Sn cryptography

History of Cryptography

By rfelo
  • 1900 BCE

    Egyptian Glyphs

    Egyptian Glyphs
    The Egyptians would write these encryptions for a number of reasons. Some believe it was just in just and others believe it was to preserve their culture. During that time the only people that could solve them were those that could understand it. This was done by the Scribes in Egypt.
  • Period: 1467 BCE to 1863 BCE

    Alberti-Vigenere Cipher

    This disk was used to encrypt alphabetic messages. This disk ended up being used by many including the confederates, during the American civil war.
  • 475 BCE

    Scytale

    Scytale
    This device was developed by the Spartans for military use. it was primarily used to communicate during war time.
  • 44 BCE

    Caesar Cipher

    Caesar Cipher
    This was used to protect military messages. Like most of the ciphers it was used to protect a message. This was typically used during a time of war in Rome.
  • 1499

    Steganography

    Steganography
    Stenography is basically hiding a secret message inside of an ordinary or normal message. it was designed by Johannes Trithmius and its still used by many today. The main use is for hiding messages sometimes where its illegal. Sometimes it can be used by criminals as well to hide messages.
  • Jefferson Wheel

    Jefferson Wheel
    This was made by Thomas Jefferson for the us government. This device was typically used during the revolutionary war. This was used to encode messages that were typically sent by letters.
  • Zimmerman Telegraph

    Zimmerman Telegraph
    This was another method that evolved into secret communications. This telegram was sent to Mexico during world war 1. Which involved an offer of land in exchange for an alliance. The message was intercepted by the British. this helped the brits ultimately sway the us into joining their efforts against Germany.
  • Enigma Machine

    Enigma Machine
    This Machine was very pivotal to the us victory during WW2. this machine was used by the Germans to encrypt messages during that time. The device did have once flaw and that was that it had several weaknesses built into it. This allowed the Allied forces to break the code.
  • One Time Pad

    This cypher was derived from the Veram cipher. it was made to make a code that was completely random and impossible to break. It is used by many military forces do to its unbreakable nature. still today its use is still significant.
  • Public Key Encrytion

    This idea came about that there needed to be a way to share a key with users. All without having met them or anything. So this method was mad as a way to use a public key to authenticate the recipient. This was a key part of AES and DES development. despite the keys being public the combinations were made incredibly difficult to brute force.
  • Data Encryption Standard

    DES was formed for banks and government agencies to use for secure electronic communication. I was eventually succeeded by AES. The main reason was that it was easily brute forced.
  • RSA

    it was named after is creators at MIT Ron Rivest, Adi Shamir, and Leonard Adleman. This is thought to be the first successful public key ecosystem. It is used by many organizations to send secure messages.
  • Pretty Good Privacy

    Pretty Good Privacy
    It was a Public key encryption tool designed for human rights activism. Its intended use when designed b Philip Zimmerman were to help activist communicate securely. This encryption is mainly aimed at email communication making it hard as possible to crack.
  • Asymmetric Key Encryption

    As digital communication progressed a need for secure communications was in demand. Thus AES was designed to send messages securely using public keys. This encryption was designed a different key than the one that was used to encrypted it.
  • Captcha

    Captcha
    This method was created by Andrei Broder. This method was to stop spammers from generating post and accounts. It has worked to an extent, but it some have found ways around it.