Cryptography: Difference between revisions

[accepted revision][accepted revision]
Content deleted Content added
Restored revision 1251034989 by Marcin Rychlewicz (talk): Redundant
Classic cryptography: Added italics
Line 42:
The [[Ancient Greece|Greeks of Classical times]] are said to have known of ciphers (e.g., the [[scytale]] transposition cipher claimed to have been used by the [[Sparta]]n military).<ref name="JrT6G">{{Cite book|first=V.V.|last=I︠A︡shchenko|title=Cryptography: an introduction|year=2002|url={{Google books|cH-NGrpcIMcC|page=6|plainurl=yes}}|publisher=AMS Bookstore|page=6|isbn=978-0-8218-2986-8}}</ref> [[Steganography]] (i.e., hiding even the existence of a message so as to keep it confidential) was also first developed in ancient times. An early example, from [[Herodotus]], was a message tattooed on a slave's shaved head and concealed under the regrown hair.<ref name="kahnbook">{{Cite book|last=Kahn|first=David|author-link=David Kahn (writer)|title=The Codebreakers|year=1967|isbn=978-0-684-83130-5|title-link=The Codebreakers}}</ref> Other steganography methods involve 'hiding in plain sight,' such as using a [[music cipher#Musical Steganography|music cipher]] to disguise an encrypted message within a regular piece of sheet music. More modern examples of steganography include the use of [[invisible ink]], [[microdot]]s, and [[digital watermark]]s to conceal information.
 
In India, the 2000-year-old ''[[KamasutraKama Sutra]]'' of [[Vātsyāyana]] speaks of two different kinds of ciphers called Kautiliyam and Mulavediya. In the Kautiliyam, the cipher letter substitutions are based on phonetic relations, such as vowels becoming consonants. In the Mulavediya, the cipher alphabet consists of pairing letters and using the reciprocal ones.<ref name="kahnbook" />
 
In [[Sassanid Persia]], there were two secret scripts, according to the Muslim author [[Ibn al-Nadim]]: the ''šāh-dabīrīya'' (literally "King's script") which was used for official correspondence, and the ''rāz-saharīya'' which was used to communicate secret messages with other countries.<ref name="VOLuq">{{cite web|url=http://www.iranicaonline.org/articles/codes-romuz-sg|title=CODES – Encyclopaedia Iranica|last=electricpulp.com|website=www.iranicaonline.org|access-date=4 March 2017|archive-date=5 March 2017|archive-url=https://web.archive.org/web/20170305113651/http://www.iranicaonline.org/articles/codes-romuz-sg|url-status=live}}</ref>
pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy