Error loading page.
Try refreshing the page. If that doesn't work, there may be a network issue, and you can use our self test page to see what's preventing the page from loading.
Learn more about possible network issues or contact support for more help.

Can You Crack the Code?

A Fascinating History of Ciphers and Cryptography

ebook
1 of 1 copy available
1 of 1 copy available
Codes can carry big secrets! Throughout history, lots of good guys and lots of bad guys have used codes to keep their messages under wraps. This fun and flippable nonfiction features stories of hidden treasures, war-time maneuverings, and contemporary hacking as well as explaining the mechanics behind the codes in accessible and kid friendly forms. Sidebars call out activities that invite the reader to try their own hand at cracking and crafting their own secret messages. This is the launch of an exciting new series that invites readers into a STEM topic through compelling historical anecdotes, scientific backup, and DIY projects.
  • Creators

  • Publisher

  • Release date

  • Formats

  • Languages

  • Reviews

    • Kirkus

      January 15, 2019
      Hands-on history for budding spies, hackers, or anyone with a secret message to send.Though she starts off with a face-plant--a vague claim, with a disappointingly stereotypical illustration, that "the ancient Chinese" had couriers swallow secret messages written on silk--Schwartz goes on to offer a broad and lucid survey of cryptographic strategies. These range from steganography and substitution ciphers to second factor authentication and other recent trends in cybersecurity. She also provides plenty of variously coded examples for readers to decipher as practice, capped by a final challenge to go back and find the clues to a secret message that have been distributed throughout. Her detailed description of how the German Enigma machine worked (and was hacked by the Bletchley Park group in World War II) is indeed "fascinating," as are the close analyses of still-unsolved messages such as the modern Kryptos inscription outside CIA headquarters. Somewhat less fascinating are the closing chapters, in which she does explain how prime numbers figure in securing internet communications but neglects to mention the possibilities of quantum cryptography and leaves a debatable impression that cyber defenses have been generally successful in staying ahead of "black hat" hackers. Williams adds a diverse group of spot-art figures to go with the array of tables, diagrams, and occasional photos. A serviceable if too-often superficial update for solid but now-dated histories such as Gary Blackwood's Mysterious Messages (2009). (index, source list) (Nonfiction. 10-13)

      COPYRIGHT(2019) Kirkus Reviews, ALL RIGHTS RESERVED.

    • The Horn Book

      July 1, 2019
      This very readable overview of cryptography throughout world history explains how different codes and ciphers work, moving from more basic examples (Caesar substitution, keyword cipher, pigpen cipher) to complicated encryption techniques (Nazi Enigma machines). Schwartz neatly weaves in math content and historical context, and she gives readers the chance to practice their deciphering skills. Final sections address cyber-security and hackers. Black-and-white illustrations and photographs are included. Bib., ind.

      (Copyright 2019 by The Horn Book, Incorporated, Boston. All rights reserved.)

Formats

  • Kindle Book
  • OverDrive Read
  • EPUB ebook

Languages

  • English

Loading