create account

Cryptology Series Part 2: History of Cryptography by digicrypt

View this thread on: hive.blogpeakd.comecency.com
· @digicrypt · (edited)
$14.24
Cryptology Series Part 2: History of Cryptography
<html>
<p><strong>&nbsp;Cryptology Series Part 2: History of Cryptography</strong></p>
<p>Hello,I am digicrypt and thank you for checking out Part 2 of my “Cryptology Series”! If you haven’t done so already, go to my <a href="https://steemit.com/trending/introduceyourself">#introduceyourself</a> post <a href="https://steemit.com/introduceyourself/@digicrypt/intro-journey-from-digital-forensicscryptographycryptocurrency"><strong>here</strong></a>. The post will give you a bit of my background and help explain what I plan to do with this blog.&nbsp;</p>
<p>You can also view Cryptology Series Part 1:Getting the Basics <a href="https://steemit.com/cryptocurrency/@digicrypt/cryptology-series-part-1-getting-the-basics"><strong>here</strong></a></p>
<p>Thanks now let’s get started!</p>
<p><img src="https://i.imgsafe.org/b6fbe822a4.png" width="720" height="720"/></p>
<p><br></p>
<p><strong>&nbsp;Cryptology Series Part 2: History of Cryptography</strong></p>
<p>This post will highlight several cryptography methods and devices spanning nearly 4,000 years of history. These devices mark milestones of achievement, but they are by no means the only methods used. The most recent method covered is from the 1980s, more "modern" methods such as DES, AES and RSA will be covered in another post which will go into greater detail about function and type. I will also be covering elliptical and quantum cryptography later on.</p>
<p>First encryption methods date back 4,000 years ago.</p>
<p>Around 2000 BC in Egypt hieroglyphics were used to decorate tombs, some hidden meanings were included but mostly for decoration and to add to the mystery of life.</p>
<p>Encryption methods evolved from decoration to being used to hide information for practical use</p>
<p><strong>Atbash</strong></p>
<p>A Hebrew cryptographic method known as Atbash required the alphabet to be flipped so each letter in the original alphabet was mapped to a different letter in the flipped alphabet.</p>
<p><img src="https://i.imgsafe.org/7161a3a1a3.jpg" width="396" height="93"/></p>
<p><strong>Scytale Cipher</strong></p>
<p>Around 400 BC the Spartans wrote messages on papyrus wrapped around a wooden staff.&nbsp;</p>
<p>In order to read the message, the receiver would have to wrap the papyrus around a same size staff, otherwise the letters would appear jumbled.</p>
<p><img src="https://i.imgsafe.org/71621b7038.jpg" width="640" height="366"/></p>
<p><br></p>
<p><strong>Caesar Cipher</strong></p>
<p>100-44 BC Julius Caesar developed a simple method of shifting the alphabet</p>
<p>The alphabet was shifted by 3 positions</p>
<p><img src="https://i.imgsafe.org/7161b02d5c.jpg" width="784" height="124"/></p>
<p>For example the word Steemit would become Vwhhplw</p>
<p><br></p>
<p>This method although now seemingly primitive proved effective at the time and was even modified to be used again in the 1980s on message boards with ROT13.</p>
<p>For more detail on the <a href="https://steemit.com/life/@digicrypt/how-julius-caesar-used-cryptography"><strong>Caesar Cipher</strong></a></p>
<p><strong>Rot 13</strong></p>
<p>ROT 13 was used in the 1980s, like the Caesar cipher it shifted the alphabet, this time 13 spaces.</p>
<p>Wasn’t used to protect data, instead it was used on message boards for inappropriate material.</p>
<p>Those who wish to view it simply add 13, those who don’t want to view the material don’t and just see gibberish.</p>
<p><img src="https://i.imgsafe.org/7172e3cc2a.jpg" width="819" height="515"/></p>
<p><br></p>
<p><strong>Vigenere Table</strong></p>
<p>In the 16th century Blaise de Vigenere developed a polyalphabetic substitution cipher for Henry III</p>
<p>27 different alphabets</p>
<p>"The Vigenère cipher is a method of encrypting alphabetic text by using a series of interwoven Caesar ciphers based on the letters of a keyword."</p>
<p>"Though the cipher is easy to understand and implement, for three centuries it resisted all attempts to break it; this earned it the description le chiffre indéchiffrable (French for 'the indecipherable cipher'). "</p>
<p><a href="https://en.wikipedia.org/wiki/Vigen%C3%A8re_cipher"><strong>Source</strong></a></p>
<p><img src="https://i.imgsafe.org/71773493c6.jpg" width="592" height="513"/></p>
<p><br></p>
<p><strong>Jeffersonian Wheel Cipher</strong></p>
<p>While serving as George Washington's secretary of state (1790-1793), Thomas Jefferson devised an ingenious and secure method to encode and decode messages: the wheel cipher.</p>
<p>Jefferson's wheel cipher consisted of thirty-six cylindrical wooden pieces, each threaded onto an iron spindle.</p>
<p>spells the message out and then looks to any other line of text -- possibly the one directly above, copies the rest of the letters from that line into the correspondence.</p>
<p>For more information on the <a href="https://steemit.com/life/@digicrypt/thomas-jefferson-s-ingenius-cryptoraphy-device"><strong>Jeffersonian Wheel Cipher</strong></a></p>
<p><img src="https://i.imgsafe.org/7162476532.jpg" width="684" height="203"/></p>
<p><br></p>
<p><strong>M-94</strong></p>
<p>&nbsp;The US Army used a cryptography device designated as M-94, nearly identical to Jefferson's design that had yet to be discovered. The M-94 was used from 1922 to 1945.&nbsp;</p>
<p><img src="https://i.imgsafe.org/71631077a9.jpg" width="1806" height="978"/></p>
<p><br></p>
<p><strong>Enigma Machine</strong></p>
<p>By the late 1800s cryptography was common practice for militaries.</p>
<p>During WWII the Germans developed one of the most infamous cipher machines of all time the Enigma Machine.</p>
<p>Enigma machine was a rotor cipher which substitutes letters using different rotors and settings.</p>
<p><img src="https://i.imgsafe.org/71731add19.jpg" width="448" height="597"/></p>
<p>The operator would move the rotors a predetermined number of times to substitute letters. The rotors would be reset for every letter.</p>
<p><img src="https://i.imgsafe.org/7173141cb9.jpg" width="642" height="428"/></p>
<p><br></p>
<p>&nbsp;The Enigma Machine was very advanced for it's time and caused huge problems for the allies during the war. The Enigma machine was eventually cracked and is considered one of the reasons the allies were able to win the war. Alan Turing receives most of the credit for this achievement.</p>
<p>" Turing played a pivotal role in cracking intercepted coded messages that enabled the Allies to defeat the Nazis in many crucial engagements, including the <a href="https://en.wikipedia.org/wiki/Battle_of_the_Atlantic">Battle of the Atlantic</a>; it has been estimated that this work shortened the war in Europe by more than two years and saved over fourteen million lives. "</p>
<p><a href="https://en.wikipedia.org/wiki/Alan_Turing"><strong>Source</strong></a></p>
<p>Although there is much more to the story...If you are interested I will do a post about what really happened and some heroes who rarely get credit.</p>
<p><br></p>
<p>I hope you learned something new and I hope you will stick with me for Part 3 of my Cryptology Series. If you want more detail on some of these methods check my old posts which are linked in the article. If there is a method that you would like to see me cover or cover in greater detail leave a comment and let me know.</p>
<p>Your feedback is really important to me, please comment and let me know if you liked this post or have questions.</p>
<p>Please upvote and resteem if you found this post interesting!</p>
<p>Follow my blog @digicrypt if you want to learn more!</p>
<p>If you would like to donate so I can post more and host more complex cryptography challenges with bigger prizes, below is my DASH address.</p>
<p><br></p>
<p>DASH: &nbsp;XgQ9NBonMoCPKhF37agY4W8zk7gwQFnwGV&nbsp;</p>
<p><br></p>
<p>Digicrypt,</p>
<p>Signing Off</p>
<p><br></p>
<p><br></p>
</html>
👍  , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , and 165 others
properties (23)
authordigicrypt
permlinkcryptology-series-part-2-history-of-cryptography
categoryhistory
json_metadata{"tags":["history","cryptocurrency","bitcoin","cryptology","life"],"users":["digicrypt"],"image":["https://i.imgsafe.org/b6fbe822a4.png","https://i.imgsafe.org/7161a3a1a3.jpg","https://i.imgsafe.org/71621b7038.jpg","https://i.imgsafe.org/7161b02d5c.jpg","https://i.imgsafe.org/7172e3cc2a.jpg","https://i.imgsafe.org/71773493c6.jpg","https://i.imgsafe.org/7162476532.jpg","https://i.imgsafe.org/71631077a9.jpg","https://i.imgsafe.org/71731add19.jpg","https://i.imgsafe.org/7173141cb9.jpg"],"links":["https://steemit.com/trending/introduceyourself","https://steemit.com/introduceyourself/@digicrypt/intro-journey-from-digital-forensicscryptographycryptocurrency","https://steemit.com/cryptocurrency/@digicrypt/cryptology-series-part-1-getting-the-basics","https://steemit.com/life/@digicrypt/how-julius-caesar-used-cryptography","https://en.wikipedia.org/wiki/Vigen%C3%A8re_cipher","https://steemit.com/life/@digicrypt/thomas-jefferson-s-ingenius-cryptoraphy-device","https://en.wikipedia.org/wiki/Battle_of_the_Atlantic","https://en.wikipedia.org/wiki/Alan_Turing"],"app":"steemit/0.1","format":"html"}
created2017-03-01 19:07:24
last_update2017-03-01 19:10:30
depth0
children7
last_payout2017-04-01 20:10:06
cashout_time1969-12-31 23:59:59
total_payout_value10.807 HBD
curator_payout_value3.436 HBD
pending_payout_value0.000 HBD
promoted0.000 HBD
body_length7,828
author_reputation9,344,424,618,224
root_title"Cryptology Series Part 2: History of Cryptography"
beneficiaries[]
max_accepted_payout1,000,000.000 HBD
percent_hbd10,000
post_id2,622,713
net_rshares44,977,638,287,952
author_curate_reward""
vote details (229)
@len.george ·
Thanks digicrypt, I am waiting for the next part. Hexadecimal, the forerunner of basic was like that,  and i felt like a spy drying to do anything with it.
properties (22)
authorlen.george
permlinkre-digicrypt-cryptology-series-part-2-history-of-cryptography-20170301t202226911z
categoryhistory
json_metadata{"tags":["history"],"app":"steemit/0.1"}
created2017-03-01 20:22:27
last_update2017-03-01 20:22:27
depth1
children1
last_payout2017-04-01 20:10:06
cashout_time1969-12-31 23:59:59
total_payout_value0.000 HBD
curator_payout_value0.000 HBD
pending_payout_value0.000 HBD
promoted0.000 HBD
body_length155
author_reputation16,877,043,620,190
root_title"Cryptology Series Part 2: History of Cryptography"
beneficiaries[]
max_accepted_payout1,000,000.000 HBD
percent_hbd10,000
post_id2,623,264
net_rshares0
@digicrypt ·
Glad you liked it! I am not entirely sure when Part 3 will be out and what it will cover, most likely next week . I am trying to gauge how much people already know. Haha, yeah number systems are fun but mess with your head Hex and Bin etc. I will have a second Cryptography Challenge posted before part 3 comes out though. This is the link to the first one I did if you didnt see it  https://steemit.com/steemit/@digicrypt/cryptography-challenge-1    the next one will be harder with a bigger prize! I hope you will give it a try, maybe you can win some STEEM! Thanks for the comment!
👍  
properties (23)
authordigicrypt
permlinkre-lengeorge-re-digicrypt-cryptology-series-part-2-history-of-cryptography-20170301t204138144z
categoryhistory
json_metadata{"tags":["history"],"links":["https://steemit.com/steemit/@digicrypt/cryptography-challenge-1"],"app":"steemit/0.1"}
created2017-03-01 20:41:36
last_update2017-03-01 20:41:36
depth2
children0
last_payout2017-04-01 20:10:06
cashout_time1969-12-31 23:59:59
total_payout_value0.000 HBD
curator_payout_value0.000 HBD
pending_payout_value0.000 HBD
promoted0.000 HBD
body_length584
author_reputation9,344,424,618,224
root_title"Cryptology Series Part 2: History of Cryptography"
beneficiaries[]
max_accepted_payout1,000,000.000 HBD
percent_hbd10,000
post_id2,623,416
net_rshares3,096,560,742
author_curate_reward""
vote details (1)
@lydon.sipe ·
Great post! I am interested in the unsung heroes of the Enigma. The movie Imitation Game was enjoyable, and it would be nice to know the story in greater detail - there is always a slant in a movie and lesser known facts.
properties (22)
authorlydon.sipe
permlinkre-digicrypt-cryptology-series-part-2-history-of-cryptography-201732t02317381z
categoryhistory
json_metadata{"tags":"history","app":"esteem/1.3.9","format":"markdown+html"}
created2017-03-02 05:23:18
last_update2017-03-02 05:23:18
depth1
children4
last_payout2017-04-01 20:10:06
cashout_time1969-12-31 23:59:59
total_payout_value0.000 HBD
curator_payout_value0.000 HBD
pending_payout_value0.000 HBD
promoted0.000 HBD
body_length221
author_reputation61,285,932,034,541
root_title"Cryptology Series Part 2: History of Cryptography"
beneficiaries[]
max_accepted_payout1,000,000.000 HBD
percent_hbd10,000
post_id2,626,073
net_rshares0
@digicrypt ·
Thanks! I am going to try to do a post specifically on the Enigma Machine Story when I get the time. Another entertaining film about the Enigma Machine( although not at all historically accurate) is U-571. I might try and tackle some of the inaccuracy in that film as well.
properties (22)
authordigicrypt
permlinkre-lydonsipe-re-digicrypt-cryptology-series-part-2-history-of-cryptography-201732t02317381z-20170302t170455417z
categoryhistory
json_metadata{"tags":["history"],"app":"steemit/0.1"}
created2017-03-02 17:04:51
last_update2017-03-02 17:04:51
depth2
children3
last_payout2017-04-01 20:10:06
cashout_time1969-12-31 23:59:59
total_payout_value0.000 HBD
curator_payout_value0.000 HBD
pending_payout_value0.000 HBD
promoted0.000 HBD
body_length273
author_reputation9,344,424,618,224
root_title"Cryptology Series Part 2: History of Cryptography"
beneficiaries[]
max_accepted_payout1,000,000.000 HBD
percent_hbd10,000
post_id2,629,547
net_rshares0
@lydon.sipe ·
Great! Any other movie ideas with this subject matter?
properties (22)
authorlydon.sipe
permlinkre-digicrypt-re-lydonsipe-re-digicrypt-cryptology-series-part-2-history-of-cryptography-201732t02317381z-20170302t171758124z
categoryhistory
json_metadata{"tags":["history"],"app":"steemit/0.1"}
created2017-03-02 17:17:48
last_update2017-03-02 17:17:48
depth3
children2
last_payout2017-04-01 20:10:06
cashout_time1969-12-31 23:59:59
total_payout_value0.000 HBD
curator_payout_value0.000 HBD
pending_payout_value0.000 HBD
promoted0.000 HBD
body_length54
author_reputation61,285,932,034,541
root_title"Cryptology Series Part 2: History of Cryptography"
beneficiaries[]
max_accepted_payout1,000,000.000 HBD
percent_hbd10,000
post_id2,629,633
net_rshares0