Skip to main content

History of Cryptography to the 1800s

  • Chapter
  • First Online:
Modern Cryptography

Abstract

Cryptography is an integral part of information security. Thus, the need to understand cryptography is substantial. The study of cryptography can be daunting, particularly for readers who do not have a rigorous mathematical background. It is often useful to begin with studying ancient ciphers. While these ciphers lack sufficient security to be useful today, they are effective at teaching the fundamental concepts of cryptography. These ancient ciphers still have a plaintext, an algorithm, and a key, used to produce the ciphertext. For this reason, ancient ciphers are an appropriate starting point for the study of cryptography.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 44.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 59.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  • d’Agapeyeff, A. (2016). Codes and ciphers-A history of cryptography. Read Books Ltd.

    Google Scholar 

  • Dooley, J. F. (2018). History of cryptography and cryptanalysis: Codes, Ciphers, and their algorithms. Springer..

    Book  Google Scholar 

  • Mollin, R. A. (2000). An introduction to cryptography. CRC Press.

    Google Scholar 

  • Singh, S. (2000). The code book: the science of secrecy from ancient Egypt to quantum cryptography. Anchor.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Test Your Knowledge

Test Your Knowledge

A few questions are provided here to aid you in testing your knowledge before you proceed.

  1. 1.

    What is the most obvious weakness in a mono-alphabet cipher?

    1. A.

      They preserve word frequency.

    2. B.

      They can be cracked with modern computers.

    3. C.

      They are actually quite strong.

    4. D.

      They don’t use complex mathematics.

  2. 2.

    The total number of possible keys for a given cipher is referred to as the _______________.

    1. A.

      key group

    2. B.

      key domain

    3. C.

      key space

    4. D.

      key range

  3. 3.

    Which of the following methods used a cylinder with text wrapped around it?

    1. A.

      Vigenère cipher

    2. B.

      Jefferson disk

    3. C.

      Cipher disk

    4. D.

      Scytale

  4. 4.

    What is an affine cipher?

    1. A.

      Any cipher of the form ax + b (≡ m)

    2. B.

      Only single-substitution ciphers

    3. C.

      Any single-substitution cipher

    4. D.

      A multi-alphabet cipher

  5. 5.

    What are the key features of homophonic substitution?

    1. A.

      Multiple substitution alphabets are used.

    2. B.

      A single plaintext letter may have several ciphertext representations.

    3. C.

      The ciphertext is phonically similar to the plaintext.

    4. D.

      It combines substitution with transposition.

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Easttom, W. (2021). History of Cryptography to the 1800s. In: Modern Cryptography. Springer, Cham. https://doi.org/10.1007/978-3-030-63115-4_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-63115-4_1

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-63114-7

  • Online ISBN: 978-3-030-63115-4

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics