43 pages • 1 hour read
Simon SinghA modern alternative to SparkNotes and CliffsNotes, SuperSummary offers high-quality Study Guides with detailed chapter summaries and analysis of major themes, characters, and more.
The need for efficient and secure communication has been part of the human experience for the entirety of recorded human history. Especially for those in power and charged with the governance of nations and armies—kings, queens, generals, etc.—communication that can be kept secret and safe is a perpetual necessity. This particular need is what drove the development of modes of communication that would be safe from prying eyes while being simultaneously intelligible to those to whom the message was addressed. As such, the development of codes and ciphers—“techniques for disguising a message so that only the intended recipient can read it” (10)—was a natural development.
The Code Book has two goals. The first goal is to describe and explain the evolutionary development of codes through the course of history up to the present day. As codes are cracked and ciphers are solved, they go through changes that attempt to make them stronger and more impregnable. This process allows codes to evolve over time, becoming increasingly complex as time goes on and the means of breaking them simultaneously increase. The second goal of the book is to prove that the subject matter, though of great importance in times past, is of even greater importance in the present day. While secret communication has always been important, today the use of encryption needs to protect identities, financial transactions, and much more.
In this light, many ethical questions arise, the most obvious of which is the dilemma of balancing between privacy and security. While cryptography would seem to be necessary to protect privacy, it would also seem to hinder the pursuit of nefarious deeds and persons. This tension is at the heart of much debate surrounding the implementation of encryption in the modern technological world.
In many ways, the world has been heading in this direction ever since the start of the 20th century thanks to the various wars fought all over the world. The First World War was called the “chemists’ war” due to the use of chemical warfare, while the Second World War has been called the “physicists’ war” on account of the development (and detonation) of the atom bomb. If there is a Third World War, it may well be “the mathematicians’ war” (13) because of the all-consuming ability of information (gleaned digitally and algorithmically) to change outcomes of events more rapidly than ever before.
In the course of the book, cryptography will be placed alongside other similar modes of indecipherable communication: codes, ciphers, and ancient languages. Though similar, they all have their own specific difficulties and characteristics. Codes are specific types of communication events that have been transposed in some way: “In a code, a word or phrase is replaced with a word, number or symbol” (13). Ciphers, on the other hand, break the communication down into even more discrete parts, acting “at a more fundamental level, by replacing letters rather than whole words” (14). The exploration of ancient languages gathers some of these characteristics together with the caveat that they were never meant to be indecipherable in the first place and yet have become so thanks to some accident of history.
While there will be many instances of quite technical language and terminology throughout the book, it will typically be very easy to tell what is being spoken about. In the course of the book, much of what has been previously secret or classified will be discussed and pored over, and so if there are mistakes or misleading information—or perhaps even outdated information—it will largely be impossible to tell. As the author observes, “The only people who are in a position to point out my errors are also those who are not at liberty to reveal them” (15).
The topic of cryptography is both interesting and important. Typically, the subject of codes and secret messages is one dominated by mystery novels and spy movies, but its history is woven into the very fabric of the human story from practically the dawn of civilization. It is now also at the heart of modern technology and finance in a way that is unappreciated by almost everyone.
The author outlines his main objectives, which are twofold. The first objective is to examine the history of codes. The comparison made between code development and a virus is particularly apt (and not just because that terminology is used to speak of nefarious and damaging codes present on computers). In biological terms, organisms develop and change in part due to the process of environmental adaptation, where the organism adapts to the environment it inhabits, allowing useless characteristics to disappear and developing new, useful traits thanks to natural selection. The environment—habitat, food sources, predators—will cause the organism to change and develop over time for the greatest chance of survival in order to reproduce and continue the species.
In the realm of code development, the process is remarkably similar. When a code is developed and put into use, it will inevitably be put to the test by those who attempt to break it. If and when it is broken or solved, the original creators of the code have two options: abandon the method of encryption for something entirely new or change the code in such a way that a new complexity is added that resurrects the code’s usefulness. Abandoning a code is like allowing an animal species to go extinct, but changing a code is like allowing the code to evolve in order to survive in a harsher environment. When the code is changed, it becomes more complex in order to survive in the face of predators (i.e., those who wish to break the code); the history of code making and encryption shows how all encryption has evolved over time.
The author situates various cryptographic breakthroughs in their historical contexts, making the book read (at times) like a historical novel and simultaneously making it far more convincing as an argument for the usefulness and necessity of encrypted language. The Introduction gives a very clear and useful explanation for the existence of the text and the importance of covering the subject matter in this particular way. On the one hand, the author could have simply given an analysis of various codes and ciphers, listing the most influential and notorious, examining each one in turn and performing a taxonomy according to any number of descriptive methods. On the other hand, the book could have taken a purely historical form, concentrating more on the people, places, and events without spending much time on the actual makeup of the code.
Instead, the author has chosen a middle path that combines the best of both worlds. Each of the most important steps in the history of codebreaking and cryptography has been chosen for examination, while the historical context has been woven into in-depth examination of the minutiae of each of the codes and ciphers. In this way, the reader can gain an appreciation for the actual code and the mathematics that make it work, as well as the historical context in which each was created, helping to reveal why the code was important and how it actually functioned in the real world.