Curator's Library

Further Reading

Curated bibliography for serious students of cryptography — books, journals, scholars, and archives

Note: The Cipher Museum does not sell, endorse, or affiliate with any publisher or retailer. All links go to official author pages, publisher pages, or open-access repositories. No affiliate codes are used.

The Canonical Four

These four books are the standard references cited throughout this museum. If you read nothing else, read these.

History · Essential
The Codebreakers
David Kahn
1967 (revised 1996)

The foundational history of cryptology from ancient Egypt to the NSA. 1,200 pages. Kahn coined the word "cryptanalysis," interviewed surviving WWII codebreakers while their work was still classified, and created the modern academic field of cryptological history. Every subsequent serious work in the field cites this one. The 1996 revised edition adds chapters on the computer age and is the edition to buy.

EssentialHistory
Popular Science · Essential
The Code Book
Simon Singh
1999

The best single-volume introduction to cryptography for a general reader. Singh traces ciphers from Mary Queen of Scots through quantum cryptography with rigorous accuracy and excellent narrative pacing. His explanations of public-key cryptography and the history of Enigma are particularly clear. Includes a £10,000 cipher challenge (ten stages, all solved by 2000). The companion website's educational resources remain excellent.

EssentialIntroductory
Academic · Historical Cryptanalysis
Secret History: The Story of Cryptology
Craig P. Bauer
2nd ed. 2021

The college-level textbook that bridges history and mathematics most cleanly. Bauer includes worked cryptanalysis exercises, unsolved ciphers chapter, cipher puzzles with solutions, and coverage of non-Western cryptographic traditions. The second edition adds sections on modern historical discoveries (Copiale, Beale context updates, Voynich radiocarbon dating) and is notably better than the first.

TextbookMathematics
Technical Reference
Applied Cryptography
Bruce Schneier
2nd ed. 1996

The definitive technical reference for practicing cryptographers, now partly dated by algorithmic advances but still essential for understanding why modern cipher design looks the way it does. Explains DES, early public-key infrastructure, protocol design, and the philosophy of defensive cryptographic engineering. Schneier's principle — "security is a process, not a product" — is the thesis of the book in one line.

TechnicalReference

Biography & Narrative History

Biography
Alan Turing: The Enigma
Andrew Hodges
1983 (centenary ed. 2012)

The standard biography of Turing, written by a mathematician who treats the technical material seriously. Covers Bletchley Park in depth, Turing's contributions to the Bombe design, his postwar computing and morphogenesis work, and his prosecution and death. The centenary edition includes a new preface and updated bibliographic notes.

BiographyWWII
Biography
The Woman Who Smashed Codes
Jason Fagone
2017

Reconstruction of Elizebeth Smith Friedman's career from Riverbank Laboratories through the Coast Guard and WWII Abwehr work, drawing on her papers at the Marshall Library (opened 2008) and Coast Guard records. The definitive account of the FBI's deliberate erasure of her contribution and the restoration of the historical record. Essential companion to the Elizebeth Friedman exhibit.

BiographyWomen in Crypto
Memoir
Between Silk and Cyanide
Leo Marks
1998

Marks's memoir of running SOE's codes section from 1942 to 1945. Uniquely combines insider technical detail about agent cipher systems (poem codes, silk one-time pads, worked-out keys) with vivid character writing. The best first-person account of operational cryptography under wartime pressure. Sold as literary memoir; the technical accuracy is impeccable.

MemoirSOEWWII
Popular History
Seizing the Enigma
David Kahn
1991 (revised 2012)

Kahn's focused account of Allied capture operations against German naval Enigma material — pinches from weather ships, trawlers, and submarines. Explains why physical capture of key material was as important as mathematical cryptanalysis and how the two combined in the Battle of the Atlantic. A shorter, more readable Kahn than The Codebreakers.

HistoryNavalWWII
History of Intelligence
Spycatcher
Peter Wright
1987

MI5 officer Peter Wright's controversial memoir covers Cold War SIGINT, the VENONA investigation's British end, and the unmasking of Roger Hollis. Legally suppressed in the UK, published in Australia. Wright's technical descriptions of the VENONA process and the Cambridge Five investigation are primary-source material, though his conspiratorial conclusions about Hollis are disputed. Use for VENONA context; evaluate conclusions critically.

Intelligence HistoryCold War

Academic Journals & Proceedings

Peer-Reviewed Journal
Cryptologia
Taylor & Francis · Founded 1977

The principal peer-reviewed journal covering the history and mathematics of cryptology. Publishes historical cipher analyses, biographies of cryptologists, NSA and GCHQ declassification reviews, and mathematical studies of classical cipher security. Many landmark cipher solutions (Copiale, Mary Queen of Scots nomenclators, Dorabella analyses) appeared here first. Articles from 1977–2015 are partially open-access via JSTOR.

Peer-ReviewedHistoryMathematics
Conference Proceedings
HistoCrypt
Annual conference · First held 2018

The annual conference on historical cryptology — the world's only dedicated academic venue for classical cipher research. Proceedings are open-access via the Linköping Electronic Conference Proceedings. Covers unsolved cipher attacks, historical document analysis, digital humanities approaches to manuscript decipherment, and new archival discoveries. The Lasry–Biermann–Tomokiyo Mary Stuart paper and the Voynich radiocarbon context papers both presented here.

Open AccessConference
Academic Project
DECODE — Decipherment of Coded Manuscripts
Uppsala University · EU-funded

An EU-funded database of undeciphered or recently deciphered historical manuscripts, maintained at Uppsala University. Includes the most comprehensive catalogue of known historical cipher manuscripts currently available — over 75,000 documented items. Researchers can submit new discoveries. The primary scholarly database for anyone working on historical cipher manuscripts.

DatabaseOpen Access
Journal of Record
Annals of the History of Computing
IEEE · Founded 1979

The IEEE's history of computing journal regularly publishes material on code-breaking machines (Colossus, Bombe, ENIGMA reconstruction), early NSA computing, and Cold War SIGINT machinery. The Colossus reconstruction team's authoritative papers appeared here. Essential for the mechanical and electronic cipher machine histories.

Computing HistoryMachines

Scholar Profiles — Active Researchers

  • George Lasry
    Cryptanalyst · Co-author, Mary Queen of Scots nomenclator decipherment (2022)

    Lasry's papers combine automated hill-climbing search with historical cryptanalysis to attack unsolved historical ciphers at scale. His work on the Mary Stuart Castelnau letters (with Beáta Megyesi and Satoshi Tomokiyo, Cryptologia 2022) is the most significant historical cipher decipherment of the 2020s. His solver toolkit, CryptoCracker, is open source. See the Lasry exhibit for fuller context on his methods and results.

    ActiveHistorical Cryptanalysis
  • Beáta Megyesi
    Professor, Uppsala University · Lead, DECODE project

    Computational linguist who leads the DECODE database project and co-directs HistoCrypt. Her primary research applies NLP and statistical methods to historical cipher manuscript analysis. Co-author on the Copiale cipher solution (2011) and the Mary Stuart Castelnau letters (2022). The DECODE database she maintains is the primary scholarly resource for manuscript cipher research globally.

    ActiveNLP · Computational
  • Satoshi Tomokiyo
    Independent researcher · Historical cipher manuscripts

    A Japanese independent researcher who has published extensively on Renaissance and early-modern cipher systems, primarily via a long-running personal research website and Cryptologia. Co-author on the Mary Stuart Castelnau paper. His analyses of Argenti family cipher manuscripts and papal diplomatic ciphers are unpublished in journal form but widely cited within the field.

    ActiveRenaissance Ciphers
  • Nick Pelling
    Researcher · Voynich manuscript; historical unsolved ciphers

    Author of The Curse of the Voynich (2006) and one of the field's most thorough Voynich analysts. Pelling's blog Cipher Mysteries is the most comprehensive tracking resource for active unsolved cipher research — covering Rongorongo, Dorabella, McCormick, Zodiac, and Voynich in systematic depth. He has a day job in software; his analytical standards are higher than most academics in this space.

    ActiveUnsolved Ciphers
  • James Gillogly
    Cryptanalyst · Beale Papers, Chaocipher mechanism, historical cipher solutions

    Retired computer scientist and cryptanalyst who has published landmark analyses of major unsolved ciphers: the earliest serious statistical analysis of the unbroken Beale Papers ciphers (B1 and B3), the reconstruction of Chaocipher's mechanism from the Byrne estate papers, and analysis of the McCormick cipher. His papers in Cryptologia are models of rigorous statistical approach to historical cipher problems.

    ActiveStatistical Analysis
  • Elonka Dunin
    Cryptanalyst · Kryptos, Cicada 3301 pioneer; co-author, Cryptanalysis for Beginners

    Game industry veteran turned professional cipher researcher. Maintains the definitive list of famous unsolved ciphers, co-authored the CIA Kryptos FOIA disclosure campaign, and wrote Cryptanalysis for Beginners (with Klaus Schmeh, 2023). Dunin is the primary public interface between the cryptanalysis community and mainstream media on Kryptos and similar challenges. See the Dunin exhibit.

    ActiveKryptosAdvocacy

Primary Source Archives

  • NSA Center for Cryptologic History
    Fort Meade, Maryland · nsa.gov/history

    The NSA's public history arm publishes declassified monographs, oral history transcripts, and the quarterly Cryptolog journal (archived). The VENONA documents (2,900 decrypted messages), the Friedman Collection finding aids, and the technical histories of SIGABA, SIGSALY, and early NSA computing are free downloads. The single richest primary-source archive for 20th-century American cryptologic history.

    Primary SourcesFree
  • GCHQ / Bletchley Park Trust
    UK · bletchleypark.org.uk

    The Bletchley Park Trust maintains an archive of personal papers, photographs, and technical documents from the WWII codebreaking operation. The UK National Archives (Kew) holds the declassified ULTRA material, the Enigma machine service manuals (released 2000), and Lorenz/Colossus technical documents. The Bombe reconstruction project's engineering reports are freely available from the Trust.

    Primary SourcesWWII
  • US National Archives — Record Group 457
    College Park, Maryland · archives.gov

    RG 457 is the primary NSA/ASA/AFSA record group — the largest collection of US SIGINT materials available to researchers. Contains VENONA working papers, original MAGIC ("Purple") intercept files, raw WWII intercept traffic, and NSA's own historical studies of major programs. Many materials require FOIA requests; others are open access. The definitive first stop for primary-source American SIGINT research.

    Primary SourcesSIGINT
  • Elizebeth Friedman Collection — Marshall Library
    Virginia Military Institute, Lexington, VA · marshallfoundation.org

    Elizebeth Friedman's personal papers, opened to researchers in 2008. Contains her correspondence with William Friedman, Coast Guard case files, court testimony transcripts from the Prohibition rum-runner trials, and WWII Abwehr South America materials formerly credited to the FBI. The basis of Fagone's The Woman Who Smashed Codes.

    Primary SourcesBiography
  • Voynich Manuscript — Beinecke MS 408
    Yale University Library · beinecke.library.yale.edu

    Full high-resolution scans of all 240 pages of the Voynich Manuscript are freely available through the Beinecke Rare Book Library. The standard research corpus. Researchers should also consult the Voynich Information Browser (maintained by René Zandbergen), which provides a page-by-page transcript, hand identification, and historical provenance documentation in more detail than any single publication.

    Primary SourcesUnsolvedFree

Web Resources & Software

Analysis Software
CrypTool 2
CrypTool Project (Open Source)

The most comprehensive open-source cryptanalysis workbench. Visual, plugin-based architecture. Implements every classical cipher in this museum plus modern algorithms, statistical analysis tools (IoC, Kasiski, chi-square, n-gram fitness), and historical cipher-specific plugins. Runs on Windows; all algorithms open source. The standard first tool for anyone working on historical cipher texts.

SoftwareFree
Research Website
Cipher Mysteries (Nick Pelling)
nickcelling.org/ciphermysteries

The most comprehensive independent tracking site for unsolved cipher research. Covers Voynich, Rongorongo, Dorabella, McCormick, Zodiac Z-340, and dozens of smaller cases with academic rigor. Pelling documents his methodology, cites primary sources, and regularly updates when new scholarship appears. The best single website for following active unsolved cipher research.

WebsiteUnsolved Ciphers
Community
MysteryTwister C3
CrypTool Project · mysterytwister.org

A structured cipher challenge platform with 500+ cryptanalysis puzzles graded by difficulty (1–4 stars, plus X-class open challenges). Each challenge has a scoring system, hint structure, and verified solution checking. The X-class challenges are genuine research-grade problems — some unsolved for years. The best learning platform that bridges educational puzzles and real cryptanalysis skill.

ChallengesFree
Academic Preprint
Cryptology ePrint Archive
IACR · eprint.iacr.org

The International Association for Cryptological Research's preprint server — the first place new cryptographic results appear. Hosts 18,000+ papers on modern cryptography, post-quantum algorithms, zero-knowledge proofs, and formal security proofs. Not typically historical, but essential for anyone following the modern side of the field that leads from classical cipher principles.

PreprintsModern CryptoFree