Compatible Development of Cryptography
Compatible Development of Cryptography
Development of Cryptography
Task: Research on the development of cryptography and fill up the table below
with the major events that occurred during each period of time.
Read up on the ciphers you come across in your research and other
classical ciphers.
1900 BC
600 BC
500 BC
50 BC
800
It started in the Egypt town called Menet Khufu near the river Nil.
Khnumhotep II was an architect of Pharao Amenemhet II. He built
some monuments for the Pharao which had to be documented.
Khnumhotep II had the idea to exchange some words and text parts
within the document (substitution). In case the document would been
stolen, the thief would not find the correct way to the gold treasure.
Hebrew scribes writing down the book of Jeremiah used a reversedalphabet simple substitution cipher known as ATBASH. (Jeremiah
started dictating to Baruch in 605 BC but the chapters containing
these bits of cipher are attributed to a source labeled ``C'' (believed
not to be Baruch) which could be an editor writing after the
Babylonian exile in 587 BC, someone contemporaneous with Baruch
or even Jeremiah himself.) ATBASH was one of a few Hebrew ciphers
of the time (SANS).
Thucydides tells of orders delivered to the Spartan prince and
general Pasanius in 475 BCE via what could be the earliest system of
military cryptography, the skytale. As a device for conveying ciphers,
the skytale consists of a staff of wood around which a strip of papyrus
is tightly wound. Writing the message down the length of the staff,
the parchment is unwound to conceal the message. Since the
message appears to be nothing more than a series of disconnected
letters, its true meaning remains concealed. However, it seems
unlikely that such a technique was ever used in this way. Ancient
texts by Aeneas the Tactician, Polybius, and others describe further
methods for concealing messages but none of these actually seem to
have been used either (Glikman). The secret key of the text is the
circumference of the wood. With the wrong circumference, the
message is unusable. If the wood matches, you are able to read the
message. Attacking the skytale was no big thing, this at least when
you understood the principle of the algorithm.
The Caesar Cipher was developed during the roman empire. The
code was based on the replacement of each plaintext character with
a new shifted character in the alphabet. The secret key of the shift
between the plaintext and the ciphertext. As example, if the shift is 5
and the plaintext is
SECRET FOR YOU
the ciphertext would look as in the example below.
XJHWJY KTW DTZ
This because you calculate plaintext + shift (Secret Key) = ciphertext
which is
S + Shift (5) = X.
Cryptanalysis and frequency analysis leading to techniques for
breaking monoalphabetic substitution ciphers are developed in A
Manuscript on Deciphering Cryptographic Messages by the Muslim
1500
1600
1800
1900
1920
1940
1968
1976
1991
2000
2010