Home > Science > Math > Applications > Communication Theory > Cryptography > Historical
http://www.quadibloc.com/crypto/jscrypt.htm
Discusses the types of cipher systems that have been used in the past. Page includes illustrations and tables. Written by John Savard.
http://www.users.globalnet.co.uk/~andlaw/engindex.htm
Download an Enigma emulator for Windows
http://users.telenet.be/d.rijmenants/
Contains historical and technical information about crypto machines and cryptology, with links to free software simulations and tools provided. Links are also provided to related external websites.
http://www.ciphermysteries.com/
News, views, research and reviews of historical ciphers in fiction and non-fiction.
http://www.ilord.com/
Photos, manuals, and other information about the German Enigma, the M-209, and other old encryption machines.
http://www.herongyang.com/Cryptography/
This cryptography tutorial book is a collection of notes and sample codes written by the author while he was learning cryptography technologies himself. Topics include blowfish, certificate, cipher, decryption, DES, digest, encryption, keytool, MD5, OpenSSL, PEM, PKCS#8, PKCS#12, private key, public key, RSA, secret key, SHA1, SSL, X.509.
http://www.codesandciphers.org.uk/enigma/
Explains how the device enciphers letters, background history, components of the machine, and military adaptation by the Germans. Also, includes information about Turing and Polish mathematicians contribution in breaking the code.
http://www.dsm.fordham.edu/~mathai/crypto.html
A historical overview of early cryptographic techniques.
http://www.maritime.org/ecm2.htm
What was the ECM Mk II and why was it important.
Home > Science > Math > Applications > Communication Theory > Cryptography > Historical
Thanks to DMOZ, which built a great web directory for nearly two decades and freely shared it with the web. About us