The History of Cryptography and How it is Used Today

1177 Words3 Pages

Cryptography has been used for thousands of years for storing hidden messages in writing (Davies, 1997). Cryptography itself is part of cryptology, which also includes cryptanalysis. Cryptanalysis involves the attempt to obtain the original message from an encrypted message, but without determining the algorithms or knowing the keys that created the original encrypted message. Cryptography, which is the topic of this paper, is the actual development of the encrypted messages, and using codes to create secure communication of information (Whitman & Mattord, 2011).
As mentioned, cryptography has been around for thousands of years in one form or another. Various forms of “secret writing” were performed and enhanced over time, but there was no remarkable improvement until the Renaissance. At that point, the science of cryptography became an area of study, with techniques being written down. It was brought on by a time of war, competition and political intrigue within the Italian, Venetian and British states (Davies, 1997).
The most dominant form of cryptography was nomenclator, which was developed from simply ciphers where each letter is replaced by a different letter. Substitute letters are part of a fixed table. This technique was very easy to decipher because of commonly used letters and words, but was refined over time to diminish this defect. One technique used to refine nomenclature was the use of polyalphabetic substitution, which uses many cipher alphabets and removes the issue of letter frequency (Davies, 1997).
In the early 1900’s is when many more complex machines were created and were used extensively for cryptography in World War II. The Enigma was one such machine, and was used by the Germans pervasively. Interestingly...

... middle of paper ...

...rd Communication, or Why Not Use PGP. Workshop on Privacy in the Electronic Society 2004.
Callas, J. (2007). The Future of Cryptography. Information Systems Security, 16(1), 15-22. doi:10.1080/10658980601051284
Davies, D. (1997). A Brief History of Cryptography. Information Security Technical Report, 2(2), 14-17.
Fitzpatrick, A. (2014, April 11). Heartbleeding out: Internet security bug even worse than first believed. Time. Retrieved from http://time.com/59390/heartbleed-internet-security-routers/.
Sundt, C. (2010). Cryptopraphy in the real world. Information Security Technical Report, 15(1), 2-7.
Thukral, A. & Zou, X. (2005). Secure group instant messaging using cryptographic primitives. Networking and Mobile Computing (1002-1011). New York City, NY: Springer.
Whitman, M. E. & Mattord, H. J. (2011). Principles of information security. Boston, MA: Cengage Learning.

More about The History of Cryptography and How it is Used Today

Open Document