[1]. Thomas H. Barr, Invitation to Cryptology, Prentice Hall, Inc., New Jersey, 2002. 

[2]. National Security Agency Photo Gallery, Last Accessed August 30, 2004,  

[3]. Simon Singh,The code book: how to make it, break it, hack it, crack it, Delacorte Press, New York, 2002. 

[4]. Wade Trappe, and Lawrence C. Washington, Introduction to Cryptography with Coding Theory, Prentice Hall, 2002. 

[5]. Neal Koblitz., Cryptography As A Teaching Tool, Last Accessed August 30, 2004 

[6]. R.L. Rivest, A. Shamir, and L. Adleman, A Method for Obtaining Digital Signatures and Public-Key Cryptosystem, Communications of A.C.M., 21(1978), 120-126. 

[7]. W. Diffe and M. Hellman, Privacy and Authentication: An Introduction to Cryptography, Proc. of the IEEE, 76(1979), 397-427. 

[8]. Taher El Gamal, A Public Key Cryptosystem and a Signature Schema Based Discrete Logarithms, IEEE Transactions on Information Theory, 31(1985), 469-472.


Web Links

Learning About Cryptography

AES Algorithm (Rijndael) Information

Enigma Working principle

Introduction to Cryptography

PGP Cryptography

Electronic Frontiers Australia 

DES Encryption

German Enigma Machine Designed by: Bodie

Photos of The Enigma Machine

Cryptography A-Z


More Links will be added soon.