Open main menu
Home
Random
Recent changes
Special pages
Community portal
Preferences
About Wikipedia
Disclaimers
Incubator escapee wiki
Search
User menu
Talk
Dark mode
Contributions
Create account
Log in
Editing
History of cryptography
(section)
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
{{Short description|none}} {{original research|date=January 2018}} {{Use dmy dates|date=December 2020}} Cryptography, the use of codes and ciphers, began thousands of years ago.<ref name="Brief Hist" /> Until recent decades, it has been the story of what might be called [[classical cryptography]] β that is, of methods of [[encryption]] that use pen and paper, or perhaps simple mechanical aids. In the early 20th century, the invention of complex mechanical and electromechanical machines, such as the [[Enigma (machine)|Enigma]] [[rotor machine]], provided more sophisticated and efficient means of encryption; and the subsequent introduction of electronics and computing has allowed elaborate schemes of still greater complexity, most of which are entirely unsuited to pen and paper. The development of [[cryptography]] has been paralleled by the development of [[cryptanalysis]] β the "breaking" of codes and [[cipher]]s. The discovery and application, early on, of [[frequency analysis]] to the reading of encrypted communications has, on occasion, altered the course of history. Thus the [[Zimmermann Telegram]] triggered the United States' entry into World War I; and [[Allies of World War II|Allies]] reading of [[Nazi Germany]]'s ciphers shortened World War II, in some evaluations by as much as two years. Until the 1960s, secure cryptography was largely the preserve of governments. Two events have since brought it squarely into the public domain: the creation of a public encryption standard ([[Data Encryption Standard|DES]]), and the invention of [[public-key cryptography]].
Edit summary
(Briefly describe your changes)
By publishing changes, you agree to the
Terms of Use
, and you irrevocably agree to release your contribution under the
CC BY-SA 4.0 License
and the
GFDL
. You agree that a hyperlink or URL is sufficient attribution under the Creative Commons license.
Cancel
Editing help
(opens in new window)