Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Origin of Cryptography

Download as pdf or txt
Download as pdf or txt
You are on page 1of 2

ORIGIN OF CRYPTOGRAPHY

http://www.tutorialspoint.com/cryptography/origin_of_cryptography.htm

Copyright tutorialspoint.com

Human being from ages had two inherent needs a to communicate and share information and b
to communicate selectively. These two needs gave rise to the art of coding the messages in such a
way that only the intended people could have access to the information. Unauthorized people
could not extract any information, even if the scrambled messages fell in their hand.
The art and science of concealing the messages to introduce secrecy in information security is
recognized as cryptography.
The word cryptography was coined by combining two Greek words, Krypto meaning hidden and
graphene meaning writing.

History of Cryptography
The art of cryptography is considered to be born along with the art of writing. As civilizations
evolved, human beings got organized in tribes, groups, and kingdoms. This led to the emergence
of ideas such as power, battles, supremacy, and politics. These ideas further fueled the natural
need of people to communicate secretly with selective recipient which in turn ensured the
continuous evolution of cryptography as well.
The roots of cryptography are found in Roman and Egyptian civilizations.

Hieroglyph The Oldest Cryptographic Technique


The first known evidence of cryptography can be traced to the use of hieroglyph. Some 4000
years ago, the Egyptians used to communicate by messages written in hieroglyph. This code was
the secret known only to the scribes who used to transmit messages on behalf of the kings. One
such hieroglyph is shown below.

Later, the scholars moved on to using simple mono-alphabetic substitution ciphers during 500 to
600 BC. This involved replacing alphabets of message with other alphabets with some secret rule.
This rule became a key to retrieve the message back from the garbled message.
The earlier Roman method of cryptography, popularly known as the Caesar Shift Cipher, relies
on shifting the letters of a message by an agreed number threewasacommonchoice, the recipient of this
message would then shift the letters back by the same number and obtain the original message.

Steganography
Steganography is similar but adds another dimension to Cryptography. In this method, people not
only want to protect the secrecy of an information by concealing it, but they also want to make
sure any unauthorized person gets no evidence that the information even exists. For example,
invisible watermarking.
In steganography, an unintended recipient or an intruder is unaware of the fact that observed data
contains hidden information. In cryptography, an intruder is normally aware that data is being
communicated, because they can see the coded/scrambled message.

Evolution of Cryptography
It is during and after the European Renaissance, various Italian and Papal states led the rapid
proliferation of cryptographic techniques. Various analysis and attack techniques were researched
in this era to break the secret codes.
Improved coding techniques such as Vigenere Coding came into existence in the 15th
century, which offered moving letters in the message with a number of variable places
instead of moving them the same number of places.
Only after the 19th century, cryptography evolved from the ad hoc approaches to encryption
to the more sophisticated art and science of information security.
In the early 20th century, the invention of mechanical and electromechanical machines, such
as the Enigma rotor machine, provided more advanced and efficient means of coding the
information.
During the period of World War II, both cryptography and cryptanalysis became
excessively mathematical.
With the advances taking place in this field, government organizations, military units, and some
corporate houses started adopting the applications of cryptography. They used cryptography to
guard their secrets from others. Now, the arrival of computers and the Internet has brought
effective cryptography within the reach of common people.
Loading [MathJax]/jax/output/HTML-CSS/jax.js

You might also like