-
The Egyptians would write these encryptions for a number of reasons. Some believe it was just in just and others believe it was to preserve their culture. During that time the only people that could solve them were those that could understand it. This was done by the Scribes in Egypt.
-
This disk was used to encrypt alphabetic messages. This disk ended up being used by many including the confederates, during the American civil war.
-
This device was developed by the Spartans for military use. it was primarily used to communicate during war time.
-
This was used to protect military messages. Like most of the ciphers it was used to protect a message. This was typically used during a time of war in Rome.
-
Stenography is basically hiding a secret message inside of an ordinary or normal message. it was designed by Johannes Trithmius and its still used by many today. The main use is for hiding messages sometimes where its illegal. Sometimes it can be used by criminals as well to hide messages.
-
This was made by Thomas Jefferson for the us government. This device was typically used during the revolutionary war. This was used to encode messages that were typically sent by letters.
-
This was another method that evolved into secret communications. This telegram was sent to Mexico during world war 1. Which involved an offer of land in exchange for an alliance. The message was intercepted by the British. this helped the brits ultimately sway the us into joining their efforts against Germany.
-
This Machine was very pivotal to the us victory during WW2. this machine was used by the Germans to encrypt messages during that time. The device did have once flaw and that was that it had several weaknesses built into it. This allowed the Allied forces to break the code.
-
This cypher was derived from the Veram cipher. it was made to make a code that was completely random and impossible to break. It is used by many military forces do to its unbreakable nature. still today its use is still significant.
-
This idea came about that there needed to be a way to share a key with users. All without having met them or anything. So this method was mad as a way to use a public key to authenticate the recipient. This was a key part of AES and DES development. despite the keys being public the combinations were made incredibly difficult to brute force.
-
DES was formed for banks and government agencies to use for secure electronic communication. I was eventually succeeded by AES. The main reason was that it was easily brute forced.
-
it was named after is creators at MIT Ron Rivest, Adi Shamir, and Leonard Adleman. This is thought to be the first successful public key ecosystem. It is used by many organizations to send secure messages.
-
It was a Public key encryption tool designed for human rights activism. Its intended use when designed b Philip Zimmerman were to help activist communicate securely. This encryption is mainly aimed at email communication making it hard as possible to crack.
-
As digital communication progressed a need for secure communications was in demand. Thus AES was designed to send messages securely using public keys. This encryption was designed a different key than the one that was used to encrypted it.
-
This method was created by Andrei Broder. This method was to stop spammers from generating post and accounts. It has worked to an extent, but it some have found ways around it.