43 pages • 1 hour read
Simon SinghA modern alternative to SparkNotes and CliffsNotes, SuperSummary offers high-quality Study Guides with detailed chapter summaries and analysis of major themes, characters, and more.
What is the oldest form of keeping messages secret, and how did it evolve into a subsequent art?
Compare and contrast the two forms of encryption: transposition and substitution. Imagine you have a secret message you wish to convey. In which situations would you use transposition or substitution? Why?
The author opens his analysis by retelling the story of the treason trial of Mary, Queen of Scots. What role has encryption played in politics over the centuries? How does the political use of encryption now differ from—or bear resemblance to—its political uses in the past?
In the Introduction, the author claims that codes and ciphers evolve and grow over time. How do you think codes and ciphers might evolve in the future?
How did the Industrial Revolution and the invention of encryption machinery change the art of cryptology for the better? Did it change for the worse? If so, in what way?
Consider how the art of cryptology advanced in the years between the First and Second World Wars, especially as related to the development of the Enigma machine. How is cryptology used in modern-day warfare? What developments have been made since WWII?
How do encryption techniques differ between cultures, either ancient or modern? Choose two different cultures and compare them. What are the similarities and differences? What are the strengths and weaknesses of each technique?
The author relates the story of Zimmerman and his creation of the Pretty Good Privacy freeware. What are the ethical circumstances surrounding the creation and distribution of such software? Was Zimmerman right to release it directly to the public? Why or why not?
Compare the use of codes and ciphers explicitly designed as such and the quest to interpret and decipher ancient languages lost to time. What are some of the similarities and differences between the two? What are the unique challenges in each case?
There are many debates surrounding the ethical use of encryption. Do you believe that encryption should be regulated? Why? If not, why not?