-
Leon Battista ALberti invents polyalphabetic cipher.
-
Cryptanalysis and frequency analysis leading to techniques for breaking monoalphabetic substitution ciphers are developed in a manuscript on Deciphering Cryptographic Messages by the Muslim mathematician, Al-Kindi, who was said to be inspired by the textual analysis of the Qur''an. He also covers methods of encipherments, cryptanalysis of certain encipherments, and statistical analysis of letters and letter combinations in Arabic.
-
Reports of stenography in reports to Greece from Persia, Such as tattoo on a shaved head.
-
Ahmad al-Qalqashandi (1355–1418) wrote the Subh al-a 'sha, a 14-volume encyclopedia which included a section on cryptology. This information was attributed to Ibn al-Durayhim who lived from 1312 to 1361, but whose writings on cryptography have been lost. The list of ciphers in this work included both substitution and transposition, and for the first time, a cipher with multiple substitutions for each plaintext letter.
-
Morse conceived of the idea of the single-circuit, electro-magnetic telegraph in 1832. With some assistance from Leonard Gale, a university science professor, Morse spent the next five years developing his ideas into a working model. This included the use of a code of dots and dashes for the letters of the alphabet, which became known as the Morse Code. The dots and dashes were transmitted as short and long electrical impulses with gaps in between.
-
George Scovell was chief codebreaker for the Duke of Wellington. During the Peninsular War of 1808-1814 he developed a system of military communications and intelligence gathering for the British that intercepted French letters and dispatches to and from the battlefield, and cracked their codes, eventually breaking Napoleons code.
-
The Playfair cipher, 1854 by Charles Wheatstone, which encrypts pairs of letters (digraphs), instead of single letters as in the simple substitution cipher. The Playfair is significantly harder to break since the frequency analysis used for simple substitution ciphers does not work with it. Frequency analysis can still be undertaken, but on the 25*25=625 possible digraphs rather than the 25 possible monographs. Frequency analysis thus requires much more ciphertext in order to work.
-
Shortly after the Japanese attacked Pearl Harbor, bringing the United States into war with the Empire, they controlled the Pacific with a very dominant and overwhelming armada. The United States was not prepared to fight a sea war in the Pacific and had to scramble. During one of the most pivital battles of the Pacific war, the United States Navy was able to intercept Japanese orders to it's fleet and decrypt them. Many believe this turned the tide of the war.
-
The Jefferson disk is also known as the Jefferson Wheel Cipher or the Bazeries Cylinder. It was invented in 1795 by the third US president, Thomas Jefferson, but became widely known after it was re-invented by Commandant Etienne Bazeries about a century later [1]. The Jefferson disk was later refined to the M-94 that was used by the United States Army between 1923 and 1942.
-
The Data Encryption Standard (DES) is a symmetric-key block cipher published by the National Institute of Standards and Technology (NIST).
The National Institute of Standards wanted to come up with an industry wide standard of encryption that could be used by all US agencies. They called this standard the Data Encryption Standard and it would stay that way until AES was created. -
Diffie-Hellman key exchange, also called exponential key exchange, is a method of digital encryption that uses numbers raised to specific powers to produce decryption keys on the basis of components that are never directly transmitted, making the task of a would-be code breaker mathematically overwhelming.
-
Created by Phil Zimmermann, PGP (Pretty Good Privacy), is a state-of-the-art cryptography system. It is a very widely used program that encrypts and decrypt emails over the Internet. It can also authenticate messages with digital signatures.
-
AES or Advanced Encryption Standards was a new method of cryptography that utilizes an encryption algorithm created by two Belgian Cryptographers, Joan Daemen and Vincent Rijmen. It specifically increased the block size of key lengths from older methods like DES. This allowed for a high increase in secure encryption that is still used today.
-
t a recent ISSA (Information Systems Security Association) meeting in Los Angeles, a team of FBI agents demonstrated current WEP-cracking techniques and broke a 128 bit WEP key in about three minutes. Special Agent Geoff Bickers ran the Powerpoint presentation and explained the attack, while the other agents (who did not want to be named or photographed) did the dirty work of sniffing wireless traffic and breaking the WEP keys.
-
As of 2015, NIST guidance says that "the use of keys that provide less than 112 bits of security strength for key agreement is now disallowed." NIST approved symmetric encryption algorithms include three-key Triple DES, and AES. Approvals for two-key Triple DES and Skipjack have been withdrawn as of 2015. NIST key management guidelines further suggest that 15360-bit RSA keys are equivalent in strength to 256-bit symmetric keys.