- Timeline of cryptography
Below is a timeline of notable events related to
cryptography .BCE
*3500s - The Sumerians develop "cuneiform" writing and the Egyptians develop "hieroglyphic" writing.
*1500s - The Phoenicians develop an alphabet
*600-500 - Hebrew scholars make use of simple monoalphabetic substitution ciphers (such as theAtbash cipher )
*c. 400 - Spartan use ofscytale (alleged)
*c. 400 -Herodotus reports use ofsteganography in reports toGreece fromPersia (tattoo on shaved head)
*100-1 CE - Notable Roman ciphers such as theCaeser cipher .1 - 1799 CE
*801–873 CE -
Cryptanalysis and frequency analysis leading to techniques for breaking monoalphabetic substitution ciphers are developed in "A Manuscript on Deciphering Cryptographic Messages" by the Muslim mathematician,Al-Kindi (Alkindus), who may have been inspired by textual analysis of theQur'an . He also covers methods of encipherments, cryptanalysis of certain encipherments, and statistical analysis of letters and letter combinations in Arabic.
*1355-1418 -Ahmad al-Qalqashandi writes "Subh al-a 'sha", a 14-volume encyclopedia including a section on cryptology, attributed to Taj ad-Din Ali ibn ad-Duraihim ben Muhammad ath-Tha 'alibi al-Mausili (1312-1361). The list ofcipher s in this work include both substitution and transposition, and for the first time, a cipher with multiple substitutions for eachplaintext letter. It also included an exposition on and worked example of cryptanalysis, including the use of tables ofletter frequencies and sets of letters which can not occur together in one word.
*1450 - The Chinese develop wooden blockmovable type printing.
*1450-1520 - TheVoynich manuscript , an example of a possibly encoded illustrated book, is written.
*1466 -Leon Battista Alberti inventspolyalphabetic cipher , also first known mechanical cipher machine
*1518 -Johannes Trithemius ' book on cryptology
*1553 - Bellaso inventsVigenère cipher
*1585 - Vigenère's book on ciphers
*1586 - Cryptanalysis used by spy master SirFrancis Walsingham to implicateMary Queen of Scots in theBabington Plot to murderQueen Elizabeth I ofEngland . Queen Mary was eventually executed.
*1641 - Wilkins' "Mercury" (English book on cryptology)
*1793 -Claude Chappe establishes the first long-distance semaphore telegraph line
*1795 -Thomas Jefferson invents theJefferson disk cipher, reinvented over 100 years later byEtienne Bazeries 1800-1899
*1809-14 George Scovell's work on Napoleonic ciphers during the
Peninsular War
*1831 -Joseph Henry proposes and builds an electrictelegraph
*1835 -Samuel Morse develops theMorse code
*1854 -Wheatstone inventsPlayfair cipher
*c. 1854 -Babbage 's method for breaking polyalphabetic ciphers (pub 1863 byKasiski )
*1855 - For the English side inCrimean War ,Charles Babbage broke Vigenère's autokey cipher (the 'unbreakable cipher' of the time) as well as the much weaker cipher that is calledVigenère cipher today. Due to secrecy it was also discovered and attributed somewhat later to the Prussian Friedrich Kasiski.
*1883 -Auguste Kerckhoffs ' "La Cryptographie militare" published, containing his celebrated laws of cryptography
*1885 -Beale ciphers published
*1894 - TheDreyfus Affair inFrance involves the use of cryptography, and its misuse, in regard to false documents.1900 - 1949
*c 1915 -
William Friedman appliesstatistics to cryptanalysis (coincidence counting, etc)
* 1917 -Gilbert Vernam develops first practical implementation of ateletype cipher, now known as astream cipher and, later, withJoseph Mauborgne theone-time pad
* 1917 -Zimmermann telegram intercepted and decrypted, advancing U.S. entry intoWorld War I
*1919 -Weimar Germany Foreign Office adopts (a manual) one-time pad for some traffic
*1919 -Edward Hebern invents/patents first rotor machine design -- Damm, Scherbius and Koch follow with patents the same year
* 1921 -Washington Naval Conference - U.S. negotiating team aided by decryption ofJapan ese diplomatic telegrams
*c. 1924 - MI8 (Herbert Yardley , et al) provide breaks of assorted traffic in support of US position atWashington Naval Conference
*c. 1932 - first break of German Army Enigma byMarian Rejewski in Poland
* 1929 - U.S.Secretary of State Henry L. Stimson shuts down State Department cryptanalysis "Black Chamber", saying "Gentlemen do not read each other's mail."
* 1931 - "The American Black Chamber" byHerbert O. Yardley is published, revealing much about American cryptography
* 1940 - break of Japan'sPURPLE machine cipher bySIS team
*December 7 1941 - U.S. Naval base atPearl Harbor surprised by Japanese attack, despite U.S. breaking of Japanese codes. U.S. entersWorld War II
* June 1942 -Battle of Midway where U.S. partial break into Dec 41 edition ofJN-25 leads to turning-point victory over Japan
* April 1943 -Admiral Yamamoto , architect of Pearl Harbor attack, is assassinated by U.S. forces who know his itinerary from decoded messages
*April 1943 -Max Newman , Wynn-Williams, and their team (includingAlan Turing ) at the secret Government Code and Cypher School ('Station X'),Bletchley Park , Bletchley, England, complete the "Heath Robinson". This is a specialized machine for cipher-breaking, not a general-purpose calculator or computer.
*December 1943 - TheColossus computer was built, byThomas Flowers at The Post Office Research Laboratories inLondon , to crack the GermanLorenz cipher (SZ42). Colossus was used at Bletchley Park during WW II - as a successor to April's 'Robinson's. Although 10 were eventually built, unfortunately they were destroyed immediately after they had finished their work - it was so advanced that there was to be no possibility of its design falling into the wrong hands.
*1944 - patent application filed onSIGABA code machine used by U.S. in WW II. Kept secret, it finally issues in 2001
*1946 -VENONA 's first break into Soviet espionage traffic from early 1940s
*1948 -Claude Shannon writes a paper that establishes the mathematical basis ofinformation theory
*1949 - Shannon's "Communication Theory of Secrecy Systems" pub in Bell Labs Technical Journal1950 - 1999
*1951 - U.S.
National Security Agency founded.KL-7 rotor machine introduced sometime thereafter.
*1957 - First production order forKW-26 electronic encryption system.
*1964 -David Kahn 's "The Codebreakers" is published.
*August 1964 -Gulf of Tonkin Incident leads U.S. intoVietnam War , possibly due to misinterpretation of signals intelligence by NSA.
*June 8 1967 -USS Liberty incident where U.S.SIGINT ship is attacked byIsrael , apparently by mistake, though some continue to dispute this.
*January 23 1968 - USS Pueblo, another SIGINT ship, is captured byNorth Korea .
*1968 -John Anthony Walker walks into theSoviet Union 's embassy in Washington and sells information onKL-7 cipher machine. The Walker spy ring operates until 1985.
*1969 - The first hosts ofARPANET , Internet's ancestor, are connected.
*1970 - Usingquantum state s to encode information is first proposed:Stephen Wiesner inventsconjugate coding and applies it to design “money physically impossible to counterfeit” (still technologically unfeasible today).
*1974? -Horst Feistel develops Feistel network block cipher design.
*1976 - theData Encryption Standard was published as an officialFederal Information Processing Standard (FIPS) for the United States.
*1976 -Diffie andHellman publish "New Directions in Cryptography".
*1977-RSA public key encryption invented.
*1981 -Richard Feynman proposedquantum computers . The main application he had in mind was the simulation of quantum systems, but he also mentioned the possibility of solving other problems.
*1984 - Based onStephen Wiesner 's idea from 1970s, Charles Bennett andGilles Brassard design the firstquantum cryptography protocol,BB84 .
*1985 - Walker spy ring uncovered. Remaining KL-7's withdrawn from service.
*1986 - After an increasing number of break-ins to government and corporate computers, United States Congress passes the "Computer Fraud and Abuse Act ", which makes it a crime to break into computer systems. The law, however, does not cover juveniles.
*1988 - First optical chip developed, it uses light instead of electricity to increase processing speed.
*1989 -Tim Berners-Lee andRobert Cailliau built the prototype system which became theWorld Wide Web atCERN .
*1989 -Quantum cryptography experimentally demonstrated in a proof-of-the-principle experiment by Charles Bennett et al.
*1991 -Phil Zimmermann releases thepublic key encryption programPGP along with its source code, which quickly appears on the Internet.
*1992 - Release of the movie "Sneakers", in which security experts are blackmailed into stealing a universal decoder for encryption systems.
*1994 -Bruce Schneier 's "Applied Cryptography" is published.
*1994 -Secure Sockets Layer (SSL) encryption protocol released byNetscape .
*1994 -Peter Shor devises an algorithm which lets quantum computers determine thefactorization of large integers quickly. This is the first interesting problem for which quantum computers promise a significant speed-up, and it therefore generates a lot of interest in quantum computers.
*1994 -DNA computing proof of concept on toytravelling salesman problem ; a method for input/output still to be determined.
*1994 - Russian crackers siphon $10 million fromCitibank and transfer the money to bank accounts around the world.Vladimir Levin , the 30-year-old ringleader, uses his work laptop after hours to transfer the funds to accounts in Finland and Israel. Levin stands trial in the United States and is sentenced to three years in prison. Authorities recover all but $400,000 of the stolen money.
*1994 - Formerly proprietary, but un-patented,RC4 cipher algorithm is published on the Internet.
*1994 - firstRSA Factoring Challenge from 1977 is decrypted asThe Magic Words are Squeamish Ossifrage .
*1995 - NSA publishes theSHA1 hash algorithm as part of itsDigital Signature Standard .
*July 1997 -OpenPGP specification (RFC 2440) released
*1997 -Ciphersaber , an encryption system based on RC4 that is simple enough to be reconstructed from memory, is published onUsenet .
* October 1998 -Digital Millennium Copyright Act (DMCA) becomes law in U.S., criminalizing production and dissemination of technology that can circumvent technical measures taken to protect copyright.
*October 1999 -DeCSS , a computer program capable of decrypting content on aDVD , is published on the Internet.2000 and beyond
*
January 14 2000 - U.S. Government announce restrictions onexport of cryptography are relaxed (although not removed). This allows many US companies to stop the long running process of having to create US and international copies of their software.
*March 2000 -President of the United States Bill Clinton says he doesn't use e-mail to communicate with his daughter, Chelsea Clinton, at college because he doesn't think the medium is secure.
*September 6 2000 -RSA Security Inc. released their RSA algorithm into the public domain, a few days in advance of their US patent|4405829 expiring. Following the relaxation of the U.S. government export restrictions, this removed one of the last barriers to the world-wide distribution of much software based on cryptographic systems
*2000 - UK Regulation of Investigatory Powers Act requires anyone to supply their cryptographic key to a duly authorized person on request
*2001 -Belgian Rijndael algorithm selected as the U.S.Advanced Encryption Standard (AES) after a five year public search process byNational Institute for Standards and Technology (NIST)
*2001 - Scott Fluhrer, Itsik Mantin andAdi Shamir publish an attack onWiFi 'sWired Equivalent Privacy security layer
*September 11 2001 - U.S. response to terrorist attacks hampered by lack of secure communications
*November 2001 -Microsoft and its allies vow to end "full disclosure" of security vulnerabilities by replacing it with "responsible" disclosure guidelines
*2002 -NESSIE project releases final report / selections
*August 2002, PGP Corporation formed, purchasing assets from NAI.
*2003 -CRYPTREC project releases 2003 report / recommendations
*2004 - the hashMD5 is shown to be vulnerable to practical collision attack
*2004 - The first commercialquantum cryptography system becomes available fromid Quantique .
*2005 - potential for attacks on SHA1 demonstrated
*2005 - agents from the U.S.FBI demonstrate their ability to crack WEP using publicly available tools
*May 1 ,2007 - Users swamp Digg.com with copies of a 128-bit key to the AACS system used to protectHD DVD andBlu-ray video discs. The user revolt was a response to Digg's decision, subsequently reversed, to remove the keys, per demands from the motion picture industry that cited the U.S.DMCA anti-circumvention provisions.
*2015 - year by which NIST suggests that 80-bit keys be phased out.ee also
* [http://users.telenet.be/d.rijmenants/en/timeline.htm Timeline of Cipher Machines]
Wikimedia Foundation. 2010.