History of Cryptography
History of Cryptography
Cryptography is a use of the codes and ciphers which is intended to protect secret
which has existed since ancient times. Cryptography has existed since ancient times, when
people used simple techniques to conceal messages from spies or enemies. One of the
oldest examples is Julius Caesar's use of the Caesar cipher, which is the simple encryption
technique that was used by Julius Caesar to send secret messages to his allies where
letters in the message are shifted a certain number of positions to the right in the alphabet.
In the Caesar cipher, each letter in the plaintext message is shifted a certain number of
positions to the right or left in the alphabet.
In the 16th century, Vigenere is designed a cipher believed to be the earliest to use in
an encryption key. the encryption key was reiterated several times throughout the message,
and then the cipher text was generated by combining each character of the message with
the corresponding character of the key, using a mathematical operation known as modulo
26, which is known as modulo or mod in mathematical expression. This operation involves
calculating the remainder when one number is divided by another, ensuring that the resulting
cipher text remains within the bounds of the alphabet.
In the early 19th century, when everything became electric, Hebern introduced an
innovative electro-mechanical device known as the Hebern rotor machine. This device
featured a single rotor, incorporating the secret key within a rotating disc mechanism. The
key encoded a substitution table, and each keystroke generated ciphertext output.
Additionally, each keystroke advanced the rotor by one position, causing a shift to a different
substitution table for the subsequent plaintext character. Despite its complexity, this system
was susceptible to decryption techniques based on letter frequencies.
Based on research, stated that a series of challenges were sponsored to test how
long it would take to decode a message in order to demonstrate that the DES was
insufficient and should no longer be utilized in essential systems. The first contest in 1997
took 84 days to break the encrypted message using a brute force attack. In early 1999, the
last DES challenge took only 22 hours and 15 minutes. The message was decrypted by the
Electronic Frontier Foundation's Deep Crack computer, and won the challenge.
DES AES
Block size 64 bits 128 bits
Today, AES is one of the most popular symmetric key cryptography algorithms for a
wide range of encryption applications for both government and commercial use.
Cryptography is used in various applications, including digital communication, data security,
and blockchain technology.
https://en.wikipedia.org/wiki/History_of_cryptography
https://en.wikipedia.org/wiki/Caesar_cipher
https://www.geeksforgeeks.org/caesar-cipher-in-cryptography/
https://www.redhat.com/en/blog/brief-history-cryptography
Wikipedia contributors. (n.d.). History of cryptography. In Wikipedia. Retrieved February 26,
2024, from https://en.wikipedia.org/wiki/History_of_cryptography
Wikipedia contributors. (n.d.). Caesar cipher. In Wikipedia. Retrieved February 26, 2024,
from https://en.wikipedia.org/wiki/Caesar_cipher
GeeksforGeeks. (n.d.). Caesar Cipher in Cryptography. Retrieved February 26, 2024, from
https://www.geeksforgeeks.org/caesar-cipher-in-cryptography/
Red Hat. (n.d.). A Brief History of Cryptography. Retrieved February 26, 2024, from
https://www.redhat.com/en/blog/brief-history-cryptography