The Mathematics of Secrets: Cryptography from Caesar Ciphers to Digital Encryption, by Joshua Holden

Keeping the algorithms that encrypt our data secure is crucial, says Noel-Ann Bradshaw

April 6, 2017
Source: iStock

Nowadays almost everyone is a frequent sender of secret messages, albeit often without realising it. Every time we purchase an item online or send an email our details are encrypted; we assume that this is secure and do not question the algorithms used. But have you ever wondered how these algorithms work and where they originated?

In The Mathematics of Secrets, Joshua Holden takes the reader on a chronological journey from Julius Caesar’s substitution cipher to modern day public-key algorithms and beyond, showing how Alice and Bob can communicate without eavesdropping Eve deciphering their messages. With the introduction of each cipher, Holden explains the underlying mathematics required to encrypt the message and subsequently decipher it, usually with a key of some description.

Potential readers should not be overly concerned about their mathematical ability. In the book’s first half, no more than school mathematics is needed, as the ciphers described are underpinned by modular arithmetic (which can be described as the mathematics of the 24-hour clock and is fully explained by Holden). Even when the maths becomes more complex, lay readers can still appreciate the beauty of the cipher while skipping some of the theory.

Written for anyone with an interest in cryptography, The Mathematics of Secrets is substantial enough to be recommended background reading for undergraduate or postgraduate modules on this topic. However, it is not a book that can be read quickly. Readers will want to stop and think, work out the messages and, in some cases, encrypt their own. Indeed, I challenge anyone to read Holden’s delightful description of Alberti’s cipher disk without wanting to stop and make one themselves.

As the book progresses, the mathematics becomes more demanding, with the introduction of Fermat’s Little Theorem (different from the one that Andrew Wiles famously proved), Euclid’s Algorithm and elliptic curves. For me, it is these later chapters that are the most gripping. They focus on several algorithms within public-key cryptography, which Holden describes as being “systems that allow Alice and Bob to communicate securely without an initial secure meeting” to agree a key. The key is often in the public domain, but for various reasons, Eve cannot use it to decipher the messages, usually because it would take too long to compute a missing part of the key. Many of these algorithms involve the multiplication of large prime numbers resulting in a number that is hard to factorise. However, it is often not that simple, and there are situations when public-key encryption can be broken, if sufficient care is not taken over the numbers used in the encryption process.

Despite modern-day encryption algorithms, correctly implemented, being difficult to crack, there is always the danger that someone will discover a way to break them. In the book’s final chapter, Holden focuses on quantum computing and the considerable repercussions that developments in this field might have in rendering public-key cryptography insecure, and thus the enormous impact that this will have on global data security. Alice, Bob and Eve are not going to go away; there will always be a need to transmit messages secretly, and therefore there will always be those who seek to decipher them.

Noel-Ann Bradshaw is principal lecturer in mathematics, University of Greenwich.

The Mathematics of Secrets: Cryptography from Caesar Ciphers to Digital Encryption
By Joshua Holden
Princeton University Press, 392pp, £24.95
ISBN 9780691141756 and 9781400885626 (e-book)
Published 22 February 2017

You've reached your article limit.

Register to continue

Registration is free and only takes a moment. Once registered you can read a total of 3 articles each month, plus:

  • Sign up for the editor's highlights
  • Receive World University Rankings news first
  • Get job alerts, shortlist jobs and save job searches
  • Participate in reader discussions and post comments


Print headline: Do you want to know a secret?

Have your say

Log in or register to post comments

Featured Jobs

Most Commented

Monster behind man at desk

Despite all that’s been done to improve doctoral study, horror stories keep coming. Here three students relate PhD nightmares while two academics advise on how to ensure a successful supervision

Sir Christopher Snowden, former Universities UK president, attacks ratings in wake of Southampton’s bronze award

opinion illustration

Eliminating cheating services, even if it were possible, would do nothing to address students’ and universities’ lack of interest in learning, says Stuart Macdonald

Female professor

New data show proportion of professors who are women has declined at some institutions

celebrate, cheer, tef results

Emilie Murphy calls on those who challenged the teaching excellence framework methodology in the past to stop sharing their university ratings with pride