Wait a second!
More handpicked essays just for you.
More handpicked essays just for you.
An Easy To Understand History Of Cryptography
History of encryption technology
Don’t take our word for it - see why 10 million students trust us with their essay needs.
Recommended: An Easy To Understand History Of Cryptography
Cryptography is the use of codes and ciphers to protect secrets and has been around for centuries. It has its beginnings in ancient Egypt and has played a role in every part of history to its current role in protecting communications across today’s computer networks.
In classical times cryptology was not as sophisticated as it is today, but it had its uses for that time in history. The early Greeks used what was called the Scytale Cipher. It was used between the Greek and Spartan armies and was very popular for its ease of use and the ability to translate a message. (“The Scytale Cipher”, n. d.)
The Scytale cipher is known as a transposition cipher and works by taking a roll of paper or leather, in the case of the Greeks, and wrapping it around a cylinder. The user then proceeds to write the message across the cylinder by placing a letter on each wrap of the paper. This continues until the message is complete. Once complete the paper is unwrapped and the encryption is complete. In order to be decrypted at the other end all that is needed is a cylinder of the same size. (“The Scytale Cipher”, n. d.)
The Romans also used ciphers, most notably the Caesar Cipher. The Caesar Cipher is typically a wheel device with an inner and outer wheel both printed with the alphabet. The Caesar cipher works by substituting a letter of the alphabet with another letter three positions down. This is one of the easiest codes to break since there are only 25 possible solutions. (“Caesar Cipher History”, n. d.)
One of the most significant discoveries of the use of cryptography in ancient times was the Rosetta Stone. The Rosetta Stone was discovered in 1799 by Napoleon’s army while digging fortifications while stranded in ancient Egypt. The stone told...
... middle of paper ...
...com – Ancient / Classical History, Retrieved March 5, 2014, from http://ancienthistory.about.com/cs/egypt/p/rosettastone.htm
Lycett, Andrew, (2014), Enigma, BBC – History, Retrieved March 5, 2014, from http://www.bbc.co.uk/history/topics/enigma
Morelli, R., (April 25, 2010), Edgar Allan Poe and Cryptography, Cryptography, Retrieved March 6, 2014, from http://www.cs.trincoll.edu/~crypto/historical/poe.html
Rouse, Margaret, (July 2006), Data Encryption Standard (DES), SearchSecurity, Retrieved March 6, 2014, from http://searchsecurity.techtarget.com/definition/Data-Encryption-Standard
Servos, William, (2006), The Alberti Cipher, Cryptography, Retrieved March 5, 2014, from http://www.cs.trincoll.edu/~crypto/historical/alberti.html
Tyson, Jeff, (n. d.), How Encryption Works, How Stuff Works, retrieved March 6, 2014, from http://computer.howstuffworks.com/encryption3.htm
The sender would type the message in plaintext (not encrypted) and the letters would be illuminated on a glass screen. With the press of each typewriter key the rotor would shift 1/26 of a revolution giving each letter a different encryption each time, which made the code so difficult to crack. Due to the complexity of the code the enigma became very useful for the Germans for radioing messages to u-boats. The cipher was finally broken when the British were able to capture some key documents from a German warship.
What is encryption? Encryption is a technological technique that protects and secures the transfer of plain text information between two sources through the use of the internet. This is done by rearranging the text using a mathematical algorithm that renovates the message into an indecipherable form, which can only be unlocked and translated with a use of a key. The strength of the encryption key is measured by its length, which is determined by the number of bits and by the type of encryption program.
Alan Turing was a very intelligent man who attended Bletchley Park the main site for code breaking. Alan Turing invented “bombe,” an electromechanical device. “Bombe” helped decipher encrypted messages given by Enigma. Later Gordon Welchman made significant improvements to “bombe.” The information received from Enigma, known as “ultra” was used in every step of the decoding process (O’Neill 160). Ultra was considered as ‘top secret’ and only few knew about the whole operation. Turing’s impeccable intelligence helped break Enigma. As well as develop a technique, “banburismus” that later helped read naval messages. Thanks to Turing and the “bombe” German codes were broken and prevented many
The Rosetta Stone In 1799, when Napoleon’s army dismantled a wall in Rashid, Egypt, they discovered the Rosetta Stone. Little did they know that this 11-inch thick piece of rock would be one of the greatest discoveries in history! It contained Egyptian scripture, with Greek also on the stone. This was used to decode the once lost Egyptian writing system. Before the 1800’s, attempts at trying to uncover the secrets held by the ancient Egyptian hieroglyphics found on walls inside numerous tombs were useless.
..., Nicholas G. 2010. “Past, Present, and Future Methods of Cryptography and Data Encryption.” Department of Electrical and Computer Engineering
The very first breakthrough of deciphering the writings Linear A and Linear B came during the 1950’s when archaeologists named Alice Kober created a method of deciding the grammatical relationship between the symbols in Linear B. In her conclusion Kober determined that the symbols in Linear B depicted syllables instead of letters. Some of the scripts that the archaeologists found during the 20th century came from Ancient Greece, notably Mycenae, Pylos, and also Knossos which is on the island of Crete. The scripts had been encoded with Linear B writings on clay tablets. These scripts had about 90 different characters on them. Later after discovering these scripts an archeologist named Michael Ventris would be the first to decipher these writings. Ventris compared the writings from the mainland Greece to those form Crete. Certain symbols and words appeared on the Cretan texts but did not on the Greek ones. Michael Ventris then made a hypothesis that the words on the scripts were names of cities and place names in Crete. With these names Ventris was able to uncover much of the language. In conclusion, Ventris determined that the language of Linear B was Greek.
The ancient Egyptians believed that it was important to record and communicate information about religion and government. Thus, they invented written scripts that could be used to record this
The RSA encryption is related to the cipher of Julius Caesar (1300s) that shifts three letters to encode messages. The cipher of Julius Caesar was used in war to send messages securely. Here is how Caesar encodes his message using the cipher. First Caesar assigned A through Z to 0 through 25. For instance A is zero. Second, add three to each numbers.
Codes have been around for centuries ranging from wax, invisible ink, Morse code, the Enigma used by the Germans during World War II and now steganographic. Steganography is the latest form to insidiously hide information over the Internet without a trace of a file being altered. You are able to hide messages within images, voice or music. Steganography is an ancient method of hiding messages. Today messages are hidden in images and music. Steganography can be traced back to the ancient Greek who would write messages on tablets and cover them in wax. This made the tablets look blank and unsuspicious (Kolata, F4). Citizens of ancient civilizations would tattoo messages on their shaved heads. They would then let their hair grown in and travel across enemy lines to deliver the message (Seper, G1). During World War II the Allies placed a ban on flower deliveries with dates, crossword puzzles and even report cards (Kolata, F4) for fear of a message being hidden with in. Steganographers first alter their data by using encryption and then place the image into a pre-select image. Steganographers look for a piece of code that would be the least significant and look the least altered to the human eye (Kolata, F4), being as inconspicuousness and random as possible. This makes the messages undetectable unless you knew that there is a message hidden and you were able to crack the code.
During the world wars, the biggest wars in modern history, it was important for countries to send their messages to allies and armies without being detected by other countries. The information transported by secret message, or codes, was usually about tactics, military orders or top secrets. So for the enemies, it was also very crucial for them to break the code and know what their enemy was thinking about. Although code breaking was done in the hidden place that Breaking code was one of the important actions done during the world war in order to reduce the danger but increase the probability of winning.
Cryptography was first used long before the invention of computers. One well-known system was attributed to the reign of Julius Caesar (Klein ix). Another example is the famous Zimmerman telegraph, which was sent from Germany to Mexico during World War I (ix). In a more modern setting, cryptology was mainly used by the government until the late 1970s (Simpson 1). This is largely due to the fact that computers were too expensive, so not many households or businesses had them (1). However, after the computer revolution, cryptology became more public, especially in the business industry where there was a greater need to secure things like transactions (1).
Have you heard of the Voynich Manuscript? The Voynich manuscript is a secret code containing six sections and has a long history background. Also, surprisingly the manuscript has not been decoded. Many people have tried to decode it, and people have come up with many theories for its meaning. However, some other people have theories that the manuscript is a hoax. This ancient manuscript is a very fascinating and complexing thing.
It was not just used by the small group of people, typically bureaucrats, which usually happened in the Bronze Age of Greece (in Mycenae, for example), but by at least all the male landowners. It was often used to write jokes on vessels that were used to drink wine during the symposiums, which were basically some kind of parties. The fact of being able to write something by yourself was a privilege, that everyone wanted to have. Therefore, the spread of the alphabet through writing the names or jokes on the cups happened much more quickly, than we usually imagine (Eric Powell, 2017, Vol. 70, Issue 3).
In 500 B.C. the abacus was first used by the Babylonians as an aid to simple arithmetic. In 1623 Wihelm Schickard (1592 - 1635) invented a "Calculating Clock". This mechanical machine could add and subtract up to 6 digit numbers, and warned of an overflow by ringing a bell. J. H. Mueller comes up with the idea of the "difference engine", in 1786. This calculator could tabulate values of a polynomial. Muellers attempt to raise funds fails and the project was forgotten. Scheutz and his son Edward produced a 3rd order difference engine with a printer in 1843 and their government agreed to fund their next project.
Thousands of years ago calculations were done using people’s fingers and pebbles that were found just lying around. Technology has transformed so much that today the most complicated computations are done within seconds. Human dependency on computers is increasing everyday. Just think how hard it would be to live a week without a computer. We owe the advancements of computers and other such electronic devices to the intelligence of men of the past.