cryptography

Type: 
Topical Term
Subfield: 
a
Alias: 
cryptography

Navajo code talkers

Native American heroes
1997
Discusses the establishment of the Marine Corps unit made up of Navajo Indians who served as radio operators, using their own language as a secret code, during World War II.

Code breaking

a history and exploration
1999
Disusses concepts and terminologies, looks at the history of cryptography, and examines contemporary techniques and privacy issues.

Super little giant book of secret codes

2007
Learn to create secret codes using symbols, dots, lines, rearranged letters and more.

The doomsday key

a sigma force novel
2009
Commander Gray Pierce and his Sigma Force operatives investigate the murders of three individuals in different countries whose bodies were marked with a Druidic pagan cross and connect the crimes to an ancient artifact which can threaten the existence of mankind if it falls into the wrong hands.

Secret writing tricks

1975
Examines a number of different ways of writing secret messages, including invisible ink and a variety of ciphers. Gives suggestions and aids for code-breaking.

Code Talkers - "Time Line" (Graphic Novel)

2008
Two Navajo brothers use their native language that they've been forbidden to speak to help in winning World War II.

National treasure

2005
Benjamin Franklin Gates, obsessed with finding the mythical Knights Templar Treasure, finds himself having to steal the Declaration of Independence, which holds the key to the mystery of the treasure's whereabouts, in order to keep it out of another's dangerous hands.

Codebreaker

the history of codes and ciphers, from the ancient pharaohs to quantum cryptography
2006
A history of codes and cryptography, discussing ciphers from Julius Caesar to quantum cryptography and profiling cryptology and decryption experts. Includes code breaking exercises.

Secret messages

concealment, codes, and other types of ingenious communication
2001
Tells the stories of ninety-five situations in which code and hidden messages have been used throughout history.

Cryptonomicon

2000
Randy and Amy, the grandchildren of men who once served on a mission to break the Nazi's fabled Enigma code, join together to create a haven in Southeast Asia where encrypted data can be stored and exchanged free of repression and scrutiny, but their scheme runs into trouble when they unearth a conspiracy that has its roots in WWII.

Pages

Subscribe to RSS - cryptography