cryptogram Association, 1950. [POST] Postman, N. (1992). "Technopoly: The Surrender of Culture to Technology." Vintage Books Division of Random House (New York). ISBN 0-679- 74540-8. xii + 222. Index. [POUN] Poundstone, William, "Biggest Secrets," Quill Publishing, New York, 1993. ( Explodes the Beale Cipher Hoax.) [PRIC] Price, A.,"Instruments of Darkness: the History of Electronic Warfare, London, Macdonalds and Janes, 1977. [PRI1] W. Price, D. Davies, Security for computer networks. Wiley, 1984. [PRIV] Privacy Commissioner of Canada (1994). Annual Report. Canada Communication Group (Ottawa). ISBN 0-662-61245-0. iv + 69. [PROT] "Protecting Your Privacy - A Comprehensive Report On Eavesdropping Techniques and Devices and Their Corresponding Countermeasures," Telecommunications Publishing Inc., 1979. [PT10] Annonomous, "PT109 Cipher Message (President Kennedy)," SO62, The Cryptogram, American Cryptogram Association, 1962. [QU87] M. J. Quinn, Designing Efficient Algorithms for Parallel Computers. New York: McGraw-Hill, 1987. [QU82] J.-J. Quisquater and C. Couvreur, "Fast decipherment algorithm for RSA public-key cryptosystem," Electronics Letters, Vol. 18, No. 21, October 14, 1982, pp. 905-907. [QUAG] QUINCE, "Quagmire Cipher:A Personal Attack," JA92, The Cryptogram, American Cryptogram Association, 1992. [QUA1] MACHIAVELLI, "Alphabet Recovery in K4 Quagmire Ciphers," SO59, The Cryptogram, American Cryptogram Association, 1959. [QUA2] DUBIOUS, "Cipher text Alphabets of Quagmire Ciphers ," JASO59, The Cryptogram, American Cryptogram Association, 1959. [QUA3] CALIMER, "Double Quagmire Cipher," JF81, The Cryptogram, American Cryptogram Association, 1981. [QUA4] B.NATURAL, "Filling in the Quagmire Block with the Least Amount of Values and Yet Finding the Keywords(s)," SO58, The Cryptogram, American Cryptogram Association, 1958. [QUA5] O'PSHAW, "Double Quagmire Recovery of Non Consecutive Key Alphabet," MJ88, The Cryptogram, American Cryptogram Association, 1988. [QUA6] BARGE, "Five by Five Quagmires," JF70, The Cryptogram, American Cryptogram Association, 1970. [QUA7] RED E. RASER, "Impressions on Quagmire III Cipher," ON47, The Cryptogram, American Cryptogram Association, 1947. [QUA8] MACHIAVELLI, "Keyword IV: Its Use and Recovery in Quagmires," MA69, The Cryptogram, American Cryptogram Association, 1969. [QUA9] DUBIOUS, "Mechanical Substitution for Quagmire Ratios, " JA58, The Cryptogram, American Cryptogram Association, 1958. [QUAa] TONTO, "More about Theory of Substitutions in Quagmire Ciphers," FM49, The Cryptogram, American Cryptogram Association, 1949. [QUAb] PHOENIX, "Quagmire Alphabet Merging and Ratios ," ND87, The Cryptogram, American Cryptogram Association, 1987. [QUAc] LEDGE, "Quagmire I and II Ciphers," SO73, The Cryptogram, American Cryptogram Association, 1973. [QUAd] LEDGE, "Quagmire III Ciphers," ND73, The Cryptogram, American Cryptogram Association, 1973. [QUAe] LEDGE, "Quagmire IV Ciphers," JF74, The Cryptogram, American Cryptogram Association, 1974. [QUAf] SCRYER, "Quagmire with Paper Strips," JF88, The Cryptogram, American Cryptogram Association, 1988. [QUAg] THE DOC, "Solution of Quagmire I without Tip," JA92, The Cryptogram, American Cryptogram Association, 1992. [QUAh] BOB O' LYNQUE, "Start on Quagmire Type III," FM54, The Cryptogram, American Cryptogram Association, 1954. [QUAi] TONTO, "Theory of Substitutions in Quagmire Ciphers," FM48, The Cryptogram, American Cryptogram Association, 1948. [QUAj] S-TUCK, "Symmetry of Letter Positions in Key Frame and recovery of the Keyword in Quagmire Type III Ciphers," ON43 The Cryptogram, American Cryptogram Association, 1943. [QUAk] S-TUCK, "Symmetry of Letter Positions Quagmire Frames ," ON50 The Cryptogram, American Cryptogram Association, 1950. [RA76] M. O. Rabin, "Probabilistic algorithms," in J. F. Traub, Ed., Algorithms and Complexity: New Directions and Recent Results, proceedings of a Symposium, Pittsburgh, PA, April 7-9, 1976, pp. 21-39. New York: Academic Press, 1976. [RA78] M. O. Rabin, "Digitalized signatures," in R. A. DeMillo, D. P. Dobkin, A. K. Jones, and R. J. Lipton, Eds., Foundations of Secure Computation, pp. 155-168. New York: Academic Press, 1978. [RA79] M. O. Rabin, "Digitalized signatures and public- key functions as intractable as factorization," MIT Laboratory for Computer Science, Technical Report LCS/TR-212, January 1979. [RA80] M. O. Rabin, "Probabilistic algorithms for testing primality," Journal of Number Theory, Vol. 12, 1980, pp. 128-138. [RA64] H. Rademacher, Lectures on Elementary Number Theory. New York: Blaisdell, 1964. [RAG1] PHOENIX, "Ragbaby Decipherment," ND84, SO85, JF86, The Cryptogram, American Cryptogram Association, 1984, 1985, 1986.1950. [RAG2] DR. CRYPTOGRAM, "Ragbaby Cipher,", JA55, The Cryptogram, American Cryptogram Association, 1955. [RAG3] LEDGE, "Ragbaby ," ND72, The Cryptogram, American Cryptogram Association, 1972. [RAG4] TEX TREMUS, "Ragbaby Redundancy," MJ92, The Cryptogram, American Cryptogram Association, 1992. [RAG5] FRINKUS, "Ragbaby Shaking Out," ND61, The Cryptogram, American Cryptogram Association, 1961. [RAG6] B. NATURAL, "Ragbaby-Without a Known Starting Point, " ND60, The Cryptogram, American Cryptogram Association, 1960. [RAG7] B.NATURAL, "Rag-baby Cipher," MJ59, The Cryptogram, American Cryptogram Association, 1959. [RAJ1] "Pattern and Non Pattern Words of 2 to 6 Letters," G & C. Merriam Co., Norman, OK. 1977. [RAJ2] "Pattern and Non Pattern Words of 7 to 8 Letters," G & C. Merriam Co., Norman, OK. 1980. [RAJ3] "Pattern and Non Pattern Words of 9 to 10 Letters," G & C. Merriam Co., Norman, OK. 1981. [RAJ4] "Non Pattern Words of 3 to 14 Letters," RAJA Books, Norman, OK. 1982. [RAJ5] "Pattern and Non Pattern Words of 10 Letters," G & C. Merriam Co., Norman, OK. 1982. [RAIL] MACHIAVELLI, "Railfence: Method of Solving," MA61, The Cryptogram, American Cryptogram Association, 1961. [RAI1] SNAIL PACE, "More Simplification in Solving the Railfence," JA84, The Cryptogram, American Cryptogram Association, 1984. [RAI2] FIDDLE, "Railfence: Calculus of," AM50, The Cryptogram, American Cryptogram Association, 1950. [RAI3] LEDGE, "Railfence," ND74, The Cryptogram, American Cryptogram Association, 1974. [RAI4] RIG R MORTIS, "Railfence, Sidelights of," JA59, The Cryptogram, American Cryptogram Association, 1959. [RAI5] TEEPEE, "Railfence, Solving a Normal," MA66, The Cryptogram, American Cryptogram Association, 1966. [RAI6] SNAIL PACE, "Simplification in Solving the Railfence," MA84, The Cryptogram, American Cryptogram Association, 1984. [RAND] Randolph, Boris, "Cryptofun," Aegean Park Press, 1981. [REDE] FRINKUS, "Redefence Cipher," JA65, The Cryptogram, American Cryptogram Association, 1965. [RED1] MACHIAVELLI, "Redefence Solving," MJ70, The Cryptogram, American Cryptogram Association, 1970. [RED2] SI SI, "Simplified Railfence and Redefence Construction and Solving," JF83, The Cryptogram, American Cryptogram Association, 1983. [RB1] Friedman, William F., The Riverbank Publications, Volume 1," Aegean Park Press, 1979. [RB2] Friedman, William F., The Riverbank Publications, Volume 2," Aegean Park Press, 1979. [RB3] Friedman, William F., The Riverbank Publications, Volume 3," Aegean Park Press, 1979. [RCMP] RCMP (1992). "Small Systems Security Guidelines". PW/GSC catalog #BT32-36/7-1992. ISBN 0-662-59297-2. ISSN 1188-6315. [RCM1] RCMP (1992). "Technical Security Standards for Information Technology (TSSIT)". PW/GSC catalog #BT32-36/6-1992. ISBN 0-662-59120-8. [REED] J. Reeds, `Cracking' a Random Number Generator. Cryptologia 1(1), 20--26, 1977. [REE1] J. A. Reeds and P. J. Weinberger, File Security and the UNIX Crypt Command. AT&T Bell Laboratories Technical Journal, Vol. 63 #8, part 2, 1673--1684, October, 1984. [REJE] Rejewski, Marian, "Mathematical Solution of the Enigma Cipher" published in vol 6, #1, Jan 1982 Cryptologia pp 1-37. [RELY] Relyea, Harold C., "Evolution and Organization of Intelligence Activities in the United States," Aegean Park Press, 1976. [RENA] Renauld, P. "La Machine a' chiffrer 'Enigma'", Bulletin Trimestriel de l'association des Amis de L'Ecole superieure de guerre no 78, 1978. [RHEE] Rhee, Man Young, "Cryptography and Secure Communications," McGraw Hill Co, 1994 [RIEB] Riebensehl, D., "Hyperbolische Komplex Raume und die Vermutung von Mordell," Math Ann. 257, (1981), 99-110. [RIVE] Rivest, Ron, "Ciphertext: The RSA Newsletter 1, 1993. [RI84] R. L. Rivest, "RSA chips (past/present/future)," in T. Beth, N. Cot, and I. Ingemarsson, Eds., Lecture Notes in Computer Science Vol. 209: Advances in Cryptology: proceedings of EUROCRYPT 84, a Workshop on the Theory and Application of Cryptographic Techniques, Paris, France, April 9- 11, 1984, pp. 159-165. Berlin/New York: Springer-Verlag, 1985. [RI90] R. L. Rivest, "The MD4 message digest algorithm," February 1990. [RIV1] Rivest, R. "The MD5 Message-Digest Algorithm", RFC1321, April 1992 [RI78] R. L. Rivest, A. Shamir, and L. Adleman, "A method for obtaining digital signatures and public-key cryptosystems," Communications of the ACM, Vol. 21, No. 2, February 1978, pp. 120- 127. [RI82] R. L. Rivest and A. T. Sherman, "Randomized encryption techniques," in D. Chaum, R. L. Rivest, and A. T. Sherman, Eds., Advances in Cryptology: Proceedings of CRYPTO 82, a Workshop on the Theory and Application of Cryptographic Techniques, Santa Barbara, CA, August 23-25, 1982, pp. 145-163. New York: Plenum Press, 1983. [RIV1] Rivest, Ron, Shamir, A and L. Adleman, "A Method for Obtaining Digital Signatures and Public Key Cryptosystems," Communications of the ACM 21, 1978. [Rive] Rivest, R., 1992, ``Responses to NIST's Proposal,'' Communications of the ACM, Vol. 35 (7), July 1992, pp. 41-47. [ROAC] Roach, T., "Hobbyist's Guide To COMINT Collection and Analysis," 1330 Copper Peak Lane, San Jose, Ca. 95120-4271, 1994. [ROBO] NYPHO, The Cryptogram, Dec 1940, Feb, 1941. [ROHE] Jurgen Rohwer's Comparative Analysis of Allied and Axis Radio-Intelligence in the Battle of the Atlantic, Proceedings of the 13th Military History Symposium, USAF Academy, 1988, pp 77-109. [ROHW] Rohwer Jurgen, "Critical Convoy Battles of March 1943," London, Ian Allan, 1977. [ROH1] Rohwer Jurgen, "Nachwort: Die Schlacht im Atlantik in der Historischen Forschung, Munchen: Bernard and Graefe, 1980. [ROH2] Rohwer Jurgen, et. al. , "Chronology of the War at Sea, Vol I, 1939-1942, London, Ian Allan, 1972. [ROH3] Rohwer Jurgen, "U-Boote, Eine Chronik in Bildern, Oldenburs, Stalling, 1962. Skizzen der 8 Phasen. [ROOM] Hyde, H. Montgomery, "Room 3603, The Story of British Intelligence Center in New York During World War II", New York, Farrar, Straus, 1963. [ROSE] Budge, E. A. Wallis, "The Rosetta Stone," British Museum Press, London, 1927. [ROSL] Rose, L. J. (1994). "NetLaw: Your Rights in the Online World". Osborne/McGraw-Hill (New York). ISBN 0-07-882077-4. xx + 372. Index. [ROSN] Rosenblatt, K. S. (1995). "High-Technology Crime: Investigating Cases Involving Computers". KSK Publications (P.O. Box 934, San Jose, CA 95108-0934; tel. 408-296-7072). 603 pp + diskette. [Ro89] Rotenberg, M., 1989, Testimony on Military and Security Control of Computer Security, Before the Subcommittee on Legislation and National Security of the House Committee on Government Operations, 101st Congress, 1st Session 80, May 4, 1989, Washington, DC. [Ro93] Rotenberg, M., 1993, ``Communications Privacy: Implications for Network Design,'' Communications of the ACM, Vol. 36 (8), August 1993, pp. 61- 68. [RSA] RSA Data Security, Inc., "Mailsafe: Public Key Encryption Software Users Manual, Version 5.0, Redwood City, CA, 1994 [RSA1] RSA Data Security, Inc. "Cryptographic Message Syntax Standard", PKCS-7, Nov 1, 1993. [RUEP] R. Rueppel, Design and Analysis of Stream Ciphers. Springer-Verlag, 1986. [RUNY] Runyan, T. J. and Jan M. Copes "To Die Gallently", Westview Press 1994, p85-86 ff. [RUSS] Russell, D. & G. T. Gangemi Sr (1991). "Computer Security Basics". O'Reilly & Assoc (Sebastopol, CA). ISBN 0-937175-71-4. xx + 448. Index. [RYP1] A B C, "Adventures in Cryptarithms (digital maze)," JA63, The Cryptogram, published by the American Cryptogram Association, 1963. [RYP2] CROTALUS "Analysis of the Classic Cryptarithm,"MA73, The Cryptogram, published by the American Cryptogram Association, 1973. [RYP3] CLEAR SKIES "Another Way To Solve Cryptarithms,"DJ44, The Cryptogram, published by the American Cryptogram Association, 1944. [RYP4] CROTALUS "Arithemetic in Other Bases (Duodecimal table),"JF74, The Cryptogram, published by the American Cryptogram Association, 1974. [RYP5] LEDGE, "Basic Patterns in Base Eleven and Twelve Arithmetic,"SO77, ND77, The Cryptogram, published by the American Cryptogram Association, 1977,1977. [RYP6] COMPUTER USER, "Computer Solution of Cryptarithms," JF72, The Cryptogram, published by the American Cryptogram Association, 1972. [RYP7] PIT, "Cryptarithm Crutch," JA80, The Cryptogram, published by the American Cryptogram Association, 1980. [RYP8] DENDAI, DICK, "Cryptarithm Ccub root," ND76, The Cryptogram, published by the American Cryptogram Association, 1976. [RYP9] S-TUCK, "Cryptarithm in Addition," AM44, The Cryptogram, published by the American Cryptogram Association, 1944. [RYPA] APEX DX, "Cryptarithm Line of Attack," ND91, The Cryptogram, published by the American Cryptogram Association, 1991. [RYPB] HUBBUBBER and CROTALUS, "Cryptarithm Observations," ND73, The Cryptogram, published by the American Cryptogram Association, 1973. [RYPC] CROTALUS, "Cryptarithms and Notation," JF73, The Cryptogram, published by the American Cryptogram Association, 1973. [RYPD] JUNKERL, "Cryptarithms: The digital root method," AS43, The Cryptogram, published by the American Cryptogram Association, 1943. [RYPE] CROTALUS, "Divisibility by Eleven," ND89, The Cryptogram, published by the American Cryptogram Association, 1989. [RYPF] S-TUCK, "Double Key Division," JJ43, The Cryptogram, published by the American Cryptogram Association, 1943. [RYPG] NEOTERIC, "Duo-Decimal Cryptarithms," AM40, The Cryptogram, published by the American Cryptogram Association, 1940. [RYPH] QUINTUPLEX, "Duo-Decimal Cryptarithms," JJ40, The Cryptogram, published by the American Cryptogram Association, 1940. [RYPI] FIDDLE, "Exhausitive for Three," JF59, The Cryptogram, published by the American Cryptogram Association, 1959. [RYPJ] ---, "Finding the Zero In Cryptarithms," DJ42, The Cryptogram, published by the American Cryptogram Association, 1942. [RYPK] FILM-D, "Greater than Less than Diagram for Cryptarithms," DJ51, The Cryptogram, published by the American Cryptogram Association, 1951. [RYPL] MI TI TI, "Introduction To Cryptarithms," SO63, The Cryptogram, published by the American Cryptogram Association, 1963. [RYPM] FORMALHUT, "Leading Digit Analysis in Cryptarithms," JA91, The Cryptogram, published by the American Cryptogram Association, 1991. [RYPN] CROTALUS, "Make Your Own Arithmetic Tables In Other Bases," MJ89, The Cryptogram, published by the American Cryptogram Association, 1989. [RYPO] BACEDI, "Method for Solving Cryptarithms," JF78, The Cryptogram, published by the American Cryptogram Association, 1978. [RYPP] SHERLAC, "More on Cryptarithms," DJ44, The Cryptogram, published by the American Cryptogram Association, 1944. [RYPQ] FIRE-O, "Multiplicative Structures," MJ70, The Cryptogram, published by the American Cryptogram Association, 1970. [RYPR] CROTALUS, "Solving A Division Cryptarithm," JA73, The Cryptogram, published by the American Cryptogram Association, 1973. [RYPS] CROTALUS, "Solving A Multiplication Cryptarithm," MJ73, The Cryptogram, published by the American Cryptogram Association, 1973. [RYPT] PHOENIX, "Some thoughts on Solving Cryptarithms," SO87, The Cryptogram, published by the American Cryptogram Association, 1987. [RYPU] CROTALUS, "Square Root Cryptarithms," SO73, The Cryptogram, published by the American Cryptogram Association, 1973. [RYPV] FIDDLE, "Theory of Duplicated Digital Figures," JJ53, The Cryptogram, published by the American Cryptogram Association, 1953. [RYPW] FIDDLE, "Theory of Three Unlike Digital Figures," AS52, The Cryptogram, published by the American Cryptogram Association, 1952. [RYPX] CROTALUS, "Unidecimal Tables," MJ73, The Cryptogram, published by the American Cryptogram Association, 1973. [RYSK] Norbert Ryska and Siegfried Herda, "Kryptographische Verfahren in der Datenverarbeitung," Gesellschaft fur Informatik, Berlin, Springer-Verlag1980. [SADL] Sadler, A. L., "The Code of the Samurai," Rutland and Tokyo: Charles E. Tuttle Co., 1969. [SACC] Sacco, Generale Luigi, " Manuale di Crittografia", 3rd ed., Rome, 1947. [SALE] Salewski, Michael, "Die Deutscher Seekriegsleitung, 1938- 1945, Frankfurt/Main: Bernard and Graefe, 1970-1974. 3 volumes. [SALO] A. Saloma, Public-key cryptography. Springer- Verlag, 1990. [SANB] Sanbohonbu, ed., "Sanbohonbu kotokan shokuinhyo." NIDS Archives. [SAPR] Sapir, E., "Conceptual Categories in Primitive Language," Science: 74: 578-584., 1931. [SAFF] Safford, L.F. (1943) History of Invention And Development of the Mark II ECM (Electric Cipher Machine) available from NARA. SRH-360 in RG 0457: NSA/CSS Finding Aid A1, 9020 US Navy Records Relating to Cryptology 1918- 1950 Stack 190 Begin Loc 36/12/04 Location 1-19. In Feb 1996 the version at NARA was redacted, but the full document is now declassified. [SAS-] Descriptions of the the Authentication Systems may be found in: Survey Of Authentication Systems 1942-45 (1945), NARA; NSA Historical Collections 190/37/7/1, NR 3526 CBRK24 12960A 19420728. [SFUS] Submarine Force U.S. Pacific Fleet (1944) Cryptographic Aids Check-Off List: available from NARA, Pacific Sierra Regional Archive, 181-58- 3201, S1313, S372, A6-3/N36 Cryptographic Aids. [SASS] Sassoons, George, "Radio Hackers Code Book", Duckworth, London, 1986. [SAWI] Sawicki, E. (1992). "LAN Desktop Guide to Security, Netware Edition". SAMS (Div. of Prentice-Hall, Carmel, IN). ISBN 0-672-30085-0. xxix + 351. Index. [SCHN] Schneier, Bruce, "Applied Cryptography: Protocols, Algorithms, and Source Code C," John Wiley and Sons, 1994. [SCH2] Schneier, Bruce, "Applied Cryptography: Protocols, Algorithms, and Source Code C," 2nd ed., John Wiley and Sons, 1995. [SCHU] Schuh, fred, "Master Book of Mathematical Recreation," Dover, 1968. [SCHB] Schwab, Charles, "The Equalizer," Charles Schwab, San Francisco, 1994. [Sc89] Schnorr, C., Procedures for the Identification of Participants as well as the Generation and Verification of Electronic Signatures in a Digital Exchange System, German Patent Number 9010348.1, patent applied for February 24, 1989, patent received August 29, 1990. [Sc90] Schnorr, C., 1989, ``Efficient Identification and Signatures for Smart Cards,'' Advances in Cryptology --Crypto '89, Springer-Verlag, New York, 1990, pp. 239-251. [Sc9b] Schnorr, C., Method for Identifying Subscribers and for Generating and Verifying Electronic Signatures in a Data Exchange System, U.S. Patent Number 4995082, patent applied for February 23, 1990, patent received February 19, 1991. [SCHW] Schwartau, W. (1991). "Terminal Compromise" (novel). Inter.Pact Press (Seminole, FL). ISBN 0-962-87000-5. 562 pp. [SCH1] Schwartau, W. (1994). "Information Warfare: Chaos on the Electronic Superhighway". Thunder's Mouth Press (New York). ISBN 1-56025-080-1. 432 pp. Index. [SCH2] Schwartau, W. (1997). "Information Warfare" 2nd Edition. Thunder's Mouth Press (New York). 600 pp. Index. [SC82] B. P. Schanning, "Applying public key distribution to local area networks," Computers & Security, Vol. 1, No. 3, November 1982, pp. 268- 274. [SC80] B. P. Schanning, S. A. Powers, and J. Kowalchuk, "MEMO: privacy and authentication for the automated office," in proceedings of the 5th Conference on Local Computer Networks, Minneapolis, MN, October 6-7, 1980, pp. 21-30. Silver Spring, MD: IEEE Computer Society Press, 1980. [SC84] C. P. Schnorr and H. W. Lenstra, Jr., "A Monte Carlo factoring algorithm with linear storage," Mathematics of Computation, Vol. 43, No. 167, July 1984, pp. 289-311. [SE87] H. Sedlak, "The RSA Cryptography Processor," in D. Chaum and W. L. Price, Eds., Lecture Notes in Computer Science Vol. 304: Advances in Cryptology - EUROCRYPT '87, a Workshop on the Theory and Applications of Cryptographic Techniques, Amsterdam, The Netherlands, April 13- 15, 1987, pp. 95-105. Berlin/New York: Springer- Verlag, 1988. [SE85] C. L. Seitz, "The Cosmic Cube," Communications of the ACM, Vol. 28, No. 1, January 1985, pp. 22-33. [SEBE] Seberry, Jennifer and Joseph Pieprzyk, "Cryptography: An Introduction to Computer Security," Prentice Hall, 1989. [CAREFUL! Lots of Errors - Basic research efforts may be flawed - see Appendix A pg 307 for example.] [SHIM] Shimomura, T. & J. Markoff (1996). "Takedown: The Pursuit and Capture of Kevin Mitnick, America's Most Wanted Computer Outlaw--by the Man Who Did It". Hyperion (New York). ISBN 0-7868- 6210-6. xii + 324. Index. [SHAF] Shafi Goldwasser, Silvio Micali, Probabilistic Encryption and How To Play Mental Poker Keeping Secret All Partial Information. Proceedings of the Fourteenth Annual ACM Symposium on Theory of Computing, 1982. [SHAN] Shannon, C. E., "The Communication Theory of Secrecy Systems," Bell System Technical Journal, Vol 28 (October 1949). [SHAN] C. Shannon, Communication Theory of Secrecy Systems. Bell System Technical Journal 28(4), 656--715, 1949. [SHEM] B. Kaliski, R. Rivest, A. Sherman, Is the Data Encryption Standard a Group. Journal of Cryptology, vol. 1, #1, 1--36, 1988. [SHIM] A. Shimizu, S. Miyaguchi, Fast data encipherment algorithm FEAL. EUROCRYPT '87, 267--278, 1988. [SHIN] Shinsaku Tamura, "Myohin kosaku," San'ei Shuppansha, Toyko, 1953. [SHOR] Shorey, T. N., et al., "Applications of the Gel'fond-Baker method to Diophantine equations, Transcendence Theory; Advances and Applications," Academic Press, 1977. [SHUL] Shulman, David, "An Annotated Bibliography of Cryptography," Garland Publishing, New York, 1976. [SHUS] Shulsky, A. N., "Silent Warfare: Understanding The World of Intelligence", Brassey's (US),New York, 1991. [SHIR] K. Shirriff, C. Welch, A. Kinsman, Decoding a VCR Controller Code. Cryptologia 16(3), 227--234, 1992. [SHTP] E. Rescorla, E., and A. Schiffman, INTERNET- DRAFT, "The Secure HyperText Transfer Protocol," Enterprise Integration Technologies, December 1994 [SH79] A. Shamir, "On the cryptocomplexity of knapsack systems," in proceedings of the Eleventh Annual ACM Symposium on Theory of Computing, Atlanta, GA, April 30 -May 2, 1979, pp. 118-129. New York: ACM, 1979. [SH84] A. Shamir, "Identity-based cryptosystems and signature schemes," in G. R. Blakley and D. Chaum, Eds., Lecture Notes in Computer Science Vol. 196: Advances in Cryptology: Proceedings of CRYPTO 84, a Workshop on the Theory and Application of Cryptographic Techniques, Santa Barbara, CA, August 19-22, 1984, pp. 47-53. Berlin/New York: Springer-Verlag, 1985. [S84a] A. Shamir, "A polynomial-time algorithm for breaking the basic Merkle-Hellman cryptosystem," IEEE Transactions on Information Theory, Vol. IT- 30, No. 5, September 1984, pp. 699-704. [SH90] M. Shand, P. Bertin, and J. Vuillemin, "Hardware speedups in long integer multiplication," presented at the Second ACM Symposium on Parallel Algorithms and Architectures, Crete, July 2- 6, 1990. [Silv] Silverman v. United States, 365 U.S. 505, 1961. [SI90] "Number field sieve produces factoring breakthrough," SIAM News, Vol. 23, No. 4, July 1990. [SI87] R. D. Silverman, "The multiple polynomial quadratic sieve," Mathematics of Computation, Vol. 48, No. 177, January 1987, pp. 329-339. [SI79] G. J. Simmons, "Symmetric and asymmetric encryption," ACM Computing Surveys, Vol. 11, No. 4, December 1979, pp. 305-330. [SI88] G. J. Simmons, "How to ensure that data acquired to verify treaty compliance are trustworthy," Proceedings of the IEEE, Vol. 76, No. 5, May 1988, pp. 621-627. [SIMM] G. Simmons (ed.), Contemporary Cryptology: the Science of Information Integrity. IEEE press, 1991.10.4. Reference articles [SIC1] S.I. Course in Cryptanalysis, Volume I, June 1942, Aegean Park Press, Laguna Hills , CA. 1989. [SIC2] S.I. Course in Cryptanalysis, Volume II, June 1942, Aegean Park Press, Laguna Hills , CA. 1989. [SIG1] "International Code Of Signals For Visual, Sound, and Radio Communications," Defense Mapping Agency, Hydrographic/Topographic Center, United States Ed. Revised 1981 [SIG2] "International Code Of Signals For Visual, Sound, and Radio Communications," U. S. Naval Oceanographic Office, United States Ed., Pub. 102, 1969. [SIMM] Simmons, G. J., "How To Insure that Data Acquired to Verify Treaty Compliance are Trustworthy, " in "Authentication without secrecy: A secure communications problem uniquely solvable by asymmetric encryption techniques.", IEEE EASCON 79, Washington, 1979, pp. 661-62. [SINK] Sinkov, Abraham, "Elementary Cryptanalysis", The Mathematical Association of America, NYU, 1966. [SLAT] Slatalla, M. & J. Quittner (1995). "Masters of Deception: The Gang that Ruled Cyberspace". HarperCollins (New York). ISBN 0-06-017030-1. 225 pp. [SmBr] Smid, M. and Branstad, D., 1988, ``The Data Encryption Standard: Past and Future,''Proceedings of the IEEE}, Vol. 76 (5), pp. 550-559, May, 1988. [SM81] M. E. Smid, "Integrating the data encryption standard into computer networks," IEEE Transactions on Computers, Vol. COM-29, No. 6, June 1981, pp. 762-772. [SM88] M. E. Smid and D. K. Branstad, "The Data Encryption Standard: past and future," Proceedings of the IEEE, Vol. 76, No. 5, May 1988, pp. 550-559. [SMIH] Smith, David E., "John Wallis as Cryptographer", Bulletin of American Mathematical Society, XXIV, 1917. [SMIT] Smith, Laurence D., "Cryptography, the Science of Secret Writing," Dover, NY, 1943. [SMIV] Smith, G. (1994). "The Virus Creation Labs: A Journey into the Underground". American Eagle Publications (Tucson, AZ). ISBN 0-929408-09-8. 172 pp. [SO85] Salomaa, "Cryptography," in A. Salomaa, Encyclopedia of Mathematics and its Applications Vol. 25: Computation and Automata, pp. 186-230. Cambridge, UK: Cambridge University Press, 1985. [SOLS] Solms, Von S., and D. Naccache, "On Blind Signatures and Perfect Crimes," Computers and Security vol. 11, no. 6 (October 1992): 581- 583. [SOLZ] Solzhenitsyn, Aleksandr I. , "The Gulag Archipelago I-III, " Harper and Row, New York, N.Y., 1975. [SORK] A. Sorkin, LUCIFER: a cryptographic algorithm. Cryptologia, 8(1), 22--35, 1984. [SO77] R. Solovay and V. Strassen, "A fast Monte-Carlo test for primality," SIAM Journal on Computing, Vol. 6, No. 1, March 1977, pp. 84-85. Erratum: Ibid., Vol. 7, No. 1, February 1978, p. 118. [SPAN] Barker, Wayne G. "Cryptograms in Spanish," Aegean Park Press, Laguna Hills, CA., 1986. [SPIL] R. Spillman et al., Use of Genetic Algorithms in Cryptanalysis of Simple Substitution Ciphers. Cryptologia 17(1), 31--44, 1993. [SP94] Software Publishers Association, Trusted Information Systems and Hoffman Business Associates, 1994, Encryption Products Database Statistics, March 1994. [SP93] Software Publishers Association, 1993,Foreign Text, File, Data Encryption Programs and Products Identified by the SPA, October 9, 1993. [SSSC] System Security Study Committee, 1991 Computers at Risk: Safe Computing in the Information Age, National Academy Press, 1991. [ST86] L. K. Steiner, "The ETA-10 supercomputer system," in Proceedings of the 1986 IEEE International Conference on Computer Design, Port Chester, NY, October 6-9, p. 42. Washington, DC: IEEE Computer Society Press, 1986. [STAL] Stallings, William, "Protect Your Privacy: A Guide for PGP Users," Prentice Hall PTR, 1995. [STA1] Stallings, W. (1995). "Network and Internetwork Security: Principles and Practice". Prentice Hall (Englewood Cliffs, NJ). ISBN 0-02-415483-0. xiii + 462. Index. [STAN] Stang, D. J. & S. Moon (1993). "Network Security Secrets". IDG Books Worldwide Inc. (San Mateo, CA). ISBN 1-56884-021-7. xxxiii + 1166. Index. [STER] Sterling, B. (1992). "The Hacker Crackdown: Law and Disorder on the Electronic Frontier". Bantam Doubleday Dell (New York). ISBN 0-553-08058-X. xiv + 328. Index. [STEV] Stevenson, William, 'A Man Called INTREPID', Macmillan, London 1976. [STEW] Stewart, "C. L., On some Diophantine Equations and Related Linear Recurrence Sequences." Univ. of Waterloo, Ontario, Canada. 1980. [STIN] Stinson, D. R., "Cryptography, Theory and Practice," CRC Press, London, 1995. [STIX] Stix, F., Zur Geschicte und Organisation der Wiener Geheimen Ziffernkanzlei, Mitteilungen des Osterreichischen Instituts fir Geschichtsforschung, LI 1937. [STOL] Stoll, C. (1989). "The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage". Pocket Books (Simon & Schuster, New York). ISBN 0-671-72688-9. viii + 356. [STUR] Sturtevant, E. H. and Bechtel, G., "A Hittite Chrestomathy," Linguistic Society of American and University of Pennsylvania, Philadelphia, 1935. [SURV] Austin, Richard B.,Chairman, "Standards Relating To Electronic Surveillance," American Bar Association Project On Minimum Standards For Criminal Justice, Tentative Draft, June, 1968. [SUVO] Suvorov, Viktor "Inside Soviet Military Intelligence," Berkley Press, New York, 1985. [TA81] A. S. Tanenbaum, Computer Networks. Englewood Cliffs, NJ: Prentice-Hall, 1981. [TERR] Terrett, D., "The Signal Corps: The Emergency (to December 1941); G. R. Thompson, et. al, The Test( December 1941 - July 1943); D. Harris and G. Thompson, The Outcome;(Mid 1943 to 1945), Department of the Army, Office of the Chief of Military History, USGPO, Washington,1956 -1966. [THEO] Theodore White and Annalee Jacoby, "Thunder Out Of China," William Sloane Assoc., New York, 1946. [THE1] Marie-Jose Bertin, ed.:Seminaire de Theorie des Nombres, Paris 1980-81. [THE2] Catherine Goldstein, ed.: Serge Lang {in FRENCH}: Seminaire de Theorie des Nombres, Paris 1984-85, [THOM] Thompson, Ken, "Reflections on Trusting Trust," Communications of the ACM 27, 1984. [TIII] Title III of the Omnibus Crime Control and Safe Streets Act, 18 U.S.C. Sec. 2510 , et seq. [TIJD] Tijdeman, R., "Exponential Diophantine Equations" Proc. Intern. Congress Math., Helsinki (1978) p381-387. [TILD] Glover, D. Beaird, Secret Ciphers of The 1876 Presidential Election, Aegean Park Press, Laguna Hills, Ca. 1991. [TM32] TM 32-250, Fundamentals of Traffic Analysis (Radio Telegraph) Department of the Army, 1948. [TORR] Torrieri, Don J., "Principles of Military Communication Systems," Artech, 1981. [TRAD] U. S. Army Military History Institute, "Traditions of The Signal Corps., Washington, D.C., USGPO, 1959. [TRAN] SI SI, "Analysis of the Skipping Tramp Cipher - Part 1," MA80, The Cryptogram, published by the American Cryptogram Association, 1980. [TRA1] SI SI, "Analysis of the Skipping Tramp Cipher - Part 2," MJ80, The Cryptogram, published by the American Cryptogram Association, 1980. [TRA2] PICCOLA, "Another method for Finding Key-Length for Columnar Transposition," AS39, The Cryptogram, published by the American Cryptogram Association, 1939. [TRA3] PICCOLA, "Columnar Transposition - Random Approach," ON39, The Cryptogram, published by the American Cryptogram Association, 1939. [TRA4] PHOENIX, "Complete Columnar Transpositon," MJ86, The Cryptogram, published by the American Cryptogram Association, 1986. [TRA5] PHOENIX, "Complete Columnar Transpositon," JA86, The Cryptogram, published by the American Cryptogram Association, 1986. [TRA6] PHOENIX, "CRUX Columnar Transpositon," SO86, The Cryptogram, published by the American Cryptogram Association, 1986. [TRA7] PHOENIX, "Incomplete Columnar Transpositon: Crib Breaking," MA87, The Cryptogram, published by the American Cryptogram Association, 1987. [TRA8] PHOENIX, "Incomplete Columnar Transpositon- Revisited," SO87, The Cryptogram, published by the American Cryptogram Association, 1987. [TRA9] PHOENIX, "Incomplete Columnar Transpositon," ND86, The Cryptogram, published by the American Cryptogram Association, 1986. [TRA0] PHOENIX, "Incomplete Columnar Transpositon," JF87, The Cryptogram, published by the American Cryptogram Association, 1987. [TRAa] PHOENIX, "Incomplete Columnar Transpositon," MJ87, The Cryptogram, published by the American Cryptogram Association, 1987. [TRAb] SI SI, "Dissociative Coding" JA81, The Cryptogram, published by the American Cryptogram Association, 1981. [TRAc] SI SI, "Double Transposition," MA87, The Cryptogram, published by the American Cryptogram Association, 1987. [TRAd] NEOTERIC, "Geometric Forms for Transpositon," AS41, The Cryptogram, published by the American Cryptogram Association, 1941. [TRAe] TRYIT, "Observations about Transpositions," JJ41, AS41 The Cryptogram, published by the American Cryptogram Association, 1941. [TRAf] ___, "Patterns of Route Transpositions," AM53, The Cryptogram, published by the American Cryptogram Association, 1953. [TRAg] AB STRUSE, "Penny Tramp Cipher,"SO79, The Cryptogram, published by the American Cryptogram Association, 1979. [TRAh] SI SI, "Penny Tramp Cipher," JF80, The Cryptogram, published by the American Cryptogram Association, 1980. [TRAi] TATTERS, "Skipping Tramp Cipher," JF80, The Cryptogram, published by the American Cryptogram Association, 1980. [TRAj] TATTERS, "Skipping Tramp Cipher," MA80, The Cryptogram, published by the American Cryptogram Association, 1980. [TRAk] GUNG HO, "Solving the Complete Columnar Single Transposition Cryptogram, Succeed Every Time!," SO88, The Cryptogram, published by the American Cryptogram Association, 1988. [TRAl] DAN SURR, "Solving the skipping Tramp Cipher," MJ80, The Cryptogram, published by the American Cryptogram Association, 1980. [TRAm] SI SI, "Transpositon Algorithms and Equivalent Linear Permutations," JA87, The Cryptogram, published by the American Cryptogram Association, 1987. [TRAn] GENIAL, "Transposition Ciphers with Identical Plain Text Ends," FM40, AM40, The Cryptogram, published by the American Cryptogram Association, 1940. [TRAo] SCRYER, "Tromping the Penny Tramp Cipher," JF80, The Cryptogram, published by the American Cryptogram Association, 1980. [TRAj] GUNG HO, "Validating the Solution of a Single Columnar Double Transposition Cryptogram, " ND88, The Cryptogram, published by the American Cryptogram Association, 1988. [TRIB] Anonymous, New York Tribune, Extra No. 44, "The Cipher Dispatches, New York, 1879. [TRIT] Trithemius:Paul Chacornac, "Grandeur et Adversite de Jean Tritheme ,Paris: Editions Traditionelles, 1963. [TUCK] Harris, Frances A., "Solving Simple Substitution Ciphers," ACA, 1959. [Tuer] Tuerkheimer, F., 1993, ``The Underpinnings of Privacy Protection,'' Communications of the ACM, Vol. 36 (8), August 1993, pp. 69-73. [TUKK] Tuckerman, B., "A Study of The Vigenere-Vernam Single and Multiple Loop Enciphering Systems," IBM Report RC2879, Thomas J. Watson Research Center, Yorktown Heights, N.Y. 1970. [TURB] Turnbull, H. W., The Great Mathematicians, New York: NYU Press, 1961. [TURN] Turn, Rein, "Advances in Computer Security," Artec House, New York, 1982. [Original papers on Public Key Cryptography, RSA, DES] [UBAL] Ubaldino Mori Ubaldini, "I Sommergibili begli Oceani: La Marina Italian nella Seconda Guerra Mondiale," vol XII, Roma, Ufficio Storico della Marina Militare, 1963. [UDoT] U.S. Department of Treasury, 1985, Criteria and Procedures for Testing, Evaluating, and Certifying Message Authentication Devices for Electronic Funds Transfer Use, May, 1, 1985, Washington, DC. [USAA] U. S. Army, Office of Chief Signal Officer, "Instructions for Using the Cipher Device Type M- 94, February, 1922," USGPO, Washington, 1922. [USAH] Gilbert, James L. and John P. Finnegan, Eds. "U. S. Army Signals Intelligence in World War II: A Documentary History," Center of Military History, United States Army, Washington, D.C. 1993 [USC] U.S. Congress, Office of Technology Assessment, 1987, Defending Secrets, Sharing Data: New Locks and Keys for Electronic Information, OTA-CIT-310, Washington, D.C: Government Printing Office, October, 1987, Washington, DC. [USDJ] United States. Dept. of Justice. Authorization Procedures For Release Of Encryption Key Components. Washington, DC: N.p., 4Feb. 1994. USENET: alt.privacy.clipper. [USGA] United States General Accounting Office, 1992, ``Advanced Communications Technologies Pose Wiretapping Challenges,' Briefing Report to the Chairman, Subcommittee on Telecommunications and Finance, Committee on Energy and Commerce, House of Representatives, July 1992, Washington, DC. [USHR] House Report 100-153, 1987, Part 2, the Committee on Government Operations' Report on the Computer Security Act of 1987, Washington, DC. [US92] Hearing before the House Judiciary Subcommittee on Economic and Commercial Law, May 7, 1992, Washington, DC. [USNA] US Naval Administration in WW II, History of Naval Communications, 1939-1945. Op-20A-asz, A12, Serial 00362P20, 7 Apr 1948. available from the Naval Historical Center; WW II Command File CNO; Communications History; Microfiche No. F3561. [USS] United States Senate, 1974, Final Report of the Select Committee to Study Governmental Operations with respect to Intelligence Activities, April, 26, 1974, Washington, DC. [USSF] "U.S. Special Forces Operational Techniques," FM 31-20, Headquarters Department Of The Army, December 1965. [US4] United States. Fourth Amendment, ftp.eff.org file. [USTF] ------. Testimony. Subcommittee on Economic Policy, Trade and Environment Committee on Foreign Affairs U.S. House of Representatives. Washington DC, 12 Oct. 1993. ftp.eff.org file. [USOT] "U.S. Special Forces Recon Manual," Elite Unit Tactical Series, Lancer, Militaria, Sims, ARK. 71969, 1982. [VACC] Vacca, John, "Internet Security Secrets," IDG Books, New York, 1996. [VAIL] Vaille, Euggene, Le Cabinet Noir, Paris Presses Universitaires de Frances, 1950. [VALE] Valerio, "De La Cryptographie," Journal des Scienses militares, 9th series, Dec 1892 - May 1895, Paris. [VAND] Van de Rhoer, E., "Deadly Magic: A personal Account of Communications Intilligence in WWII in the Pacific, New York, Scriber, 1978. [VARI] ----,"Varietes Hyperboliques et Analyse Diophantienne," Univ of California, Berkley, 1986. [VERN] Vernam, A. S., "Cipher Printing Telegraph Systems For Secret Wire and Radio Telegraphic Communications," J. of the IEEE, Vol 45, 109-115 (1926). [VIAR] de Viaris in Genie Civil: "Cryptographie", Publications du Journal Le Genie Civil, 1888. [VIA1] de Viaris, "L'art de chiffre et dechiffre les depeches secretes," Gauthier-Villars, Paris, 1893. [VIGE] BASSETT, "Vigenere:Auto-encipherment, Letter Frequencies ," MJ70, The Cryptogram, published by the American Cryptogram Association, 1970. [VIG1] SI SI, "Vigenere:Comparative Analysis of the Vigenere, beaufort, and variant Ciphers," JA80, The Cryptogram, American Cryptogram Association, 1980. [VIG2] SAI CHESS, "Discard your old Vigenere Charts and Strips," AS51, The Cryptogram, the American Cryptogram Association, 1951. [VIG3] LEDGE, "Vigenere:Fundamentals," ND71, The Cryptogram, American Cryptogram Association, 1971. [VIG4] AB STRUSE, "Half-Vigenere Cipher," MA69, The Cryptogram, published by the American Cryptogram Association, 1969. [VIG5] S-TUCK, "Introduction to the Vigenere Family," JJ44, The Cryptogram, American Cryptogram Association, 1944. [VIG6] EDNASANDE, "Vigenere:Making a Cipher Disk," SO79, The Cryptogram, American Cryptogram Association, 1979. [VIG7] X.GOTKY, "Short Cuts for Lining Up the Alphabets in the Vigenere Family Type Ciphers," JJ47, The Cryptogram, American Cryptogram Association, 1947. [VIG8] CONTRACTUS, "Sigma Test for Keyword Letters in the Vigenere," FM43, The Cryptogram, published by the American Cryptogram Association, 1943. [VIG9] PICCOLA, "Solving a Vigenere," AM35, The Cryptogram, American Cryptogram Association, 1935. [VIG0] S-TUCK, "Solving a Vigenere," FM45, The Cryptogram, American Cryptogram Association, 1945. [VIGa] TRYIT, "Solving Vigeneres by Trigram Method," JJ43, The Cryptogram, American Cryptogram Association, 1943. [VIGb] KOHOP, "Procedure for Solving Vigenere Type of Periodic in an Unknown Language with Non-Roman Alphabet," MA55, The Cryptogram, American Cryptogram Association, 1955. [VIGc] PICCOLA, "Vigenere Cipher," FM35, The Cryptogram, American Cryptogram Association, 1935. [VIGd] LEDGE, "Vigenere Family ," JF72, The Cryptogram, American Cryptogram Association, 1972. [VIGe] TONTO, "Vigenere Family ," JJ54, The Cryptogram, American Cryptogram Association, 1954. [VIGf] S-TUCK, "Vigenere Family ," FM46, The Cryptogram, American Cryptogram Association, 1946. [VIGg] LEDGE, "Vigenere, Variant, Beaufort, and Grionsfield Ciphers," JA87, The Cryptogram, American Cryptogram Association, 1987. [VIGd] PICCOLA, "Vigenere with Running Key," ON36, The Cryptogram, American Cryptogram Association, 1936. [VOGE] Vogel, Donald S., "Inside a KGB Cipher," Cryptologia, Vol XIV, Number 1, January 1990. [VN] "Essential Matters - History of the Cryptographic Branch of the Peoples Army of Viet-Nam, 1945 - 1975," U.S. Cryptological History Series, Series V, NSA CSS, CH-E32-94-02, 1994. [WA84] N. R. Wagner and M. R. Magyarik, "A public-key cryptosystem based on the word problem," in G. R. Blakley and D. Chaum, Eds., Lecture Notes in Computer Science Vol. 196: Advances in Cryptology - Proceedings of CRYPTO 84, a Workshop on the Theory and Applications of Cryptographic Techniques, Santa Barbara, CA, August 19-22, 1984, pp. 19-36. Berlin/New York: Springer- Verlag, 1985. [WA85] C. C. Wang, T. K. Truong, H. M. Shao, L. J. Deutsch, J. K. Omura, and I. S. Reed, "VLSI architectures for computing multiplications and inverses in GF(2m)," IEEE Transactions on Computers, Vol. C-34, No. 8, August 1985, pp. 709-717. [WDO ] War Department Office of The Chief Signal Officer (1941) Operating Instructions for Converter M- 134-C (short title: SIGBWJ) [WDO1] War Department Office of The Chief Signal Officer (1941) Operating Instructions for Converter M- 134-C (short title: SIGLVC) Department of the Army (1941) Crypto-Operating Instructions for Converter M-134-C (short title: SIGQZF) [WDM1] War Department (1942) Maintenance Instructions for Converter M-134-C (short title: SIGKKK) [WDM2] War Department (1945) Maintenance Instructions for Converter M-134-C (short title: SIGKKK-2) SIGQZF, SIGBWJ, SIGLVC, SIGKKK, SIGKKK-2 are available from NARA; NSA Historical Collections 190/37/7/1, NR 2292 CBLL36 10622A 19410300. [WDG1] War Department (1945) General Instructions For Converter M-134-C (short title: SIGBRE-1) available from NARA; NSA Historical Collections 190/37/7/1, NR 4588 ZEMA35 13909A 19450600 [WAL0] "Arithimetica Infinitorium" and Opera mathematica (Oxoniae, 1699), III 674,687,688,693 and 695 give solutions to nomenclators based on pre-calculus theory. Wallis' "Letter-Book" gives some of his important papers (Smith op cit, p32, p499) [WALL] Walling, V. C., Jr., D. B. Parker, and C. C. Wood, "Impacts of Federal Policy Options for Nonmilitary Cryptography," SRI International Research Report 32, April 1981, Menlo Park, CA. [WALL] Wallis, John, "A Collection of Letters and other Papers in Cipher" , Oxford University, Bodleian Library, 1653. [WAL1] Wallace, Robert W. Pattern Words: Ten Letters and Eleven Letters in Length, Aegean Park Press, Laguna Hills, CA 92654, 1993. [WAL2] Wallace, Robert W. Pattern Words: Twelve Letters and Greater in Length, Aegean Park Press, Laguna Hills, CA 92654, 1993. [Walk] Walker, S., 1993, Testimony for Subcommitte on Economic Policy, Trade and Environment, Committee on Foreign Affairs, U.S. House of Representatives, October 12, 1993, Washington, DC. [WARN] "Warner Amendment" systems (10 U.S.C. 2315 and 44 U.S.C. 3502[2]) applies to digital signatures. [WATS] Watson, R. W. Seton-, ed, "The Abbot Trithemius," in Tudor Studies, Longmans and Green, London, 1924. [WAY] Way, Peter, "Codes and Ciphers," Crecent Books, 1976. [WAYN] Wayner, P, Statement in "Cryptographic Issue Statements Submitted to the Computer System Security and Privacy Advisory Board," by NIST, 27 May 1993, pp. 13-17. [WEBE] Weber, Ralph Edward, "United States Diplomatic Codes and Ciphers, 1175-1938, Chicago, Precedent Publishing, 1979. [WEIS] Weissman, C., 'A national debate on encryption exportability,' Communications of the ACM vol. 34, no. 10 (October, 1991): 162. [WELH] D. Welsh, Codes and Cryptography. Claredon Press, 1988. [WELS] Welsh, Dominic, "Codes and Cryptography," Oxford Science Publications, New York, 1993. [WELC] Welchman, Gordon, 'The Hut Six Story', McGraw- Hill, New York 1982. [WELS] Welsh, Dominic, "Codes and Cryptography," Oxford Science Publications, New York, 1993. [WHIT] Whiteside, T. (1978). "Computer Capers: Tales of Electronic Thievery, Embezzlement and Fraud." Mentor Executive Library published by The New American Library (New York). ISBN 0-145-62080-1. [WHOR] Whorf, B. L., "A Linguistic Consideration of Thinking In Primitive Communities," In Language, Thought, and Reality: Selected Writings of Benjamin Lee Whorf, ed. J. B. Carroll, Cambridge, MA: MIT Press, pp. 65-86., 1956. [Wie] Wiener, M., 1993, ``Efficient DES Key Search,'' presentation at Rump Session of Crypto (August, 1993), Santa Barbara, CA. Available as TR-244, School of Computer Science, Carleton University, Ottawa, Canada, May 1994. [WI68] M. V. Wilkes, Time-Sharing Computer Systems. New York: Elsevier, 1968. [WI80] H. C. Williams, "A modification of the RSA public-key encryption procedure," IEEE Transactions on Information Theory, Vol. IT-26, No. 6, November 1980, pp. 726-729. [WI87] H. C. Williams and M. C. Wunderlich, "On the parallel generation of the residues for the continued fraction factoring algorithm," Mathematics of Computation, Vol. 48, No. 177, January 1987, pp. 405-423. [WIGG] Wiggins, R. W. (1995). "The Internet for everyone: A guide for users and providers". J. Ranade Workstation Series (McGraw-Hill, New York). ISBN 0-07-067019-6. xvi + 655. Index. [WILL] Williams, Eugenia, "An Invitation to Cryptograms," Simon and Schuster, 1959. [WIL1] Williams, P., OSISEC Introduction and Overview, University College, London, 15 April 1993. [WILD] Wildman, Ted, "The Expendables," Clearwater Pub., 1983 [WINJ] Winton, J., " Ultra at Sea: How Breaking the Nazi Code Affected Allied Naval Strategy During WWII," New York, William Morror, 1988. [WINK] Winkle, Rip Van, "Hungarian: The Cryptogram,", March -April 1956. [WINF] Winterbotham, F.W., 'The Ultra Secret', Weidenfeld and Nicolson, London 1974. [WINR] Winter, Jack, "Solving Cryptarithms," ACA, 1984. [WOLE] Wolfe, Ramond W., "Secret Writing," McGraw Hill Books, NY, 1970. [WOLF] Wolfe, Jack M., " A First Course in Cryptanalysis," Brooklin College Press, NY, 1943. [WOOD] Wood, C. C. (1994). "Information Security Policies Made Easy: A Comprehensive Set of Information Security Policies". Version 4. BASELINE Software (Sausalito, CA). ISBN 1- 881585-01-8. 109 pp. Diskette available. [WRIX] Wrixon, Fred B. "Codes, Ciphers and Secret Languages," Crown Publishers, New York, 1990. [WROB] Wrobel, L. A. (1990). "Disaster Recovery Planning for Telecommunications." Artech House (Boston, MA). ISBN 0-89006-460-1. xi + 112. [WROE] Wrobel, L. A. (1993). "Writing Disaster Recovery Plans for Telecommunications Networks and LANs." Artech House (Boston, MA). ISBN 0-89006-694-7. xiii + 138. Index. [WU83] M. C. Wunderlich, "Factoring numbers on the Massively Parallel computer," in D. Chaum, Ed., Advances in Cryptology -proceedings of CRYPTO 83, a Workshop on the Theory and Applications of Cryptographic Techniques, Santa Barbara, CA, August 22-24, 1983, pp. 87-102. New York: Plenum Press, 1984. [WU85] M. C. Wunderlich, "Implementing the continued fraction factoring algorithm on parallel machines," Mathematics of Computation, Vol. 44, No. 169, January 1985, pp. 251-260. [XAMA] XAMAN EK,"Bifid Workshop," ND93, The Cryptogram, American Cryptogram Association, 1993. [XAM1] XAMAN EK,"Bifid Workshop- Part II," MJ93, The Cryptogram, American Cryptogram Association, 1993. [XEN1] PHOENIX, "Xenocrypt Handbook," American Cryptogram Association, 1 Pidgeon Dr., Wilbraham, MA., 01095-2603, for publication March, 1996. [YA82] A. C. Yao, "Theory and applications of trapdoor functions," in 23rd Annual Symposium on Foundations of Computer Science, Chicago, IL, November 3-5, 1982, pp. 80-91. IEEE Computer Society Press, 1982. [YAOA] A. Yao, Computational Information Theory. In Complexity in Information Theory, ed. by Abu- Mostafa, 1988. [YARD] Yardley, Herbert, O., "The American Black Chamber," Bobbs-Merrill, NY, 1931. [YAR1] Yardley, H. O., "The Chinese Black Chamber," Houghton Mifflin, Boston, 1983. [YAR2] Yardley, H. O., "Yardleygrams", Bobbs Merrill, 1932. [YAR3] Yardley, H. O., "The Education of a Poker Player, Simon and Schuster, 1957. [YOKO] Yukio Yokoyama, "Tokushu joho kaisoka," unpublished handwritten manuscript. [YOUS] Youshkevitch, A. P., Geschichte der Mathematik im Mittelatter, Liepzig, Germany: Teubner, 1964. [YUKI] Yukio Nishihara, "Kantogan tai-So Sakusenshi," Vol 17., unpublished manuscript, National Institute for Defense Studies Military Archives, Tokyo.,(hereafter NIDS Archives) [ZIM] Zim, Herbert S., "Codes and Secret Writing." William Morrow Co., New York, 1948. [ZEND] Callimahos, L. D., Traffic Analysis and the Zendian Problem, Agean Park Press, 1984. (also available through NSA Center for Cryptologic History) [ZERZ] Zerzan, J. & A. Carnes, eds. (1988). "Questioning Technology: A Critical Anthology". Freedom Press (London). ISBN 0-900-384-44-1. 222. Index. [ZYZZ] ZYZZ,"Sinkov's Frequency Matching," JA93, The Cryptogram, American Cryptogram Association, 1993. [ZYZ1] ZYZZ,"Nihilist Substitution," ND94, The Cryptogram, American Cryptogram Association, 1994. [ZYZ2] ZYZZ,"Solving Twin Bifids," JA94, The Cryptogram, American Cryptogram Association, 1994 [ZYZ3] ZYZZ,"Bring Home the Baconian!," MA94, The Cryptogram, American Cryptogram Association, 1994. [ZYZ4] ZYZZ,"Xenocrypt Solving for Neophytes," JF96, The Cryptogram, American Cryptogram Association, 1996. ANNOTATED WEB SOURCES Digital Privacy http://www-leland.stanford.edu/~phillin /red_paper.gif The Ethics of Encryption http://www-pcd.stanford.edu/gifs/button.key.gif http://www.ecst.csuchico.edu/~rodmur/docs/USConstitution .html http://draco.centerline.com:8080/~franl/privacy/ http://www.house.gov/Constitution/Constitution.html http://draco.centerline.com:8080/~franl/clipper/about- clipper.html Electronic Frontier Foundation Electronic Frontier Foundation http://www- leland.stanford.edu/~phillin/ http://rescomp.stanford.edu/~p weston/ptw.html http://www.eff.org/ White House http://www.whitehouse.gov/White_House/EOP/OVP/html /GORE_Home.html PGP Phillip R. Zimmerman: prz@acm.org http://draco.centerline.com:8080/~franl/pgp/pgp-2.6.2- doc1.html http://draco.centerline.com:8080/~franl/pgp/ RIPEN http://www.cs.indiana.edu/ripem/dir.html Fourth Amendment http://www.io.com/sjgames" Free Speech http://mirrors.yahoo.com/eff/speech.html Senate Bill S.1587 - Encrypted Communications Privacy Voters Telecommunications Watch http://www.vtw.org/ Cryptographic Algorithms http://www.cs.hut.fi/ssh/crypto/algorithms.html Professor Ron Rivest http://theory.lcs.mit.edu/~rivest/crypto-security.html Terry Ritter's papers on Dynamic Substitution and Dynamic Transposition ciphers http://www.io.com/~ritter/ Michael Paul Johnson Thesis ftp://ftp.csn.net/mpj/public/ K-Theory http://www.math.uiuc.edu/K-theory/ DES ftp://ftp.uu.net/pub/security/des" Complexity Theory & Cryptography http://dimacs.rutgers.edu/SpecialYears/1990_1991/index .html Random Numbers http://www.cs.berkeley.edu/~daw/netscape- randomness.html http://www.clark.net/pub/cme/html/ranno.html http://www.cis.ohio-state.edu/htbin/rfc/rfc1750.html http://www.ddj.com/ddj/1994/1994.11/index.htm Netscape Hole http://www.ddj.com/ddj/1996/1996 01/wagner.htm Cryptography Policy & Algorithms Conf: Australia 95 ftp://ftp.cl.cam.ac.uk:/users/rja14/queensland.ps.Z U. of Cambridge http://www.cl.cam.ac.uk:80/users/rja14/ Elliptical Curves http://www.ama.caltech.edu/resources.html ftp://ftp.mcs.com/mcsnet.users/eh.crypto ftp://csua.berekely.edu/pub/cypherpunks/ciphers ftp://ftp.datashopper.dk/pub/users/pethern/file/curve_e ncrypt_22.sea.hqx ftp://ftp.dsi.unimi.it/pub/security/crypt/code/curve_en crypt_22.sea.hqx quantum cryptography -use of quantum indeterminacy for encryption & data security http://www.iro.umontreal.ca/people/crepeau/Biblio- QC.html Bibliography on Quantum Cryptography by Gilles Brassard: http://www.iro.umontreal.ca/labs/theorique/index_en.htm l http://vesta.physics.ucla.edu/~smolin/ http://eve.physics.ox.ac.uk/QCresearch/cryptoanalysis/q c.html http://eve.physics.ox.ac.uk/QChome.html USS Pampanino http://www.maritime.org/ecm2.shmtl Wavelets for Compression http://www.mat.sbg.ac.at/~uhl/wav.html ftp://sable.ox.ac.uk/pub/math/README ftp://sable.ox.ac.uk/pub/math/cunningham/README Primes ftp://sable.ox.ac.uk/pub/math/primes">tables Lenstra's Large Integer Package "ftp://sable.ox.ac.uk/pub/math/freelip/ University/Country Ref's ftp://sable.ox.ac.uk/pub/math/primesrsa129/ ftp://furmint.nectar.cs.cmu.edu/security http://weber.u.washington.edu/~phantom/cpunk/index.html ftp://ftp.funet.fi/pub/crypt/cypherpunks ftp://ftp.psy.uq.oz.au/pub/Crypto ftp.psy.uq.oz.au/pub/Crypto ftp://ftp.wimsey.bc.ca/pub/crypto http://clipper.uvic.ca/crypt ftp://pgp.rasip.fer.hr ftp://ftp.datashopper.dk/pub/users/pethern ftp://ftp.funet.fi/pub/crypt ftp://garbo.uwasa.fi/pc/security http://www.cs.hut.fi/ssh/crypto http://www.cnam.fr/Network/Crypto ftp://ftp.darmstadt.gmd.de/pub/crypto ftp://ftp.informatik.uni-hildesheim.de/pub/security/ ftp://ftp.uni-stuttgart.de/pub/doc/security/crypto/ http://www.thur.de/ulf/krypto/index.html ftp://ftp.informatik.uni-hamburg.de/pub/pgp ftp://ftp.informatik.uni-hamburg.de/pub/crypt http://www.cert.dfn.de/eng ftp://ftp.kfki.hu/pub/packages/security ftp://ftp.dsi.unimi.it/pub/security/crypt ftp://utopia.hacktic.nl/pub/replay/pub/disk/ ftp://ftp.unit.no/pub/unix/security ftp://ftp.kiae.su/unix/crypto ftp://ftp.sunet.se/pub/security/tools/crypt ftp://ftp.ox.ac.uk/pub/crypto ftp://FTP.CSN.ORG/mpj/README http://www.eff.org/pub/ Net_info/Tools/Crypto/ ftp://ftp.eff.org/pub/Net_info/Tools/Crypto/ RIPEM ftp://ripem.msu.edu/pub/ ftp://ftp.infonexus.com/pub/ http://ftpsearch.unit.no/ftpsearch/ Bibliographies http://mnementh.cs.adfa.oz.au/htbin/bib_lpb http://glimpse.cs.arizona.edu/bib/ http://glimpse.cs.arizon a.edu/cgi-bin/biblio? query1=cryptography&query2 =&query3=&case=on&error s=0&maxfiles=200&maxlines=5000 http://liinwww.ira.uka.de/bibliograph y/index.html" ftp://ftp.doc.ic.ac.uk/computing/bibliographies/Karlsru he/index.html http://liinwww.ira.uka.de/bibliography/Theory/crypto.se curity.html "ftp://ftp.doc.ic.ac.uk/computing/bibliographies /Karlsruhe/Theory/computational.number.theory.html http://theory.lcs.mit.edu/~rivest/homepage.html http://theory.lcs.mit.edu/~rivest/crypto.bib http://theory.lcs.mit.edu/~rivest/algorithms2.bib Cryptography Technical Reports Server http://www.itribe.net/CTRS Crypto Reports http://www.cs.waikato.ac.nz/~sirvine http://bibd.unl.edu/~stinson/acbib.html http://bibd.unl.edu/~stinson/ssbib.html http://triode.apana.org.au:8080/~cskinner/cybanim.html http://www.isse.gmu.edu/~csis/bibliography/ref_essays.ht ml http://www.cs.purdue.edu/coast/archive/data/category_in dex.html ftp://coast.cs.purdue.edu/pub/doc/cryptography/ http://www.cs.purdue.edu/coast/archive/data/categ12.html http://ww w.zblmath.fiz-karlsruhe.de/cgi-bin/LNCS-500- 1000" http://www.zblmath.fiz-karlsruhe.de/cgi- bin/LNCS-500-1000?? au=&ti=&co=&so=&bi=cryptography&M=40 http://avalon.ira.uka.de/eiss/EISS-Reports/index.html European Institute for System Security, Univ. Karlsruhe, Germany http://avalon.ira.uka.de/eiss/indexe.html http://www.ens.fr/~grecc/papers.html http://www.ens.fr/~grecc/index_en.html http://www.ul b.ac.be/di/scsi/defscsi.html Brussels Free University, Belgium http://www.informatik.uni-hildesheim.de/~sirene/lit/ sirene.lit.html http://www.informatik.uni- hildesheim.de/~sirene/index.html http://www.swcp.com/~iacr/jofc/jofc.html Designs, Codes and Cryptography http://www.isse.gmu.edu/~csis/jcs.html http://www.tis.com/Home/DataSecurityLetter.html http://www.byte.com/ http://www.quad ralay.com/www/Crypt/General/crypto- journals.html http://www.itd.nrl.navy.mil/ITD/5540/iee e/cipher/ http://www.computer.org Security & Privacy - Books and Publishers http://www.cl.cam.ac.uk/users/rja14/#SR ftp://ftp.cl.cam.ac.uk/users/rja14/ http://www.rsa.com/rsalabs/cryptobytes http://www2.indigo-net.com/Indigo/Indigo.html http://www.privacy.org/alert/ gopher://ns1.infor.com/ gopher://ns1.infor.com/77/.bin/s_kw?cryptography http://www.aegeanpress.com/books/ http://www.wiley.com/ http://www.openmarket.com/info/cryptography/applied_cry ptography.html http://www.crcpress.com/PRODS/8521.HTM http://www.crcpress.com/ http://bibd.unl.edu/~stinson/ssbib.html http://bibd.unl.edu/~stinson/acbib.html http://www-mitpress.mit.edu/mitp/recent-books/comp/pgp- source.html http://www-mitpress.mit.edu/ http://www.springer-ny.com/ Coonferences: (Crypto, EuroCrypt, AsiaCrypt, etc.) http://www.bookwire.com/index/publishers.html http://julmara.ce.chalmers.se/stefan/WWW/sec_bib _search.html http://julmara.ce.chalmers.se/Security/ http://theory.l cs.mit.edu/~dmjones/hbp/ http://www.cs.indiana.edu/cstr/search http://www.kreonet.re.kr/AC96/AC96.html DSPCS@anaconda.fste.ac.cowan.edu.au http://www.cl.cam.ac.uk/users/rja14/ihws.html http://www.informatik.uni- hildesheim.de/~sirene/conf/Programme/96051216.Eurocrypt9 6 http://www.cl.cam.ac.uk/users/rja14/cp.html http://www.cl.cam.ac.uk/users/rja14/fse.html http://www.rsa.com/rsa/conf96/brochure.htm http://www.cl.cam.ac.uk/users/rja14 /ini.html ftp://ftp.cl.cam.ac.uk:/users/rja14/queensland.ps.Z http://www.isse.gmu.edu/~csis/acsac/acsac96-cfp.html http://www.cci.de/its/cfp-ifip96.html http://www.itd.nrl.navy.mil/ITD/5540/acm/new- paradigms.html http://newark.rutgers.edu/~atluri/atma.html http://www.isse.gmu.edu/~csis/acsac/acsac95.html http://csrc.ncsl.nist.gov/ events/ Advanced Surveillance Technologies http://www.privacy.org/pi/conference/ http://www.cs.pdx.edu/SP96 Intellectual Property Protection in the Global Information Infrastructure http://www.nla.gov.au/gii/oecdconf.html http://www.privacy.org/pi/conference/ proposed export criteria for encryption software http://csrc.ncsl.nist.gov/keyescrow/ http://www.clark.net/pub/cme/html/in-out.html http://www.eskimo.com/~joelm http://www.eskimo.com/~joelm /criteria.txt http://www.isse.gmu.edu/~pfarrell/nistmeeting.html FBI Ban http://www.epic.org/crypto/ban/fbi_dox/ Laws http://cwis.kub.nl/~frw/people/koops/lawsurvy.htm http://www.epic.org/cr ypto/legislation/s1587.html http://www.vtw.org/ http://www.epic.org/crypto/legislation/s1587_analysis.ht ml http://www.law.miami.edu/~froomkin/personal-u se.txt" ftp://ftp.cygnus.com/pub/export/itar.in.full http://www.pls.com:8001/his/usc.html http://www.epic.org/crypto/ http://www.eff.org/pub/Privacy/ITAR_export/ http://www.qualcomm.com/people/pkarn/export/index.html http://ssdc.ucsd.edu/gpo/" http://www.io.org/~samwise/crypto/Introduction.html http://www.us.net/~steptoe/ http://world.std.com/~franl/crypto.html authentication protocols http://www.cis.ohio- state.edu/hypertext/faq/usenet/kerberos-f aq/user/faq.html ftp://athena-dist.mit.edu/pub/kerberos Computer Security & Industrial Cryptography Group http://www.esat.kuleuven.ac.be http://www.kuleuven.ac.be http://www.dice.ucl.ac.be/crypto/crypto.html http://www.iro.umontreal.ca/labs/theorique/index_en.html http://www.ens.fr/~grecc/index_en.html http://lix.polytechnique.fr/~morain/Crypto/crypto.engl ish.html" http://www.polytechnique.fr/edu/DEAP/algo.html http://www.inf.ethz.ch/department/TI/um/group.html Government http://ana.arc.nasa.gov/usps/ http://www.cse.dnd.ca/ http://www.itd.nrl.navy.mil/ITD/">NRL-ITD http://infosec.nosc.mil/infosec.html">Navy INFOSEC http://hightop.nrl.navy.mil/rainbow.html http://www.users.interport.net/~sagal/ajax.html http://www.fbi.gov/ DECA program: (Development of Espionage, Counterin telligence & Counterterrorism Awareness) deals with economic, industrial, and technological intelligence gathering "http://www.fbi.gov/deca.htm Also see Cryptolog.html on NCSAFORUM Section 6 for many other Crypto links. ON-LINE COURSES The best course on the INTERNET by far is LANAKI's. It is 25 Lectures long covering all phases of classical cryptography. The textbooks are [NICH] Nichols, Randall K., " Classical Cryptography Course, Volume I," Aegean Park Press (C-74), ISBN: 0-89412-263-0, Softbound, 8.38 x 10.75 in, xii + 301 pp. Professor Nichols (aka LANAKI) is the retiring President of the American Cryptogram Association (ACA) 1994-1996. Classical Cryptography Volume II was released in February, 1997. [NIC~] Nichols, Randall K., " Classical Cryptography Course, Volume II," Aegean Park Press (C-76), ISBN: 0-89412-264- 9, Softbound, 8.38 x 10.75 in, xii + 400 pp. 1996, $40.00. Volume I presents the first ten Lectures (of twenty five) from Mr. Nichols' 1995 and 1996 on-going Classical Cryptography Course taught to 461 students at all levels of expertise. Volume I covers such diverse topics as Aristocrats (the king of cipher puzzles found in many daily papers), Patristocrats (Aristocrats without word divisions), Xenocrypts (language ciphers other than English), Transpos-ition Ciphers, Military Ciphers, Cryptarithms, the famous German ENIGMA Cipher Machine (with simulation program disk available), Polyalphabetics, and special historical ciphers. Ciphers and their cryptanalytic techniques for solution are presented. Extensive foreign language data is supplied. Classical Cryptography Course Volume I represents the best in intellectual stimulation - better than chess, bridge, and couch potatohood combined. ----------------- Volume II presents Lectures 11 - 20 (of a total of twenty five) from Mr. Nichols' extremely successful course in Classical Cryptography taught in 1995 and 1996 to 461 students via the Internet and regular mail. Volume II covers polyalphabetic substitutions ciphers in the Vigenere family (Viggy, Variant, Beaufort, Porta, Gronsfeld, Portax, Gromark), decimation, principles of symmetry, isologs and superimposition solution techniques. Volume II describes the difficult aperiodic cipher systems (Interrupted key, Autoclave, Progressive, Running Key used in cipher machines) and their analysis by isomorphs, and repetitions. Cryptarithm solutions for extended bases are presented. The theory of coincidences and statistical attacks (kappa, chi, phi) that are derived from this important theory are detailed. Transposition theory and a variety of transposition ciphers are solved (Columnar, Amsco, Myszkowski, Cadenus, Grille, Swagman, Auto-Transposition). Volume II has two chapters on the difficult cipher systems invented by the famous French cryptographer Delastelle: Foursquare, Bifid and Trifid. Volume II ends with a chapter on passwords, law and data protection. Volume II is a potpourri of advanced topics in classical cryptography. Volume II includes over 1600 Cryptographic Resources and References covering all phases of cryptography: cryptanalysis, history, legal, social, classical, modern, NSA, mathematical techniques, recreational, intelligence, tactical, strategic, national defense, INFOSEC: offensive and defensive, hardware, software, standards, public key cryptography, web sources, and applicable Senate and House bills. The course is free to ACA members. Two BBS, one netserver, and the Crypto Drop Box are maintained with a wealth of information, lectures and computer programs for the serious student. Professor Nichols shares his 32 years of experience to about 358 students worldwide. Nothing better on the net for the pricetag. Be prepared to work and enjoy yourself. (and permit me a couple of personal plugs).... BOOK REVIEWS REVIEW OF CLASSICAL CRYPTOGRAPHY COURSE, VOLUME I By the honorable Louis Kruh, Editor/Founder CRYPTOLOGIA, October 1996, Volume XX Number 4. Nichols, president of the American Cryptogram Association, 1994-1996, began a course in classical cryptography in 1995 via the Internet and regular mail. Presently, at its midpoint, the course is an over- whelming success with more than 300 participants and this volume, the first of two, consists of the first ten lectures. Nichols' goals are to teach the basic cryptanalytic tools for solving different types of ciphers while providing some understanding of the historic context and importance of cipher systems to communications. Volume I covers simple substitution, substitution with variants including complicated types of cipher alphabets, multiliteral substitutions, Xenocrypts (substitution ciphers in languages other than English) cryptarithms, Hill's algebraic cipher, German Enigma machine, and part I of polyalphabetic substitution systems. In a clearly written style, Nichols describes how to solve each cipher, often with step-by-step examples, using various techniques. These include position and frequency tables, vowel selection method, pattern word attack, consonant-line method, Phi test, Index of Coincidence, probable words, anagraming, frequency distribution data, and common digraphs, trigraphs and tetragraphs for foreign languages, Kasiski method for periodic ciphers, known word method, symmetry principles and other techniques. A minor criticism is the use of three chapters or 1/3 of the book for Xenocrypts. This is disproportionate by any measure and additional editing and use of an appendix for language data would provide a better balance. Similarly, the Chapter on the German Enigma stands out like plaintext in the middle of an encrypted message. The information is interesting but out of place; it belongs in an appendix. Another criticism is the decision to have two volumes instead of one, for no apparent reason. This will require a second index and another list of references, which adds to the basic inconvenience of having two volumes when only one is necessary. Despite these faults, Nichols has produced an out- standing contribution to the literature of cryptology. By way of comparison, in 1939, the American Cryptogram association sponsored publication of Elementary Crypt- analysis by Helen F. Gaines. This was the first comprehensive textbook on the subject published in the United States and, almost 60 years later, it is still in print because no other book has come close to its standard. Now, however, Nichols' book, or at least the first volume, compares favorably and in some ways is even better! REVIEW OF CLASSICAL CRYPTOGRAPHY COURSE, VOLUME I By the Honorable David Kennedy, Director of Research, NCSA. Classical Cryptography Course, Volume I. By Randall K. Nichols; published by Aegean Park Press, (714) 586-8811 (phone) (714) 586-8269 (fax); (800) 736 - 3587; 301 pages (with index); $34.80 (American Cryptogram Association members receive a 20% discount through ACA or NCSA Members receive a 10% discount if purchased from the NCSA Bookstore) In Classical Cryptography Course, Volume I, author Randall K. Nichols has created a benchmark for serious students of the science of cryptography. This is a text. It is for learning, and with it one cannot help but learn about the foundations of the science. An outgrowth of Nichols' admitted "labor of love" in the online Cryptography Courses he teaches over the Internet, Volume I creates the foundation for understanding the development of the science. The ten chapters of this volume lead the student through simple substitutions, substitutions with variants, multiliteral substitutions, xenocrypts (foreign language substitutions), cryptarithms, the Enigma machine (separate Enigma95 program disk available direct from the author) and finally to polyalphabetic substitutions. Seven chapters conclude with problems; solutions and discussions are provided in an appendix. The text is indexed with twenty-four pages of references for further study. I found Nichols' sense of the history of cryptography particularly noteworthy. The volume is liberally salted with citations from history with applications of the methods developed in the text. From Revolutionary France through the American Civil War, the Tammany Hall scandal, Revolutionary Soviet ciphers and Japanese successes against Chinese codes prior to Pearl Harbor, the text provides touchstones for student to understand and relate to. Phil Zimmermann observed in the documentation to his Pretty Good Privacy Program to "Beware of Snake Oil." Among his arguments is this anecdote: I remember a conversation with Brian Snow, a highly placed senior cryptographer with the NSA. He said he would never trust an encryption algorithm designed by someone who had not "earned their bones" by first spending a lot of time cracking codes. Where Schneier's Applied Cryptography is a crash course in some encryption protocols and algorithms in use today, Nichols' text begins the teaching of Snake Oil detection and prevention. Learning the fundamentals, developed throughout the text, brings a richer understanding of the science, it's history and insight into it's possibilities and some vulnerabilities lurking for the unwary. Nichols plans for release Volume II in the series with advanced material on from the online course which includes statistical attacks and transposition in February, 1997. Reviewer: Dave Kennedy, CISSP, is Director of Research for the National Computer Security Association, Carlisle, PA. He is a retired Army military police officer and member of NCSA, ASIS, ISSA and the Computer Security Institute. ----------------- For orders or Information Contact: Aegean Park Press, P.O. Box 2837, Laguna Hills, Ca. 92654. Telephone: 1- 800-736-3587; Fax: 1-714-586-8269. Group discounts available. WWW Web site: http://www.halcyon.com/books/ Online orders may be made directly to LANAKI at 75542.1003@compuserve.com or RAGYR at aol.com. Volume I sells for US $28.50 and Volume II sells for US $38.00. Surface mailing costs are included, as well as, course discounts. Add $8.00 to each book for overseas costs. Orders to LANAKI will be signed by the author.