Abstract
Cryptography is an integral part of information security. Thus, the need to understand cryptography is substantial. The study of cryptography can be daunting, particularly for readers who do not have a rigorous mathematical background. It is often useful to begin with studying ancient ciphers. While these ciphers lack sufficient security to be useful today, they are effective at teaching the fundamental concepts of cryptography. These ancient ciphers still have a plaintext, an algorithm, and a key, used to produce the ciphertext. For this reason, ancient ciphers are an appropriate starting point for the study of cryptography.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
d’Agapeyeff, A. (2016). Codes and ciphers-A history of cryptography. Read Books Ltd.
Dooley, J. F. (2018). History of cryptography and cryptanalysis: Codes, Ciphers, and their algorithms. Springer..
Mollin, R. A. (2000). An introduction to cryptography. CRC Press.
Singh, S. (2000). The code book: the science of secrecy from ancient Egypt to quantum cryptography. Anchor.
Author information
Authors and Affiliations
Test Your Knowledge
Test Your Knowledge
A few questions are provided here to aid you in testing your knowledge before you proceed.
-
1.
What is the most obvious weakness in a mono-alphabet cipher?
-
A.
They preserve word frequency.
-
B.
They can be cracked with modern computers.
-
C.
They are actually quite strong.
-
D.
They don’t use complex mathematics.
-
A.
-
2.
The total number of possible keys for a given cipher is referred to as the _______________.
-
A.
key group
-
B.
key domain
-
C.
key space
-
D.
key range
-
A.
-
3.
Which of the following methods used a cylinder with text wrapped around it?
-
A.
Vigenère cipher
-
B.
Jefferson disk
-
C.
Cipher disk
-
D.
Scytale
-
A.
-
4.
What is an affine cipher?
-
A.
Any cipher of the form ax + b (≡ m)
-
B.
Only single-substitution ciphers
-
C.
Any single-substitution cipher
-
D.
A multi-alphabet cipher
-
A.
-
5.
What are the key features of homophonic substitution?
-
A.
Multiple substitution alphabets are used.
-
B.
A single plaintext letter may have several ciphertext representations.
-
C.
The ciphertext is phonically similar to the plaintext.
-
D.
It combines substitution with transposition.
-
A.
Rights and permissions
Copyright information
© 2021 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this chapter
Cite this chapter
Easttom, W. (2021). History of Cryptography to the 1800s. In: Modern Cryptography. Springer, Cham. https://doi.org/10.1007/978-3-030-63115-4_1
Download citation
DOI: https://doi.org/10.1007/978-3-030-63115-4_1
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-63114-7
Online ISBN: 978-3-030-63115-4
eBook Packages: EngineeringEngineering (R0)