Secret Code Breaker Book Series Reviews

SECRET CODE BREAKER-A CRYPTANALYST’S HANDBOOK

Reader: Del Waggoner – October 7, 2005

A wonderful book. This book, and the other books in this series, provide a good introduction into the world of Codebreaking. As a former Cryptanalyst, I think that they are an easy and entertaining way to get a basic understanding of a very complex and interesting subject.

Reader: Glenn Drong – January 21, 2005

I have always had an interest in Cryptography and wanted to learn more about it and share this interest with my son. The background and historical overview provided for each of the ciphers is very interesting and shows how historical events were shaped especially during war (and the cold war). We have fun both creating our own ciphers and working on breaking the ones in the book for ourselves. It really has piqued his interest and I am using it to teach him methodological approaches to solving problems (although he doesn’t even know it). I highly recommend all the books in this series (Secret CodeBreaker 1,2,3), if you are wanting to learn more about Ciphering, even if it’s just a casual interest, the reading is quick and the examples are many.

Review, by Robert Baldwin, cryptanalyst. May 27, 2000

A more advanced approach to cryptography, this 90-page book and computer diskette whoosh the user into today’s technology. The computer may make history’s cryptanalyst obsolete in time, but it sure reduces the tedium of manual trial and error. Reynard bases lots of these data on the champion author of cryptography, David Kahn, so this is authentic stuff. Detailed examples of how ciphers work. And curious history of the art. Greeks were ciphering in 500 B. C., but others mostly dabbled. The masses couldn’t read anyway, so who needed secret codes?

Thank goodness someone eventually did. This stuff is fun! And here are two ways to approach hidden messages. WNEUU. Enjoy the enigma!

Anonymous Reviewer

A useful book on how to solve a variety of cipher systems with a computer. Separate chapters describe the Skytale cipher, Polybius Square cipher, Caesar cipher, Vigenere, Transposition, Monoalphabetic Keyword and M-94 ciphers. Other chapters explain the use of frequency analysis, the German Enigma cipher machine, and how to use the computer programs which simulate the operation of the M-94 and the Enigma machine.

For each type of cipher there are encrypted messages to solve by using the computer programs on the diskette. These include a series of secret messages actually sent by secret agents, spies and military commanders beginning with the Revolutionary War and ending with a message from KGB to CIA “mole” Aldrich Ames in 1992. The author calls the real messages a kind of “final exam” for the amateur cryptanalyst.

Detailed instructions explain how to use the programs and helpful notes are at the end of each chapter. Reynard also intersperses his text with historical cryptologic tidbits. The book is recommended for beginning and intermediate cryptanalysts and for anyone who wants to experience the use of a computer to solve various ciphers.

Anonymous Reviewer

/ LUWUU APQFT ZEOWS (?). 1996-1999. Secret Code Breaker, Secret Code Breaker II and Secret Code Breaker III are a great set of books specifically aimed at a younger audience. The books explore traditional (pre computer) cryptography, and all come with software (DOS, but works with Windows) that lets you try out the concepts you learn in each chapter. Packed with historical context, the reader is challenged to decrypt messages that were actually sent during times of war. After reading the books, I recommend them for readers ages 13 to adult. Adults who enjoy newspaper cryptograms will really enjoy these texts.

SECRET CODE BREAKER – A CRYPTANALYST’S HANDBOOK II

Reader: Del Waggoner – October 8, 2005

A second great book in the series. Reynard has done it again. Another great book on crypto. This book explains what is the most secure cipher: one-time pads. The Russians used this to give US a real hard time. Did I mention the great software that Robert has included? This book covers substitution and transposition ciphers. Buy this book!

Reader: jtong – September 17, 1998

Secret Code Breaker II: A Cryptanalyst’s Handbook is a wonderful introduction into the use of codes and ciphers, and the methods by which a cryptanalyst tries to break the enciphered message. Intended for a young, computer literate audience, I (aged 38) found it to be insightful and impossible to put down. It is designed for use with a personal computer, and contains a computer program that, by itself, is worth the price of the book. The software contains simulations of several classical cryptosystems and a codebreaking program, while the text takes the reader through exciting historical examples of when and how the cipher was used. Tales of spies and U-boats take the codes from an item of academic interest and put them in the real world, along the lines of Yardley’s The American Black Chamber. Clear explanations of enciphering and deciphering, worked examples, and cipher problems waiting to be broken await the reader. A thoroughly enjoyable introductory-level book, and a great companion to Reynard’s earlier work, Secret Code Breaker: A Cryptanalyst’s Handbook.

Anonymous Reviewer

This sequel to the original Secret Code Breaker describes additional cipher systems and subjects for experienced solvers such as: “cribs,” Radio Transmission Analysis (RTA), Checkerboard Cipher, German ADFGVX Cipher, Playfair, Mexican Army Cipher, Turning Grille, Larrabee Cipher, Superencipherment, The One-Time Pad, and Bletchley’s “BOMB.”

Reynard highlights the history, background and use of each cipher type and procedure, i.e. cribs and RTA, with many interesting details. Among the 50 ciphers to solve are 16 genuine secret messages encrypted by Enigma, Larrabee, Vigene and other cryptosystems.

An accompanying diskette of computer programs for decrypting all ciphers in the book eliminates the need for paper and pencil. For RTA there is a Radio Direction Finding program that demonstrates the finding of a frequency being used to transmit a message and then locating the source by getting bearings of the transmission from two different listening stations. This must be done quickly as the transmission stops after varying periods of time. It is an exciting program almost like a computer action game.

It is an excellent book and the diskette alone is worth the price.

SECRET CODE BREAKER – A CRYPTANALYST’S HANDBOOK III

Reader: Del Waggoner – October 8, 2005

Book 3 in the series is like the first 2; it is great! Want to know how George Washington used codes? Reynard has the answer. Another great book by Reynard. The 3rd in the series continues the history and techniques of codes and ciphers. From George Washington to the Civil War to current day Russian spies. The programs are great. I must mention that the included bibliographies are a must for your continued reading. Buy this book!

Reader: Lonnie Griffis – November 13, 2004

A must have. If you are interested in understanding the basics if breaking code and ciphers, then you should buy all three books in this series. They are good for all ages, but they are especially good for young people. The books are filled with information on the uses of code and cipher systems over the ages, as well as examples of how these systems worked. They also come with computer programs on a floppy disk to help you “play” with the systems and get a feel for how they were used in real life, and how they were broken.

Review from “The Book Reader”, Spring/Summer 1997

QPVEO TXJZC AZGVN. Gotcha! Deciphered that means ATTACK AT DAWN. But without the secrets of ciphering and knowledge of war-developed, time-tested systems who would know? Almost anyone, now that two revealing and fascinating books are available, each with its own set of doo-dads that make things fun.

Review by Dr. Kruh, editor of “Cryptologia” magazine
This is the third in a great series of books that introduce the reader to the excitement, challenge, and historical drama that surrounds the making and breaking of codes and ciphers. Using modern software, the reader can easily understand and follow along in the steps of breaking ciphers that were used as late as the 1960s. No math expertise is required. The stories in each chapter bring the subject alive. Could England’s chief spy-catcher, Kim Philby, really be Russian a spy? The Russian’s hid Philby’s identity behind the unbreakable one-time pad cipher, but they use some of those pads more than once, and that ended Philby’s treason. The author tells this story in his brief and entertaining style, and explains how to use the included software to walk in the footsteps of the NSA code breakers who uncovered this notorious double agent. In 1997, Microsoft made a similar mistake of reusing keys in its implementation of the PPTP secure dial-up protocol. This is a history worth reading to avoid its repetition.

Review by David Youd, cryptanalyst and mathematician

This useful book contains brief highlights of United States cryptologic history, its secret agents and the codes and ciphers they used. Some key events in the book’s nine chapters include: VENONA and how the Soviet’s one time pad was cracked when some pads were used twice; Lincoln’s Black Chamber and word transposition ciphers; Friedman and Rowlett, Codebreaking Giants, describes their work on the Sigaba and its operation; Spymaster of the Atomic Spies is about Rudolph Abel and the checkerboard cipher; The Family of Spies, led by John Walker, operated for 20 years before his former wife informed the FBI. Probably the greatest damage to the U. S. was caused by his sale of keylists for the KL-7 cipher machine to the Russians; The “Mole” in the CIA recounts the activities of Aldrich Ames and describes the Commercial Stream Cipher computer program which simulates the program that scrambled his computer’s word processing program; plus other chapters on the American Revolution, the Zimmermann Telegram, and Bookies and Cryptanalysts. At the end of each chapter, Reynard explains the type of cipher that was used and how it can be solved. The disk contains computer programs for each cipher and instructions for use of the programs are in the book.

The disk contains: Revolutionary War Dictionary Code, Civil War Transposition Code, Checkerboard Superencipher Cracker Program, Sigaba and KL-7 Cipher Machine simulators, Cracker for VENONA Secret Messages, 15 Secret Code Message examples, and 25 Real Secret Messages to crack.

SECRET CODE BREAKER-SECRET MESSAGE KIT

Great for beginning spies, this kit contains a 30 page instruction manual, loads of secret message pads for deciphering, an invisible ink pen set, and cut-out discs for the Mexican Army and Caesar ciphers. It opens the door to secret messages and, although this kit is for starters, techniques included were actually used in time of war. Background on using substitution and transposition ciphers. History and discussion on use of letters, numbers, even symbols. As in “The Adventure of the Dancing Men” featuring Sherlock Holmes. A super intro to the exciting realm of spies and hidden messages.

The Secret Message Kit contains seven different techniques for enciphering and deciphering messages. A 28-page Instruction Manual provides directions for using these ciphers: Polybius Square, Checkerboard Square, Transposition Square, Mexican Army, Caesar, Pigpen, and Monoalphabetic Keyword. The Manual also includes a section on Invisible Ink Writing and 15 secret messages to provide practice for using each of the cipher systems.

To assist would-be cryptologists, the kit includes a normal 26-letter Cipher Disk and Mexican Army Cipher Disk with instructions for assembly and use, Message Pads imprinted with Pigpen, Keyword, Polybius, Checkerboard and Transposition systems, and an Invisible Ink Pen Set. It even has a Secret Code Breaker pencil.