America's History 8th Edition Chapter 27 Key Terms

Ciphers, codes and other encryption methods have been used throughout history by most civilization in some form or other to prevent non-authorized people from understanding messages. They have increased in sophistication considerably throughout history and are commonly in use today.

These 11 methods range from some of the earliest examples in history to some of the most advanced encryption techniques in history.

1. The Caesar Shift Cipher Was Used By the Roman Army

Its First Appearance: Unknown -Likely 1st Century AD

Where It Appeared: Roman Empire

When It Was Cracked (if applicable): Unknown - Likely between 5th and 9th Century AD

The cipher was named in honor of Julius Caesar who, according to Suetonius, used it to encrypt military and other official messages.

As the majority of Rome's enemies were illiterate at this time the cipher remained secure for a time. By the 9th Century AD, after the fall of Rome, records exist of methods to crack it using frequency analysis from Al-Kindi.

11 Cryptographic Methods That Marked History: From the Caesar Cipher to Enigma Code and Beyond
Source: Matt_Crypto/Wikimedia Commons

2. Scytale Was A Simple Cipher Used By The Spartans

Its First Appearance: Ancient Greece - 7th Century BC

Where It Appeared: Classical/Ancient Greece/Sparta

When It Was Cracked (if applicable): Unknown - But known about by Plutarch (50-120AD)

Scytale was an ancient form of encryption commonly in ancient/classical Greece. It is a form of transposition cipher where letters are re-arranged in the messages prior to being deciphered by the recipient.

This method involved the use of a cylinder around which a parchment was wrapped and the message written onto it. The recipient would use a rod of the exact same dimensions to read the message.

Given its simplicity, it was easily decipherable by the enemy too.

11 Cryptographic Methods That Marked History: From the Caesar Cipher to Enigma Code and Beyond
Source: Luringen/Wikimedia Commons

3. Steganography Hides Messages in Plain Sight

Its First Appearance: Circa 440BC

Where It Appeared: Ancient Greece

When It Was Cracked (if applicable): Unknown

Steganography is a method of hiding messages 'in plain sight' by camouflaging it as something else. The earliest recorded use of this form of 'encryption' was described by Herodotus in his Histories.

He describes how Histiaeus sent a message to his vassal,Aristagoras, by shaving the head of his most trusted servant, "marking" the message onto his scalp, and then letting the slave's hair regrow. The slave was then sent to Aristagoras and ordered to once again shave his head.

This method can also be used to hide files or other messages within other files or messages.

4. The Pigpen Cipher Was Used by The Masons

Its First Appearance: Unknown - Perhaps before 1531

Where It Appeared: Europe/Freemasons

When It Was Cracked (if applicable): Unknown

The Pigpen cipher, as known as masonic or freemason cipher, is a geometric simple substitution cipher. It uses symbols to encode the letters within a message.

It is encoded and decoded by producing a grid or set of grids to produce the subsequent symbols.

11 Cryptographic Methods That Marked History: From the Caesar Cipher to Enigma Code and Beyond
Source:(Adapted from)Anomie/Wikimedia Commons

5. Breaking The Enigma Code Significantly Shortened World War 2

Its First Appearance: 1918-1920

Where It Appeared:Germany/Nazi Germany

When It Was Cracked (if applicable): It varies depending on the source - between 1941 and 1945

The term 'Enigma Code' is generally understood as the cipher device used by German forces during WW2 to encrypt their transmissions.

Interesting Facts About the Man Who Broke the Enigma – Alan Turing

Enigma machines were invented by the Germans towards the end of the First World War and were then adopted by various militaries around the world.

During the Second World War, different military services developed their own encryption keys that would often be changed daily. As the allies cracked the codes the Axis forces would be forced to change them - only to have them cracked again.

A primary example of this 'code arms race' was the different phases of the success of German U-Boat 'Wolf Packs' during the Battle for the Atlantic.

The brunt of the deciphering work was conducted by Polish code breakers and famously, Alun Turing and his team at Bletchley Park with his Bombe Enigma cracking machine.

6. The Playfair Cipher Used Pairs of Letters For Encryption

Its First Appearance: 1854

Where It Appeared: England/United Kingdom

When It Was Cracked (if applicable): It was still in use during WW2 but gradually replaced from 1914 onwards.

First developed by Charles Wheatstone in 1854, the Playfair Cipher was named after its promoter, Lord Playfair.

This form of encryption uses pairs of letters rather than single letters in simpler substitution ciphers making it much harder to break.

7. The Polyalphabetic Cipher Finally Bested Frequency Analysis

Its First Appearance: 1467

Where It Appeared: Italy

When It Was Cracked (if applicable): Unknown

Until Leon Battista Alberti devised his polyalphabetic cipher in 1467 most ciphers could be solved using frequency analysis. His method uses various substitution sources for different parts of the message.

This marked the biggest improvement in cryptology since ancient times, earning him the title of "Father of Western Cryptology". At least according to David Khan.

8. TheVigenère Cipher Should Be Called The Bellaso Cipher

Its First Appearance: 1467

Where It Appeared: Italy

When It Was Cracked (if applicable): Decryption technique published in 1863

TheVigenère cipher is now widely accepted to have been originally created by Giovan Battista Bellaso (an Italian Cryptologist). It was later misattributed to Blaise de Vigenère in the 19th Century, hence its current name.

It encrypts text using a series of interwoven Caesar ciphers based on a keyword. It is, therefore, a form ofpolyalphabetic substitution.

11 Cryptographic Methods That Marked History: From the Caesar Cipher to Enigma Code and Beyond
Source: Brandon T. Fields/Wikimedia Commons

9. The Data Encryption Standard Kicked Off Modern Cryptology Advancement

Its First Appearance:1970's

Where It Appeared: IBM, The United States of America

When It Was Cracked (if applicable): It was replaced by AES in the early 21st Century

The Data Encryption Standard (DES) was devised by IBM (based on earlier work by Horst Feistel) during the 1970's. It is a symmetric key algorithm used for the encryption of electronic data.

11 Cryptographic Methods That Marked History: From the Caesar Cipher to Enigma Code and Beyond
Flow diagram for DES processing. Source: Hellisp/Wikimedia Commons

10. Public-Key Cryptography Was An Official Secret For 27 Years

Its First Appearance: 1970

Where It Appeared: United Kingdom

When It Was Cracked (if applicable): It was declassified in 1997

Public Key Cryptography was first conceived by James H. Ellis in 1970 whilst working as a cryptographer for the GCHQ - but he soon ran into problems trying to implement it. His work was improved upon in 1973 by Clifford Cocks who developed RSA encryption algorithm.

Later adapted by Malcolm J. Williamson in 1974 this method of encryption was also used by the NSA and would remain a secret for 27 years until it was declassified in 1997.

11. Advanced Encryption Standard Is the Modern Standard

Its First Appearance: 1998-2001

Where It Appeared: United States of America

When It Was Cracked (if applicable):2011

AES, also called Rijndael, is a modern form of encryption of electronic data that was first published by theU.S.National Institute of Standards and Technology (NIST).

 It has since been adopted worldwide.

America's History 8th Edition Chapter 27 Key Terms

Source: https://interestingengineering.com/11-cryptographic-methods-that-marked-history-from-the-caesar-cipher-to-enigma-code-and-beyond

0 Response to "America's History 8th Edition Chapter 27 Key Terms"

Post a Comment

Iklan Atas Artikel

Iklan Tengah Artikel 1

Iklan Tengah Artikel 2

Iklan Bawah Artikel