Book on history of codes and ciphers

Grants | Legacy Digitization |
Listen: 3449516
0:00

Privacy has been a worry throughout human history. As soon as people learned to write, they wanted to be able to encrypt their messages so not everyone could read them. The earliest ciphers were simple, you would replace a letter with a number or another letter. The receiver of the message would use a key to decipher the meaning. Simon Singh explains the history and the mechanics of ciphers in his new paperback, "The Code Book". While secret messages most often are used in government, the military and commerce, Singh told Minnesota Public Radio's Stephanie Curtis, that regular people have used secret codes, too, usually for very personal reasons.

Funders

Digitization made possible by the State of Minnesota Legacy Amendment’s Arts and Cultural Heritage Fund, approved by voters in 2008.

This Story Appears in the Following Collections

Views and opinions expressed in the content do not represent the opinions of APMG. APMG is not responsible for objectionable content and language represented on the site. Please use the "Contact Us" button if you'd like to report a piece of content. Thank you.

Transcriptions provided are machine generated, and while APMG makes the best effort for accuracy, mistakes will happen. Please excuse these errors and use the "Contact Us" button if you'd like to report an error. Thank you.

< path d="M23.5-64c0 0.1 0 0.1 0 0.2 -0.1 0.1-0.1 0.1-0.2 0.1 -0.1 0.1-0.1 0.3-0.1 0.4 -0.2 0.1 0 0.2 0 0.3 0 0 0 0.1 0 0.2 0 0.1 0 0.3 0.1 0.4 0.1 0.2 0.3 0.4 0.4 0.5 0.2 0.1 0.4 0.6 0.6 0.6 0.2 0 0.4-0.1 0.5-0.1 0.2 0 0.4 0 0.6-0.1 0.2-0.1 0.1-0.3 0.3-0.5 0.1-0.1 0.3 0 0.4-0.1 0.2-0.1 0.3-0.3 0.4-0.5 0-0.1 0-0.1 0-0.2 0-0.1 0.1-0.2 0.1-0.3 0-0.1-0.1-0.1-0.1-0.2 0-0.1 0-0.2 0-0.3 0-0.2 0-0.4-0.1-0.5 -0.4-0.7-1.2-0.9-2-0.8 -0.2 0-0.3 0.1-0.4 0.2 -0.2 0.1-0.1 0.2-0.3 0.2 -0.1 0-0.2 0.1-0.2 0.2C23.5-64 23.5-64.1 23.5-64 23.5-64 23.5-64 23.5-64"/>