History of Ciphers
History of Ciphers
History of Ciphers
Understanding
Encryption
An overview of the history and evolution of
cryptographic algorithms and decryption.
Contents
1
Introduction.......................................... 3
A renaissance in cryptology.................. 6
The Mary Queen of Scots cipher........... 6
The Vigenre cipher.............................. 6
The Uesugi cipher................................. 7
2/20
1 Introduction
Ciphers have been in use since 3000
B.C., but their importance and relevance
for information security has increased
with the growth of the Internet and the
escalating volumes of data exchanged
on line every day.
The history of ciphers and encryption is a compelling one being
a constant battle between encryption by cryptographers and
decryption by cryptanalysts, with repeated cycles of development
of a cryptographic algorithm, attempts to break it, followed by the
development of a new cipher algorithm.
This paper examines the history of ciphers and the associated
breakthroughs in technologies, along with a number of measures that
users of modern ciphers should deploy.
3/20
Figure 1
Next, the first century B.C. saw the emergence of the Caesar cipher, which was frequently used by the Roman
Emperor Julius Caesar and is one of the most famous methods of cryptography. The cipher worked by substituting
each letter in the original message for another letter located in a fixed number of positions down the alphabet, which
was only known by the sender and receiver.
Figure 2
Ciphers like this that shift letters along the alphabet are known as shift ciphers.
As these ciphers can be easily decrypted by trying out a maximum of 26 shift numbers, using a random shift can
vastly increase the number of permutations (to 26 x 25 x 24 x . = 400000000000000000000000000!), rendering
decryption far more difficult.
4/20
ABCDEFGHIJKLMNOPQRSTUVWXYZ
Encrypted text
S M K R AT N G QJ U DZ L P V YO C W I BX F E H
An encryption method that rearranges the sequence of characters based on a fixed rule, such as that shown above,
is called a substitution cipher. These are the most commonly used cryptography systems throughout history, and
include the modern Enigma mechanical cipher machine. (described in more depth below.)
However, substitution ciphers, including the simpler Caesar cipher, can all be decrypted using frequency analysis.
This uses linguistic parameters to guess pre-encrypted letters based on how often they appear. For example, in the
English language:
e is the most frequently used letter (see Figure 3)
q is always followed by a u.
Such words as any, and, the, are, of, if, is, it and in appear with high frequency.
0.14
0.12
Relative frequency
0.1
0.08
0.06
0.04
0.02
l m n
v w
letter
Figure 3
5/20
3 A renaissance in cryptology
During the Middle Ages diplomatic activities greatly intensified
and cryptographic technologies advanced significantly, as classic
ciphers were decrypted and new ciphers were invented to protect an
increasing volume of confidential information.
The Mary Queen of Scots cipher
The cipher used between Mary Queen of Scots and her other conspirators in the 16th century is known as a
nomenclature cipher. As well as replacing alphabetic letters, it incorporated a code for the replacement of phrases
with symbols, based on a shared codebook. However, the weakness of the ciphers one-to-one assignment of
encrypted letters to plaintext letters was exploited to decrypt it, which led to Mary being found guilty of treason and
executed at Fotheringay Castle for plotting the assassination of Queen Elizabeth I of England.
Plain text
GOLDMEDALIST
Key
OLYMPICOLYMP
Encrypted message
UZJPBMFOWGEI
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
A
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
B
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
A
C
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
A
B
D
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
A
B
C
E
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
A
B
C
D
F
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
A
B
C
D
E
G
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
A
B
C
D
E
F
H
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
A
B
C
D
E
F
G
I
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
A
B
C
D
E
F
G
H
J
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
A
B
C
D
E
F
G
H
I
K
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
A
B
C
D
E
F
G
H
I
J
L
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
A
B
C
D
E
F
G
H
I
J
K
M
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
A
B
C
D
E
F
G
H
I
J
K
L
N
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
A
B
C
D
E
F
G
H
I
J
K
L
M
O
O
P
Q
R
S
T
U
V
W
X
Y
Z
A
B
C
D
E
F
G
H
I
J
K
L
M
N
P
P
Q
R
S
T
U
V
W
X
Y
Z
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
Q
Q
R
S
T
U
V
W
X
Y
Z
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
R
R
S
T
U
V
W
X
Y
Z
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
S
S
T
U
V
W
X
Y
Z
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
T
T
U
V
W
X
Y
Z
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
U
U
V
W
X
Y
Z
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
V
V
W
X
Y
Z
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
W
W
X
Y
Z
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
X
X
Y
Z
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
Y
Y
Z
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Z
Z
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Figure 4
6/20
we
ya
ra
yo
chi
hi
sa
ma mu
ta
ri
ro
mo
ki
ke
re
nu
ha
se
yu
fu
wi
so
ru
ni
su
me
ko
no tsu wo
ho
mi
ne
wa
he
shi
te
ku
na
ka
to
Figure 5
7/20
ADFGVX cipher
In 1918, the ADFGX cipher, designed by Colonel Fritz Nebel of the German army, came into practical use. Like the
Uesugi cipher, it used a Polybius square with the five letters ADFGX heading the rows and columns. Each letter in the
grid corresponded to two encrypted letters. However, a transposition cipher was then applied to the resulting series
of letters for encryption. The ADFGX cipher was superseded by the ADFGVX cipher, which had been upgraded to six
rows and columns (see Figure 6).
Figure 6
It is practically impossible to decrypt the cipher using this grid, if the key is treated as disposable. However, this
would require the sharing of a large number of keys, which would be impractical in a front-line combat situation.
8/20
9/20
Public-key cryptography
The advent of public-key cryptography finally solved the one problem that the Caesar cipher had not - how to
hand over the key. Launched in 1976, by Bailey Whitfield Diffie, Martin Hellman and Ralph Merkle, public-key
cryptography facilitates encrypted communications, without the need for advance delivery of keys, using a public key
that anyone can access for encryption and a private key known only to the recipient for decryption.
The Diffie-Hellman-Merkle key exchange concept uses a one-way function, called modular arithmetic, which makes it
possible to establish confidentiality during a conversation in a public place. This revolutionary invention significantly
rewrote one of the governing principles of cryptography that key exchange had to take place covertly.
However, at that time, what had not yet been developed was a one-way function that allows an asymmetric cipher
using different keys for encryption and decryption. The development that took the theory of public key cryptography
up to the point of implementation was the RSA cipher.
10/20
95=5 19
851=23 37
176653=241 733
9831779=2011 4889
The characteristics of such prime factorisation render it extremely difficult to read the private key from the public
key within a realistic timeframe, even if the public key is easily accessible, so it enables key exchange for decryption
only by the intended party on the Internet.
For example, Secure Sockets Layer (SSL) is a protocol for secure communications between web server and client
that was introduced by Netscape Communications and embedded in Netscape Navigator. SSL is characterised by
issuance of an electronic certificate that explicitly verifies the identity of the server (web server, mail server). After
that, any interception, leakage or other security breaches of information passed over the Internet are prevented
through encryption of messages using a symmetric key, which is safely conveyed by public-key cryptography.
11/20
Alternatives to RSA
1. Digital Signature Algorithm
DSA (Digital Signature Algorithm) is a United States. government-approved and certified encryption algorithm that
was developed by the National Security Agency in 1991 as an alternative to the current standard RSA algorithm. It
offers the same level of security and performance as RSA, but uses a different mathematical algorithm for signing
and encryption. A DSA key pair will be the same size as the equivalent RSA key. The DSA algorithm provides the
same level of security and performance as the RSA algorithm but uses a different, less commonly used mathematical
algorithm. Although key sizes are identical to RSA, key generation and digital signature using DSA is faster. The
tradeoff is that key verification is slightly slower.
The practical advantages of a smaller key size compared to the equivalent-security larger key size are an increase in
server performance and the number of simultaneous connections possible, combined with a decrease in CPU usage.
12/20
13/20
References
Simon Singh: The Code Book; Shinchosha Publishing Co., Ltd. 2001
http://freemasonry.bcy.ca/texts/templars_cipher.html
http://www.nsa.gov/ia/programs/suiteb_cryptography/
http://www.nsa.gov/public_info/_files/cryptologic_spectrum/early_history_nsa.pdf
Reference Whitepapers
www.symantec-wss.com
Symantec Corporation has made every effort to ensure the accuracy and completeness of the information provided in this document. However, Symantec Corporation makes
no warranty, express, implied or statutory, with regard to information included in this document. Symantec Corporation shall not be liable for losses or damages caused, either
directly or indirectly, by errors in, omissions from, or statements made in this document. Symantec Corporation shall not be liable for the results of applications or uses of
products or services described in this document; specifically, the company disclaims any warranty against infringement of existing or future intellectual property rights by
products or services described in this document. This document does not grant its readers any license for the manufacture, use or sale of machinery or products produced
in accordance with the contents of the document. All rights and privileges related to all intellectual property rights described in this document belong to the holder of the
respective patent, trademark or service mark. Other parties may not exercise such rights without the express approval, authorisation or license of the respective patent,
trademark or service mark holder.
Symantec Corporation reserves the right to make changes to this document without prior notice.
14/20
Symantec UK
Symantec (UK) Limited. 350 Brook Drive,
Green Park, Reading, Berkshire, RG2 6UH, UK.
www.symantec.co.uk/ssl
Symantec (UK) Limited, Website Security Solutions, 350 Brook Drive, Green Park, Reading Berkshire RG2 6UH, UK
2014 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, the Checkmark Logo, Norton Secured, and the Norton
Secured Logo, are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. VeriSign
and other related marks are the trademarks or registered trademarks of VeriSign, Inc. or its affiliates or subsidiaries in the U.S. and other
countries and licensed to Symantec Corporation. Other names may be trademarks of their respective owners.