blog




  • Essay / History of Cryptography - 1434

    Cryptography is the use of codes and ciphers to protect secrets and has been around for centuries. It has its beginnings in ancient Egypt and has played a role in all parts of history up to its current role in protecting communications on today's computer networks. In classical times, cryptology was not as sophisticated as it is today, but it had its uses at that time. in history. The early Greeks used what was called the Scytale cipher. It was used between the Greek and Spartan armies and was very popular for its ease of use and ability to translate a message. ("The Scytale Cipher", n.d.)The Scytale cipher is known as a transposition cipher and works by taking a roll of paper or leather, in the case of the Greeks, and wrapping it around a cylinder. The user then proceeds to write the message on the cylinder by placing a letter on each paper envelope. This continues until the message is finished. Once completed, the paper is unwrapped and encryption is complete. To be deciphered at the other end, all it takes is a cylinder of the same size. ("The Scytale Cipher", nd) The Romans also used ciphers, notably the Caesar cipher. The Caesar cipher is usually a wheeled device with an inner and outer wheel printed with the alphabet. The Caesar cipher works by replacing one letter of the alphabet with another letter three positions lower. This is one of the easiest codes to crack since there are only 25 possible solutions. ("Caesar Cipher History", nd)One of the most important discoveries regarding the use of cryptography in ancient times was the Rosetta Stone. The Rosetta Stone was discovered in 1799 by Napoleon's army while digging fortifications while stuck in ancient Egypt. The stone story... middle of paper ......com – Ancient/classical history, retrieved March 5, 2014 from http://ancienthistory.about.com/cs/egypt/p/rosettastone. htmLycett, Andrew, (2014), Enigma, BBC – History, retrieved March 5, 2014 from http://www.bbc.co.uk/history/topics/enigmaMorelli, R., (April 25, 2010), Edgar Allan Poe and Cryptography, Cryptography, retrieved March 6, 2014, from http://www.cs.trincoll.edu/~crypto/historical/poe.html Rouse, Margaret, (July 2006), Data Encryption Standard (DES), SearchSecurity, Accessed on March 6, 2014 at http://searchsecurity.techtarget.com/definition/Data-Encryption-StandardServos, William, (2006), The Alberti Cipher, Cryptography, retrieved March 5, 2014 from http://www.cs.trincoll. edu/~crypto/historical/alberti.htmlTyson, Jeff, (nd), How Encryption Works, How Stuff Works, retrieved March 6, 2014 from http://computer.howstuffworks.com/encryption3.htm