The History of Cryptography (2024)

Blog > Encryption > The History of Cryptography

Encryption 12-29-2022

DigiCert

The History of Cryptography (1)

Cryptography allows us to interact in the digital world securely by protecting and sending “messages” to the intended recipient through use of algorithms and keys. Digital signing, data privacy, online transactions and more rely on this encryption. It allows us to authenticate people and devices so that we can maintain digital trust.

So how did it all begin?

The word cryptography comes from the Greek words kryptos, meaning hidden, and graphien, meaning to write. This “hidden writing” has been advancing for thousands of years.

What pushes cryptography along, though, is the very thing that brings it down. The more advanced people become at deciphering encrypted messages, the more necessary it is for cryptography to advance in response.

Thus, it is an exciting time to learn about the history of cryptography, what it means for digital trust and how it impacts cybersecurity.

Because after all, without cryptography, there would be no DigiCert.

Ancient cryptography

While cryptography looked different in early civilizations, we have evidence of cryptographic techniques as early as 1900 BC in Egypt, when there was an inscription carved into the main chamber of the tomb of nobleman Khnumhotep II. The hieroglyphics used were different than the usual ones, in a process now known as symbol replacement. However, this wasn’t necessarily a secret code. Rather, they changed the form of writing to make it appear more dignified.

In 1500 BC, a Mesopotamian scribe used cryptography to conceal a formula for pottery glaze. This example is the first known use of cryptography to hide secret information.

These aren’t the only examples, though. There has been evidence of use of cryptography in almost every major early civilization. In early India, “Arthashashtra,” an ancient work on statecraft written by Kautilya, also known as Chanakya, describes how assignments were given to spies in “secret writing.”

The ancient Greeks were known to use ciphers (an algorithm used for encryption or decryption), to transform a message. In 100 BC, Julius Caesar used a form of encryption to share secret messages with his army generals at war. Perhaps you have heard of the Caesar Cipher, as it is one of the most well-known uses of cryptography. Otherwise known as a substitution cipher, each character of the plain text is substituted by another character, forming the cipher text. For example, A becomes D, B becomes E, C becomes F — do you spot the shift of 3?

In the 16th century, the Vigenère Cipher came to be. This method encrypts alphabetic text by using a series of interwoven Caesar ciphers, based on letters of a keyword. This is known as polyalphabetic substitution. While it was first described by Giovan Battista Bellaso in 1553, Blaise de Vigènere got the credit in the 19th century.

Although this cipher is more secure than the Caesar cipher and many people have implemented similar encryption schemes, the Vigènere cipher was broken in 1863 by Friedrich Kasiski.

Cryptography in the 20th century

Next came the Hebern rotating machine created by Edward Hebern in Illinois in 1917. This machine marked the first time electrical circuitry was used in a cipher device, as it combined the mechanical parts of a standard typewriter and the electrical parts of the electric typewriter. Connected through a scrambler, the machine included a disk with electrical contacts on either side (aka a rotor).

Wires were used to connect each letter to another letter on the opposite side in random fashion, also known as a single substitution alphabet.

Cryptography played a huge role in both World War I and World War II. In 1918, the Enigma Machine was created by German engineer Arthur Scheribus. By World War II, it was used regularly by Nazi German military. The machine used three or more rotors to scramble the 26-letter alphabet, rotating at different speeds and outputting ciphertext.

The Enigma Machine was ultimately cracked by Poland, which led the British to create the Bombe, a device that helped to identify the wheel order of the Enigma machine and the rotors’ initial settings.

The use of cryptography up until this point was mostly used for war purposes. However, that changed when businesses saw cryptography’s commercial potential to secure data from competitors.

In the 1970s, IBM created a cipher called Lucifer, a block cipher that uses an algorithm operating on fixed-length groups of bits, called blocks. Block ciphers specifically use symmetric-key algorithms that use same cryptographic keys for both the encryption of plaintext and the decryption of ciphertext.

Lucifer combined transposition and substitution encryption and led to what is now known as the Data Encryption Standard (DES).

The fall of the Data Encryption Standard (DES)

The Data Encryption Standard uses a symmetric-key algorithm and has a key-length of 56 bits, making it too insecure for applications. Regardless, it has been extremely influential in the advancement of cryptography.

DES was submitted to the National Bureau of Standards (NBS) to protect sensitive electronic government data and a modified version was accepted in 1976. In 1977, it became the official Federal Information Processing Standard (FIPS) of the United States.

Unfortunately, it was deemed as insecure. Due to its small key size, it is vulnerable to brute force attacks (when an attacker submits passcode combinations until they eventually guess correctly) and was broken in June of 1997. In 1999, it was deciphered in 22 hours and 15 minutes.

The introduction of Advanced Encryption Standard (AES)

In 2001, the National Institute of Standards and Technology (NIST) (previously National Bureau of Standards) selected the Advanced Encryption Standard (AES) to replace the DES.

AES uses a symmetric-key algorithm and is a subset of the Rijandael block cipher and uses larger key lengths of 128, 192 and 256 bits, with a block size of 128 bits.

In 2002, the U.S. government adopted AES as the federal government standard by the Secretary of Commerce and is the first and only cipher that is public, accessible and approved by the National Security Agency for top secret classified information.

Cryptography today & the cryptography behind TLS/SSL encryption

Today, cryptography is used to protect the billions of online transactions, sensitive data and private messages we transmit.

One way we ensure security is through TLS/SSL.

TLS allows inputted sensitive information to be transmitted securely. Examples include a web server and browser and a mail server and mail client. To establish this secure connection, the browser and the server need an TLS Certificate. If a website starts with https, the site is secured with a TLS certificate.

This is all possible because of the cryptography behind TLS encryption. The use of asymmetric encryption (or public-key cryptography) and symmetric encryption and the many algorithms used to create the asymmetric and symmetric keys behind this encryption allow data encryption so secure, the world’s biggest super computers cannot crack it.

Click here to learn more about public-key cryptography.

Public key infrastructure (PKI)goes beyond web TLS by securing users, identities, devices, files, messages and more by providing a system to secure data. This means it not only secures websites, but also encrypts files, authenticates and encrypts email, authenticates nodes to wireless, authenticates VPN connections and provides authentication measures for IoT devices.

Learn more about PKI.

Cryptography is the means by which we can live in a secure digital world. Without it, we would not be able to transmit the data we send on a daily basis without thinking.

Because after all, without cryptography, digital trust would not be possible.

The History of Cryptography (2024)

FAQs

What is cryptography and its history? ›

In 1500 BC, a Mesopotamian scribe used cryptography to conceal a formula for pottery glaze. This example is the first known use of cryptography to hide secret information. These aren't the only examples, though. There has been evidence of use of cryptography in almost every major early civilization.

What is the origin cryptography? ›

The first known evidence of the use of cryptography (in some form) was found in an inscription carved around 1900 BC, in the main chamber of the tomb of the nobleman Khnumhotep II, in Egypt. The scribe used some unusual hieroglyphic symbols here and there in place of more ordinary ones.

Who is the founding father of cryptography? ›

As a result, Shannon has been called the "founding father of modern cryptography".

What is the history of encryption technology? ›

Encryption can be traced back to its religious use in ancient Egypt, and Greek and Roman military culture, to the World Wars and the creation of the first computer, to finally arrive at its modern use in the era of the World Wide Web.

What is the oldest form of cryptography? ›

Antiquity. A Scytale, an early device for encryption. The earliest known use of cryptography is found in non-standard hieroglyphs carved into the wall of a tomb from the Old Kingdom of Egypt circa 1900 BC.

When was cryptography illegal? ›

After World War II, it was illegal in the US to sell or distribute encryption technology overseas; in fact, encryption was designated as auxiliary military equipment and put on the United States Munitions List.

What is the root of cryptography? ›

The word "cryptography" is derived from the Greek kryptos, meaning hidden. The prefix "crypt-" means "hidden" or "vault," and the suffix "-graphy" stands for "writing." The origin of cryptography is usually dated from about 2000 B.C., with the Egyptian practice of hieroglyphics.

What is the general idea behind cryptography? ›

Cryptography is the process of hiding or coding information so that only the person a message was intended for can read it. The art of cryptography has been used to code messages for thousands of years and continues to be used in bank cards, computer passwords, and ecommerce.

Who is the mother of cryptology? ›

He turned to a woman who was well on her way to being known as the “mother of cryptology.” Her name was Elizebeth Smith Friedman, and by the time Donovan tapped her talents she already had helped transform cryptographic operations for the U.S. War Department during World War I, decoded hundreds of messages between ...

Who is the pioneer of cryptography? ›

1467: Considered the father of modern cryptography, Leon Battista Alberti's work most clearly explored the use of ciphers incorporating multiple alphabets, known as polyphonic cryptosystems, as the middle age's strongest form of encryption.

Did Julius Caesar use cryptography? ›

The "Caesar Box," or "Caesar Cipher," is one of the earliest known ciphers. Developed around 100 BC, it was used by Julius Caesar to send secret messages to his generals in the field. In the event that one of his messages got intercepted, his opponent could not read them.

When did the US first use cryptography? ›

Modern cryptography (computer-based encryption)

In 1973, the US adopted it as a national standard - the Data Encryption Standard, or DES. It remained in use until it cracked in 1997. In the 1970s, academic papers on encryption were classified.

What was the first cipher? ›

The first cipher device appears to have been employed by the ancient Greeks around 400 bce for secret communications between military commanders. This device, called the scytale, consisted of a tapered baton around which was spirally wrapped a piece of parchment inscribed with the message.

What is the greatest encryption device in history? ›

The Enigma machine is one of the most famous encryption devices in history. It was used by the Germans during World War II to transmit coded messages about their plans between units. This machine offered billions of ways to encode a message, which made it difficult to break the code during the war.

What is cryptography in simple words? ›

Cryptography is the process of hiding or coding information so that only the person a message was intended for can read it. The art of cryptography has been used to code messages for thousands of years and continues to be used in bank cards, computer passwords, and ecommerce.

What is the old meaning of cryptography? ›

The word comes from Greek kryptós, meaning "hidden" or "secret," and graphein, meaning "to write." Besides the familiar related words of the same origin, such as cryptic, there is krypton, the name of a colorless gaseous element used especially in some fluorescent lamps and photography flashes.

Top Articles
Left-Click Mouse Causes Deletion in Windows 10/8/7
World Poverty Statistics 2024 | Social Income
Frases para un bendecido domingo: llena tu día con palabras de gratitud y esperanza - Blogfrases
Will Byers X Male Reader
Lowe's Garden Fence Roll
Moon Stone Pokemon Heart Gold
Brady Hughes Justified
Tesla Supercharger La Crosse Photos
Unitedhealthcare Hwp
Flixtor The Meg
Craigslist Parsippany Nj Rooms For Rent
Practical Magic 123Movies
Klustron 9
Elden Ring Dex/Int Build
Tlc Africa Deaths 2021
Learn How to Use X (formerly Twitter) in 15 Minutes or Less
World Cup Soccer Wiki
Bjork & Zhulkie Funeral Home Obituaries
Hartland Liquidation Oconomowoc
Craigslist Sparta Nj
Dallas Craigslist Org Dallas
Grimes County Busted Newspaper
Happy Life 365, Kelly Weekers | 9789021569444 | Boeken | bol
Doublelist Paducah Ky
fft - Fast Fourier transform
Cowboy Pozisyon
Pacman Video Guatemala
Maisons près d'une ville - Štanga - Location de vacances à proximité d'une ville - Štanga | Résultats 201
Login.castlebranch.com
Craftsman Yt3000 Oil Capacity
Nurofen 400mg Tabletten (24 stuks) | De Online Drogist
Ilabs Ucsf
"Pure Onyx" by xxoom from Patreon | Kemono
Average weekly earnings in Great Britain
2015 Chevrolet Silverado 1500 for sale - Houston, TX - craigslist
Joplin Pets Craigslist
Exploring TrippleThePotatoes: A Popular Game - Unblocked Hub
Watchdocumentaries Gun Mayhem 2
Keeper Of The Lost Cities Series - Shannon Messenger
Enjoy4Fun Uno
Gun Mayhem Watchdocumentaries
Gravel Racing
Sun Tracker Pontoon Wiring Diagram
Mychart University Of Iowa Hospital
Unit 11 Homework 3 Area Of Composite Figures
Air Sculpt Houston
The Complete Uber Eats Delivery Driver Guide:
Dicks Mear Me
Makes A Successful Catch Maybe Crossword Clue
Treatise On Jewelcrafting
Where Is Darla-Jean Stanton Now
Selly Medaline
Latest Posts
Article information

Author: Carmelo Roob

Last Updated:

Views: 6165

Rating: 4.4 / 5 (65 voted)

Reviews: 80% of readers found this page helpful

Author information

Name: Carmelo Roob

Birthday: 1995-01-09

Address: Apt. 915 481 Sipes Cliff, New Gonzalobury, CO 80176

Phone: +6773780339780

Job: Sales Executive

Hobby: Gaming, Jogging, Rugby, Video gaming, Handball, Ice skating, Web surfing

Introduction: My name is Carmelo Roob, I am a modern, handsome, delightful, comfortable, attractive, vast, good person who loves writing and wants to share my knowledge and understanding with you.