Wait a second!
More handpicked essays just for you.
More handpicked essays just for you.
Cryptography's history
Cryptography's history
Don’t take our word for it - see why 10 million students trust us with their essay needs.
Recommended: Cryptography's history
Cryptography has been used for thousands of years for storing hidden messages in writing (Davies, 1997). Cryptography itself is part of cryptology, which also includes cryptanalysis. Cryptanalysis involves the attempt to obtain the original message from an encrypted message, but without determining the algorithms or knowing the keys that created the original encrypted message. Cryptography, which is the topic of this paper, is the actual development of the encrypted messages, and using codes to create secure communication of information (Whitman & Mattord, 2011).
As mentioned, cryptography has been around for thousands of years in one form or another. Various forms of “secret writing” were performed and enhanced over time, but there was no remarkable improvement until the Renaissance. At that point, the science of cryptography became an area of study, with techniques being written down. It was brought on by a time of war, competition and political intrigue within the Italian, Venetian and British states (Davies, 1997).
The most dominant form of cryptography was nomenclator, which was developed from simply ciphers where each letter is replaced by a different letter. Substitute letters are part of a fixed table. This technique was very easy to decipher because of commonly used letters and words, but was refined over time to diminish this defect. One technique used to refine nomenclature was the use of polyalphabetic substitution, which uses many cipher alphabets and removes the issue of letter frequency (Davies, 1997).
In the early 1900’s is when many more complex machines were created and were used extensively for cryptography in World War II. The Enigma was one such machine, and was used by the Germans pervasively. Interestingly...
... middle of paper ...
...rd Communication, or Why Not Use PGP. Workshop on Privacy in the Electronic Society 2004.
Callas, J. (2007). The Future of Cryptography. Information Systems Security, 16(1), 15-22. doi:10.1080/10658980601051284
Davies, D. (1997). A Brief History of Cryptography. Information Security Technical Report, 2(2), 14-17.
Fitzpatrick, A. (2014, April 11). Heartbleeding out: Internet security bug even worse than first believed. Time. Retrieved from http://time.com/59390/heartbleed-internet-security-routers/.
Sundt, C. (2010). Cryptopraphy in the real world. Information Security Technical Report, 15(1), 2-7.
Thukral, A. & Zou, X. (2005). Secure group instant messaging using cryptographic primitives. Networking and Mobile Computing (1002-1011). New York City, NY: Springer.
Whitman, M. E. & Mattord, H. J. (2011). Principles of information security. Boston, MA: Cengage Learning.
In the early 1930s, the Japanese Navy purchased a commercial version of the German Enigma and proceeded to modify it by adding features which enhanced its security (Kahn 6). The system that evolved was one of the most secure cryptographic machines in the world. The machine was codenamed "Red" by the US government and was used to encrypt the highest level ...
Whitman, M., & Mattord, H. (2010). Management of information security. (3rd ed., p. 6). Boston, MA: Cengage Learning.
The German Military used the Enigma Machine since 1920. During the time World War Two came along, it had advanced some. The way the machine worked as the operator typed a message and then the Enigma machine scrambled the words using a complicated letter system generated by rotors and electric circuits. To decode a Enigma message, one must need to know the exact settings of the wheels and gears of the machine. German military generals and officers believed that the Enigma Code Machine was unbreakable so they used it for practically everything, battlefield, naval, and just normal war talk. The Polish came close to cracking the Enigma codes by improvising and getting tremendous help from the British at Bletchley Park in Buckinghamshire where a team of intelligent experts eventually cracked the code.
Cipher is used in cryptography for the algorithm purposes. The algorithms include the encryption and the decryption which includes of well defined series of steps that can be followed as a procedure. But sometimes we get the word cipher in a non technical usage which means a code. But this was distinguished from codes when it came to the classical cryptography. To put this information clear, they were used to operate the substitution depending on a large code book that linked characters or figures to a word or phrase. For instance, the code UQJHSE could mean the same as the sentence “Proceed to the following coordinates.” But when it came to cipher, the UQJHSE could mean a plaintext or any other information that a sender would wish to transmit to a receiver (Gershaw, 1989). That was according to cipher, while when it comes to the encrypted form it was known as the ciphertext which had all the information concerning any of the plaintext but was unreadable mostly to the human or any computer without any mechanism to decrypt it. In any operation of the cipher, there must be a key which is always a piece of the auxiliary information. On the other way it can also be termed as a cryptovariable.
World War II Encryption - The Enigma Machine The Enigma machine is an advanced electro-mechanical cipher machine invented by a German, Arthur Scherbius, at the end of World War I. Its only function was to encrypt and decrypt messages. It was used by all of the branches of the German military as the main device to secure wireless communications until the end of World War II.
World War II was a radical war in many ways, but one of the most significant novelties was that of increased use of the radio. Communicating by means of wireless radio became imperative to military forces and their ability to in contact. The need to stay in contact and be able to receive directions was vital to the military. However, there was a significant problem with the use of these radio messages. This problem was that the messages could easily be intercepted and thus important information would often fall into the wrong hands. This important information could include such intelligence as secret plans and instructions. To combat the interception of information by enemies, information was often communicated through using secret codes. Each of the major world powers had their own code machines that would turn any normal text into code. They each had machines that could decrypt their adversaries’ codes also. The ability to decrypt enemy codes became an extremely important and momentous development in World War II.
In 1995, Leonard N. Foner, a researcher at the MIT Media Lab, wrote “Cryptography and the Politics of One’s True Name,” an essay discussing the morality and legality of cryptography in both the public and private sectors. In this essay, he argues that strong cryptography is essential to the privacy of secure exchanges of money and information. While Foner’s essay was certainly relevant when it was written, the advancements in technology made since then as well as the dramatic increase in dependency on cryptography for everyday aspects of life make his essay more relevant than ever. When emphasizing the value of cryptography, Foner explains in great detail how cryptography works, which helps the reader understand the importance and impact of
My knowledge has grown over the past six years, outwith the areas of learning offered by school courses, and I see this course as an opportunity to gain new skills and broaden my knowledge further. My main interests are varied, including communications and the internet, system analysis and design, software development, processors and low level machine studies. I have recently developed an interest in data encryption, hence my active participation in the RSA RC64 Secret-Key challenge, the latest international de-encryption contest from the RSA laboratories of America.
Codes have been around for centuries ranging from wax, invisible ink, Morse code, the Enigma used by the Germans during World War II and now steganographic. Steganography is the latest form to insidiously hide information over the Internet without a trace of a file being altered. You are able to hide messages within images, voice or music. Steganography is an ancient method of hiding messages. Today messages are hidden in images and music. Steganography can be traced back to the ancient Greek who would write messages on tablets and cover them in wax. This made the tablets look blank and unsuspicious (Kolata, F4). Citizens of ancient civilizations would tattoo messages on their shaved heads. They would then let their hair grown in and travel across enemy lines to deliver the message (Seper, G1). During World War II the Allies placed a ban on flower deliveries with dates, crossword puzzles and even report cards (Kolata, F4) for fear of a message being hidden with in. Steganographers first alter their data by using encryption and then place the image into a pre-select image. Steganographers look for a piece of code that would be the least significant and look the least altered to the human eye (Kolata, F4), being as inconspicuousness and random as possible. This makes the messages undetectable unless you knew that there is a message hidden and you were able to crack the code.
In 1930 they had found the source of their problem. Germany had hired, “Hans Schmidt, who invented the enigma machine”, (Sales). This machine enabled Germany to send messages effortlessly with the security of knowing the codes could not be broken. Initially there was only one machine that was to be used as a public machine, but soon the German military contracted Schmidt to build a machine that the German Military could only use.
The Romans also used ciphers, most notably the Caesar Cipher. The Caesar Cipher is typically a wheel device with an inner and outer wheel both printed with the alphabet. The Caesar cipher works by substituting a letter of the alphabet with another letter three positions down. This is one of the easiest codes to break since there are only 25 possible solutions. (“Caesar Cipher History”, n. d.)
Nieva, R 2014, 'Heartbleed bug: What you need to know (FAQ)', CNET, 11 April 2014, viewed 11 April 2014, .
In this era when the Internet provides essential communication between tens of millions of people and is being increasingly used as a tool for security becomes a tremendously important issue to deal with, So it is important to deal with it. There are many aspects to security and many applications, ranging from secure commerce and payments to private communications and protecting passwords. One essential aspect for secure communications is that of cryptography. But it is important to note that while cryptography is necessary for secure communications, it is not by itself sufficient. Cryptography is the science of writing in secret code and is an ancient art; In the old age people use to send encoded message which can be understand by the receiver only who know the symbolic and relative meaning of that encoded message .The first documented use of cryptography in writing dates back to circa 1900 B.C. Egyptian scribe used non-standard hieroglyphs in an inscription. After writing was invented cryptography appeared spontaneously with applications ranging from diplomatic missives to war-time battle plans. It is no surprise, then, that new forms of cryptography came soon after the widespread development of computer communications. In telecommunications and data cryptography is necessary when communicating in any untrusted medium, which includes any network, particularly the Internet [1].Within the context of any application-to-application communication, there are some security requirements, including:
Now is a time which the information is extremely development. A lot of datas are stored by the form of electronic messages. The transmission of the information is often through electronic medium such as mobile phone communication, electronic commerce, the on-line chat service etc. Unfortunately, those way of transmit the information are not safe. The message that we delivered is possible be stolen or monitored. If we have no appropriate protect measure, so once the important messages leaks out, the result may be inconceivable.
Technology continued to prosper in the computer world into the nineteenth century. A major figure during this time is Charles Babbage, designed the idea of the Difference Engine in the year 1820. It was a calculating machine designed to tabulate the results of mathematical functions (Evans, 38). Babbage, however, never completed this invention because he came up with a newer creation in which he named the Analytical Engine. This computer was expected to solve “any mathematical problem” (Triumph, 2). It relied on the punch card input. The machine was never actually finished by Babbage, and today Herman Hollerith has been credited with the fabrication of the punch card tabulating machine.