0% found this document useful (0 votes)
35 views3 pages

History of Cryptography

Uploaded by

kl2304013020
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
35 views3 pages

History of Cryptography

Uploaded by

kl2304013020
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

HISTORY OF CRYPTOGRAPHY

Cryptography is a use of the codes and ciphers which is intended to protect secret
which has existed since ancient times. Cryptography has existed since ancient times, when
people used simple techniques to conceal messages from spies or enemies. One of the
oldest examples is Julius Caesar's use of the Caesar cipher, which is the simple encryption
technique that was used by Julius Caesar to send secret messages to his allies where
letters in the message are shifted a certain number of positions to the right in the alphabet.
In the Caesar cipher, each letter in the plaintext message is shifted a certain number of
positions to the right or left in the alphabet.

THE ROLE OF ENCRYPTION KEYS IN EARLY CRYPTOGRAPHY

In the 16th century, Vigenere is designed a cipher believed to be the earliest to use in
an encryption key. the encryption key was reiterated several times throughout the message,
and then the cipher text was generated by combining each character of the message with
the corresponding character of the key, using a mathematical operation known as modulo
26, which is known as modulo or mod in mathematical expression. This operation involves
calculating the remainder when one number is divided by another, ensuring that the resulting
cipher text remains within the bounds of the alphabet.

In the early 19th century, when everything became electric, Hebern introduced an
innovative electro-mechanical device known as the Hebern rotor machine. This device
featured a single rotor, incorporating the secret key within a rotating disc mechanism. The
key encoded a substitution table, and each keystroke generated ciphertext output.
Additionally, each keystroke advanced the rotor by one position, causing a shift to a different
substitution table for the subsequent plaintext character. Despite its complexity, this system
was susceptible to decryption techniques based on letter frequencies.

During the Middle Ages, cryptography became increasingly important in secret


communication among governments and the military. One of the most famous cryptographic
tools from this period is the Enigma machine, used by the Nazi Germans during World War
II. Until the 1960s, secure cryptography was largely the preserve of governments. Two
events have since brought it squarely into the public domain: the creation of a public
encryption standard (DES), and the invention of public-key cryptography.
Data Encryption Standard (DES) was developed in the early 1970s by a group of
International Business Machines (IBM) team and was submitted to the United States
government to secure unclassified, yet sensitive, government information. The standard had
its details published in the Federal Register, making it possible for the general public to
study, review, and find weaknesses in the standard. Because it was public, commercial
organizations also were able to use it, and largely did so.

Based on research, stated that a series of challenges were sponsored to test how
long it would take to decode a message in order to demonstrate that the DES was
insufficient and should no longer be utilized in essential systems. The first contest in 1997
took 84 days to break the encrypted message using a brute force attack. In early 1999, the
last DES challenge took only 22 hours and 15 minutes. The message was decrypted by the
Electronic Frontier Foundation's Deep Crack computer, and won the challenge.

Over time, it proved to be insufficient in protecting data for government and


commercial data. It has been replaced by the Advanced Encryption Standard (AES), which
can encrypt more information at once and in a more complex way. Table 1.1 below shows
the difference between DES and AES.

DES AES
Block size 64 bits 128 bits

Key length 56 bits 128,192,256 bits


Encryption primitives Substitution, permutation Substitution, shift, bit mixing
Design Open Open
Design rationale Closed Open

Cryptographic primitives Confusion, diffusion Confusion, diffusion


Source IBM enhanced by NSA Independent cryptographers
Table 1.1 Comparison between DES and AES

Today, AES is one of the most popular symmetric key cryptography algorithms for a
wide range of encryption applications for both government and commercial use.
Cryptography is used in various applications, including digital communication, data security,
and blockchain technology.
https://en.wikipedia.org/wiki/History_of_cryptography
https://en.wikipedia.org/wiki/Caesar_cipher
https://www.geeksforgeeks.org/caesar-cipher-in-cryptography/
https://www.redhat.com/en/blog/brief-history-cryptography
Wikipedia contributors. (n.d.). History of cryptography. In Wikipedia. Retrieved February 26,
2024, from https://en.wikipedia.org/wiki/History_of_cryptography
Wikipedia contributors. (n.d.). Caesar cipher. In Wikipedia. Retrieved February 26, 2024,
from https://en.wikipedia.org/wiki/Caesar_cipher
GeeksforGeeks. (n.d.). Caesar Cipher in Cryptography. Retrieved February 26, 2024, from
https://www.geeksforgeeks.org/caesar-cipher-in-cryptography/
Red Hat. (n.d.). A Brief History of Cryptography. Retrieved February 26, 2024, from
https://www.redhat.com/en/blog/brief-history-cryptography

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy