Skip to main content

History of Cryptography from the 1800s

  • Chapter
  • First Online:
Modern Cryptography
  • 1440 Accesses

Abstract

When studying cryptography, it is often advantageous for the novice to start with analyzing ancient ciphers. These tend to be easier to understand. This chapter will cover cryptography from the 1800s up until the modern computer age. Coupled with Chap. 1, this provides a broad-based coverage of pre-computer cryptography. This will also provide a foundation in cryptographic concepts that will facilitate learning modern cryptography.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 44.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 59.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  • Aishwarya, J., Palanisamy, V., & Kanagaram, K. (2014). An Extended Version of Four-Square Cipher using 10 X 10 Matrixes. International Journal of Computer Applications, 97(21).

    Google Scholar 

  • Davies, D. W. (1995). The Lorenz cipher machine SZ42. Cryptologia, 19(1), 39-61.

    Article  MATH  Google Scholar 

  • d’Agapeyeff, A. (2016). Codes and ciphers-A history of cryptography. Read Books Ltd.

    Google Scholar 

  • Dooley, J. F. (2018). History of cryptography and cryptanalysis: Codes, Ciphers, and their algorithms. Springer.

    Book  MATH  Google Scholar 

  • Lee, M. (2003). Cryptanalysis of the SIGABA (Doctoral dissertation, University of California, Santa Barbara).

    Google Scholar 

  • Mollin, R. A. (2000). An introduction to cryptography. CRC Press.

    MATH  Google Scholar 

  • Rahim, R., & Ikhwan, A. (2016). Cryptography technique with modular multiplication block cipher and Playfair cipher. Int. J. Sci. Res. Sci. Technol, 2(6), 71-78.

    Google Scholar 

  • Singh, S. (2000). The code book: the science of secrecy from ancient Egypt to quantum cryptography. Anchor.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Test Your Knowledge

Test Your Knowledge

A few questions are provided here to aid you in testing your knowledge before you proceed.

  1. 1.

    The ______is based on using a matrix as the key and grouping letters in m letter groups.

  2. 2.

    Which of the following is a variation of Vigenère using 10 alphabets, one for each decimal numeral 0 through 9?

    1. (a)

      Playfair

    2. (b)

      Hill

    3. (c)

      Bifid

    4. (d)

      Gronsfeld

  3. 3.

    What was Edgar Allan Poe’s main contribution to cryptography?

    1. (a)

      Popularizing cryptography

    2. (b)

      Creating the Hill cipher

    3. (c)

      Creating SIGABA

    4. (d)

      Breaking the Hill cipher

  4. 4.

    What did Alan Turing work on?

    1. (a)

      Breaking the German Naval Enigma

    2. (b)

      Breaking the German Army Enigma

    3. (c)

      Breaking all Enigma variations

    4. (d)

      Breaking the SIGABA system

  5. 5.

    The _____ cipher works by modifying a Polybius square. Rather than number coordinates, letters are used.

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Easttom, C. (2022). History of Cryptography from the 1800s. In: Modern Cryptography. Springer, Cham. https://doi.org/10.1007/978-3-031-12304-7_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-12304-7_2

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-12303-0

  • Online ISBN: 978-3-031-12304-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics