Julius Caesar protected military dispatches with a substitution so simple a soldier could memorize it: shift every letter of the plaintext forward by three positions in the alphabet.
Substitution ciphers dominate cryptography for the next eighteen centuries.
In 9th-century Baghdad, the polymath Abu Yusuf al-Kindi wrote Risala fi Istikhraj al-Mu'amma — "A Manuscript on Deciphering Cryptographic Messages."
The first known systematic cryptanalysis. Codebreaking is born.
Architect, organist, art theorist — Leon Battista Alberti also gave the world polyalphabetic cryptography.
Germany's Enigma machine encrypted Wehrmacht traffic with three (later four) rotating rotors and a plugboard — an estimated 158,962,555,217,826,360,000 daily settings.
Two strangers stand in a crowded room of eavesdroppers. They speak only in public. Yet by the end of the conversation, they share a secret no listener can derive.
g, p, ga mod p, recovering a is computationally infeasible.One year after Diffie-Hellman, Rivest, Shamir & Adleman turn the abstraction into a usable algorithm.
p, q; let n = p·q. Publish n and exponent e.c = me mod n. Decrypt with secret d: m = cd mod n.n back into p, q is believed to be intractable at sufficient size.Alarmed by Senate Bill 266, which would have compelled crypto backdoors, Phil Zimmermann released Pretty Good Privacy as freeware. Within weeks it had crossed every border.
After an open international competition, NIST selects Rijndael — designed by Belgian cryptographers Joan Daemen & Vincent Rijmen — as the Advanced Encryption Standard.
By the 2000s, RSA's key sizes balloon to keep pace with factoring advances. Elliptic Curve Cryptography (Koblitz & Miller, 1985) offers equivalent security at a fraction of the size.
On 31 October 2008, a nine-page paper signed Satoshi Nakamoto appears on a cypherpunk mailing list: "Bitcoin: A Peer-to-Peer Electronic Cash System."
In 1994, Peter Shor published an algorithm that — given a sufficiently large quantum computer — factors integers and computes discrete logarithms in polynomial time.
// END OF DOSSIER — RETURN TO CENTRAL ARCHIVE //