Timeline of cryptography

Timeline of cryptography

Below is a timeline of notable events related to cryptography.

BCE

*3500s - The Sumerians develop "cuneiform" writing and the Egyptians develop "hieroglyphic" writing.
*1500s - The Phoenicians develop an alphabet
*600-500 - Hebrew scholars make use of simple monoalphabetic substitution ciphers (such as the Atbash cipher)
*c. 400 - Spartan use of scytale (alleged)
*c. 400 - Herodotus reports use of steganography in reports to Greece from Persia (tattoo on shaved head)
*100-1 CE - Notable Roman ciphers such as the Caeser cipher.

1 - 1799 CE

*801–873 CE - Cryptanalysis and frequency analysis leading to techniques for breaking monoalphabetic substitution ciphers are developed in "A Manuscript on Deciphering Cryptographic Messages" by the Muslim mathematician, Al-Kindi (Alkindus), who may have been inspired by textual analysis of the Qur'an. He also covers methods of encipherments, cryptanalysis of certain encipherments, and statistical analysis of letters and letter combinations in Arabic.
*1355-1418 - Ahmad al-Qalqashandi writes "Subh al-a 'sha", a 14-volume encyclopedia including a section on cryptology, attributed to Taj ad-Din Ali ibn ad-Duraihim ben Muhammad ath-Tha 'alibi al-Mausili (1312-1361). The list of ciphers in this work include both substitution and transposition, and for the first time, a cipher with multiple substitutions for each plaintext letter. It also included an exposition on and worked example of cryptanalysis, including the use of tables of letter frequencies and sets of letters which can not occur together in one word.
*1450 - The Chinese develop wooden block movable type printing.
*1450-1520 - The Voynich manuscript, an example of a possibly encoded illustrated book, is written.
*1466 - Leon Battista Alberti invents polyalphabetic cipher, also first known mechanical cipher machine
*1518 - Johannes Trithemius' book on cryptology
*1553 - Bellaso invents Vigenère cipher
*1585 - Vigenère's book on ciphers
*1586 - Cryptanalysis used by spy master Sir Francis Walsingham to implicate Mary Queen of Scots in the Babington Plot to murder Queen Elizabeth I of England. Queen Mary was eventually executed.
*1641 - Wilkins' "Mercury" (English book on cryptology)
*1793 - Claude Chappe establishes the first long-distance semaphore telegraph line
*1795 - Thomas Jefferson invents the Jefferson disk cipher, reinvented over 100 years later by Etienne Bazeries

1800-1899

*1809-14 George Scovell's work on Napoleonic ciphers during the Peninsular War
*1831 - Joseph Henry proposes and builds an electric telegraph
*1835 - Samuel Morse develops the Morse code
*1854 - Wheatstone invents Playfair cipher
*c. 1854 - Babbage's method for breaking polyalphabetic ciphers (pub 1863 by Kasiski)
*1855 - For the English side in Crimean War, Charles Babbage broke Vigenère's autokey cipher (the 'unbreakable cipher' of the time) as well as the much weaker cipher that is called Vigenère cipher today. Due to secrecy it was also discovered and attributed somewhat later to the Prussian Friedrich Kasiski.
*1883 - Auguste Kerckhoffs' "La Cryptographie militare" published, containing his celebrated laws of cryptography
*1885 - Beale ciphers published
*1894 - The Dreyfus Affair in France involves the use of cryptography, and its misuse, in regard to false documents.

1900 - 1949

*c 1915 - William Friedman applies statistics to cryptanalysis (coincidence counting, etc)
* 1917 - Gilbert Vernam develops first practical implementation of a teletype cipher, now known as a stream cipher and, later, with Joseph Mauborgne the one-time pad
* 1917 - Zimmermann telegram intercepted and decrypted, advancing U.S. entry into World War I
*1919 - Weimar Germany Foreign Office adopts (a manual) one-time pad for some traffic
*1919 - Edward Hebern invents/patents first rotor machine design -- Damm, Scherbius and Koch follow with patents the same year
* 1921 - Washington Naval Conference - U.S. negotiating team aided by decryption of Japanese diplomatic telegrams
*c. 1924 - MI8 (Herbert Yardley, et al) provide breaks of assorted traffic in support of US position at Washington Naval Conference
*c. 1932 - first break of German Army Enigma by Marian Rejewski in Poland
* 1929 - U.S. Secretary of State Henry L. Stimson shuts down State Department cryptanalysis "Black Chamber", saying "Gentlemen do not read each other's mail."
* 1931 - "The American Black Chamber" by Herbert O. Yardley is published, revealing much about American cryptography
* 1940 - break of Japan's PURPLE machine cipher by SIS team
* December 7 1941 - U.S. Naval base at Pearl Harbor surprised by Japanese attack, despite U.S. breaking of Japanese codes. U.S. enters World War II
* June 1942 - Battle of Midway where U.S. partial break into Dec 41 edition of JN-25 leads to turning-point victory over Japan
* April 1943 - Admiral Yamamoto, architect of Pearl Harbor attack, is assassinated by U.S. forces who know his itinerary from decoded messages
*April 1943 - Max Newman, Wynn-Williams, and their team (including Alan Turing) at the secret Government Code and Cypher School ('Station X'), Bletchley Park, Bletchley, England, complete the "Heath Robinson". This is a specialized machine for cipher-breaking, not a general-purpose calculator or computer.
*December 1943 - The Colossus computer was built, by Thomas Flowers at The Post Office Research Laboratories in London, to crack the German Lorenz cipher (SZ42). Colossus was used at Bletchley Park during WW II - as a successor to April's 'Robinson's. Although 10 were eventually built, unfortunately they were destroyed immediately after they had finished their work - it was so advanced that there was to be no possibility of its design falling into the wrong hands.
*1944 - patent application filed on SIGABA code machine used by U.S. in WW II. Kept secret, it finally issues in 2001
*1946 - VENONA's first break into Soviet espionage traffic from early 1940s
*1948 - Claude Shannon writes a paper that establishes the mathematical basis of information theory
*1949 - Shannon's "Communication Theory of Secrecy Systems" pub in Bell Labs Technical Journal

1950 - 1999

*1951 - U.S. National Security Agency founded. KL-7 rotor machine introduced sometime thereafter.
*1957 - First production order for KW-26 electronic encryption system.
*1964 - David Kahn's "The Codebreakers" is published.
*August 1964 - Gulf of Tonkin Incident leads U.S. into Vietnam War, possibly due to misinterpretation of signals intelligence by NSA.
* June 8 1967 - USS Liberty incident where U.S. SIGINT ship is attacked by Israel, apparently by mistake, though some continue to dispute this.
* January 23 1968 - USS Pueblo, another SIGINT ship, is captured by North Korea.
*1968 - John Anthony Walker walks into the Soviet Union's embassy in Washington and sells information on KL-7 cipher machine. The Walker spy ring operates until 1985.
*1969 - The first hosts of ARPANET, Internet's ancestor, are connected.
*1970 - Using quantum states to encode information is first proposed: Stephen Wiesner invents conjugate coding and applies it to design “money physically impossible to counterfeit” (still technologically unfeasible today).
*1974? - Horst Feistel develops Feistel network block cipher design.
*1976 - the Data Encryption Standard was published as an official Federal Information Processing Standard (FIPS) for the United States.
*1976 - Diffie and Hellman publish "New Directions in Cryptography".
*1977- RSA public key encryption invented.
*1981 - Richard Feynman proposed quantum computers. The main application he had in mind was the simulation of quantum systems, but he also mentioned the possibility of solving other problems.
*1984 - Based on Stephen Wiesner's idea from 1970s, Charles Bennett and Gilles Brassard design the first quantum cryptography protocol, BB84.
*1985 - Walker spy ring uncovered. Remaining KL-7's withdrawn from service.
*1986 - After an increasing number of break-ins to government and corporate computers, United States Congress passes the "Computer Fraud and Abuse Act", which makes it a crime to break into computer systems. The law, however, does not cover juveniles.
*1988 - First optical chip developed, it uses light instead of electricity to increase processing speed.
*1989 - Tim Berners-Lee and Robert Cailliau built the prototype system which became the World Wide Web at CERN.
*1989 - Quantum cryptography experimentally demonstrated in a proof-of-the-principle experiment by Charles Bennett et al.
*1991 - Phil Zimmermann releases the public key encryption program PGP along with its source code, which quickly appears on the Internet.
*1992 - Release of the movie "Sneakers", in which security experts are blackmailed into stealing a universal decoder for encryption systems.
*1994 - Bruce Schneier's "Applied Cryptography" is published.
*1994 - Secure Sockets Layer (SSL) encryption protocol released by Netscape.
*1994 - Peter Shor devises an algorithm which lets quantum computers determine the factorization of large integers quickly. This is the first interesting problem for which quantum computers promise a significant speed-up, and it therefore generates a lot of interest in quantum computers.
*1994 - DNA computing proof of concept on toy travelling salesman problem; a method for input/output still to be determined.
*1994 - Russian crackers siphon $10 million from Citibank and transfer the money to bank accounts around the world. Vladimir Levin, the 30-year-old ringleader, uses his work laptop after hours to transfer the funds to accounts in Finland and Israel. Levin stands trial in the United States and is sentenced to three years in prison. Authorities recover all but $400,000 of the stolen money.
*1994 - Formerly proprietary, but un-patented, RC4 cipher algorithm is published on the Internet.
*1994 - first RSA Factoring Challenge from 1977 is decrypted as The Magic Words are Squeamish Ossifrage.
*1995 - NSA publishes the SHA1 hash algorithm as part of its Digital Signature Standard.
*July 1997 - OpenPGP specification (RFC 2440) released
*1997 - Ciphersaber, an encryption system based on RC4 that is simple enough to be reconstructed from memory, is published on Usenet.
* October 1998 - Digital Millennium Copyright Act (DMCA) becomes law in U.S., criminalizing production and dissemination of technology that can circumvent technical measures taken to protect copyright.
*October 1999 - DeCSS, a computer program capable of decrypting content on a DVD, is published on the Internet.

2000 and beyond

*January 14 2000 - U.S. Government announce restrictions on export of cryptography are relaxed (although not removed). This allows many US companies to stop the long running process of having to create US and international copies of their software.
*March 2000 - President of the United States Bill Clinton says he doesn't use e-mail to communicate with his daughter, Chelsea Clinton, at college because he doesn't think the medium is secure.
*September 6 2000 - RSA Security Inc. released their RSA algorithm into the public domain, a few days in advance of their US patent|4405829 expiring. Following the relaxation of the U.S. government export restrictions, this removed one of the last barriers to the world-wide distribution of much software based on cryptographic systems
*2000 - UK Regulation of Investigatory Powers Act requires anyone to supply their cryptographic key to a duly authorized person on request
*2001 - Belgian Rijndael algorithm selected as the U.S. Advanced Encryption Standard (AES) after a five year public search process by National Institute for Standards and Technology (NIST)
*2001 - Scott Fluhrer, Itsik Mantin and Adi Shamir publish an attack on WiFi's Wired Equivalent Privacy security layer
* September 11 2001 - U.S. response to terrorist attacks hampered by lack of secure communications
*November 2001 - Microsoft and its allies vow to end "full disclosure" of security vulnerabilities by replacing it with "responsible" disclosure guidelines
*2002 - NESSIE project releases final report / selections
*August 2002, PGP Corporation formed, purchasing assets from NAI.
*2003 - CRYPTREC project releases 2003 report / recommendations
*2004 - the hash MD5 is shown to be vulnerable to practical collision attack
*2004 - The first commercial quantum cryptography system becomes available from id Quantique.
*2005 - potential for attacks on SHA1 demonstrated
*2005 - agents from the U.S. FBI demonstrate their ability to crack WEP using publicly available tools
*May 1, 2007 - Users swamp Digg.com with copies of a 128-bit key to the AACS system used to protect HD DVD and Blu-ray video discs. The user revolt was a response to Digg's decision, subsequently reversed, to remove the keys, per demands from the motion picture industry that cited the U.S. DMCA anti-circumvention provisions.
*2015 - year by which NIST suggests that 80-bit keys be phased out.

ee also

* [http://users.telenet.be/d.rijmenants/en/timeline.htm Timeline of Cipher Machines]


Wikimedia Foundation. 2010.

Игры ⚽ Поможем решить контрольную работу

Look at other dictionaries:

  • Timeline of quantum computing — Timeline of quantum computers1970s* 1970 Stephen Wiesner invents conjugate coding.* 1973 Alexander Holevo publishes a paper showing that n qubits cannot carry more than n classical bits of information (a result known as Holevo s theorem or Holevo …   Wikipedia

  • Timeline of events preceding World War II — World War II seriesv · d · e …   Wikipedia

  • Timeline of Islamic science and engineering — This timeline of Islamic science and engineering covers the general development of science and technology in the Islamic world during the Islamic Golden Age, usually dated from the 7th to 16th centuries.From the 17th century onwards, the advances …   Wikipedia

  • Timeline of World War II — World War II seriesv · d · e …   Wikipedia

  • Timeline of computing hardware 2400 BC–1949 — History of computing Hardware before 1960 Hardware 1960s to present Hardware in Soviet Bloc countries Artificial intelligence Computer science Operating systems Programming languages …   Wikipedia

  • Timeline of computing 1990–present — This article presents a timeline of events in the history of computing from 1990 to the present. For a narrative explaining the overall developments, see the related history of computers and history of computer science.Computing timelines: 2400… …   Wikipedia

  • Timeline of mathematics — A timeline of pure and applied mathematics history. Contents 1 Before 1000 BC 2 1st millennium BC 3 1st millennium AD 4 1000–1500 …   Wikipedia

  • History of cryptography — The history of cryptography begins thousands of years ago. Until recent decades, it has been the story of what might be called classic cryptography that is, of methods of encryption that use pen and paper, or perhaps simple mechanical aids. In… …   Wikipedia

  • Outline of cryptography — See also: Index of cryptography articles The following outline is provided as an overview of and topical guide to cryptography: Cryptography (or cryptology) – practice and study of hiding information. Modern cryptography intersects the… …   Wikipedia

  • Wadsworth's cipher — was a cipher invented by Decius Wadsworth, a Colonel in the Ordnance Corps of the United States Army. In 1817, he developed a progressive cipher system based on a 1790 design by Thomas Jefferson, establishing a method that was continuously… …   Wikipedia

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”