Abstract
When studying cryptography, it is often advantageous for the novice to start with analyzing ancient ciphers. These tend to be easier to understand. This chapter will cover cryptography from the 1800s up until the modern computer age. Coupled with Chap. 1, this provides a broad-based coverage of pre-computer cryptography. This will also provide a foundation in cryptographic concepts that will facilitate learning modern cryptography.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Aishwarya, J., Palanisamy, V., & Kanagaram, K. (2014). An Extended Version of Four-Square Cipher using 10 X 10 Matrixes. International Journal of Computer Applications, 97(21).
Davies, D. W. (1995). The Lorenz cipher machine SZ42. Cryptologia, 19(1), 39-61.
d’Agapeyeff, A. (2016). Codes and ciphers-A history of cryptography. Read Books Ltd.
Dooley, J. F. (2018). History of cryptography and cryptanalysis: Codes, Ciphers, and their algorithms. Springer.
Lee, M. (2003). Cryptanalysis of the SIGABA (Doctoral dissertation, University of California, Santa Barbara).
Mollin, R. A. (2000). An introduction to cryptography. CRC Press.
Rahim, R., & Ikhwan, A. (2016). Cryptography technique with modular multiplication block cipher and Playfair cipher. Int. J. Sci. Res. Sci. Technol, 2(6), 71-78.
Singh, S. (2000). The code book: the science of secrecy from ancient Egypt to quantum cryptography. Anchor.
Author information
Authors and Affiliations
Test Your Knowledge
Test Your Knowledge
A few questions are provided here to aid you in testing your knowledge before you proceed.
-
1.
The ______is based on using a matrix as the key and grouping letters in m letter groups.
-
2.
Which of the following is a variation of Vigenère using 10 alphabets, one for each decimal numeral 0 through 9?
-
(a)
Playfair
-
(b)
Hill
-
(c)
Bifid
-
(d)
Gronsfeld
-
(a)
-
3.
What was Edgar Allan Poe’s main contribution to cryptography?
-
(a)
Popularizing cryptography
-
(b)
Creating the Hill cipher
-
(c)
Creating SIGABA
-
(d)
Breaking the Hill cipher
-
(a)
-
4.
What did Alan Turing work on?
-
(a)
Breaking the German Naval Enigma
-
(b)
Breaking the German Army Enigma
-
(c)
Breaking all Enigma variations
-
(d)
Breaking the SIGABA system
-
(a)
-
5.
The _____ cipher works by modifying a Polybius square. Rather than number coordinates, letters are used.
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this chapter
Cite this chapter
Easttom, C. (2022). History of Cryptography from the 1800s. In: Modern Cryptography. Springer, Cham. https://doi.org/10.1007/978-3-031-12304-7_2
Download citation
DOI: https://doi.org/10.1007/978-3-031-12304-7_2
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-12303-0
Online ISBN: 978-3-031-12304-7
eBook Packages: Computer ScienceComputer Science (R0)