Cryptography: Difference between revisions
Jump to navigation
Jump to search
No edit summary |
No edit summary |
||
Line 1: | Line 1: | ||
Timeline of cryptography through the middle ages: | Timeline of cryptography through the middle ages: | ||
* 600BCE - Aneis dedicates chapter 31 of ''Poliorketika'' to the use of secret messages. <ref>http://www.aeneastacticus.net/public_html/ab31.htm</ref> | * 600BCE - Aneis dedicates chapter 31 of ''Poliorketika'' to the use of secret messages. <ref>Aeneas Tacticus. Accessed February 17, 2020. http://www.aeneastacticus.net/public_html/ab31.htm.</ref> | ||
* 400BCE - Lysander references the use of the scytale, an early transposition cipher tool. <ref>http://www.historyofinformation.com/detail.php?id=4168</ref> | * 400BCE - Lysander references the use of the scytale, an early transposition cipher tool. <ref>“The Skytale: An Early Greek Cryptographic Device Used in WarfareCirca 650 BCE.” The Skytale: An Early Greek Cryptographic Device Used in Warfare : History of Information. Accessed February 17, 2020. http://www.historyofinformation.com/detail.php?id=4168.</ref> | ||
* 200BCE - Polybius describes the structure and use of the 'Polybius' square | * 200BCE - Polybius describes the structure and use of the 'Polybius' square | ||
* 100BCE - Caesar employs the 'Caesar Cipher' a substitution cipher where the letters in a message are replaced by the letters three spaces forward from the original letter. A becomes D, for example. | * 100BCE - Caesar employs the 'Caesar Cipher' a substitution cipher where the letters in a message are replaced by the letters three spaces forward from the original letter. A becomes D, for example. |
Revision as of 06:42, 17 February 2020
Timeline of cryptography through the middle ages:
- 600BCE - Aneis dedicates chapter 31 of Poliorketika to the use of secret messages. <ref>Aeneas Tacticus. Accessed February 17, 2020. http://www.aeneastacticus.net/public_html/ab31.htm.</ref>
- 400BCE - Lysander references the use of the scytale, an early transposition cipher tool. <ref>“The Skytale: An Early Greek Cryptographic Device Used in WarfareCirca 650 BCE.” The Skytale: An Early Greek Cryptographic Device Used in Warfare : History of Information. Accessed February 17, 2020. http://www.historyofinformation.com/detail.php?id=4168.</ref>
- 200BCE - Polybius describes the structure and use of the 'Polybius' square
- 100BCE - Caesar employs the 'Caesar Cipher' a substitution cipher where the letters in a message are replaced by the letters three spaces forward from the original letter. A becomes D, for example.
- 1250CE - Roger Bacon writes extensively on the use of ciphers in communicating with divine entities.
- 1379CE - Gabriel de Lavinde of Parma writes the first known pamphlet on substitution ciphers where letters are substituted with various symbols
- 1393CE - Chaucer includes ciphers in The Equatorie of the Planetis
- 1467 - Leon Battista Alberti (The father of western cryptography) publishes Di Cifers which includes extensive frequency analysis tables as well as the first known implementation of a polyalphabetic cipher and the cipher wheel device
- 1474 - Cicco Simonetta issues an instructional pamphlet on the practical use and decoding of ciphers 'Rules for Decrypting Enciphered Documents Without a Key'.
- 1518 - Trithemius publishes Polygraphia, the first complete western work dedicated to the topic of cryptography
- 1563 - Porta publishes 'Firtivis Literarum' a comprehensive review of cryptography, cryptology, cryptoanalysis.
- 1605 - Francis Bacon publishes The Advancement of Learning in which he discusses several ciphers including the 'Biliteral', using two alphabets, cipher which is the first known instance of a binary code.
--- This page uses Chicago style citations. For more information check out <ref> Purdue Writing Lab. “Chicago Manual of Style 17th Edition // Purdue Writing Lab.” Purdue Writing Lab. Accessed February 17, 2020. https://owl.purdue.edu/owl/research_and_citation/chicago_manual_17th_edition/cmos_formatting_and_style_guide/chicago_manual_of_style_17th_edition.html.8</ref>
References
<references />