█ JUDSON KNIGHT
Cryptology is the study of both cryptography, the use of messages concealed by codes or ciphers, and cryptanalysis, or the breaking of coded messages. It is nearly as old as civilization itself, although ciphers and codes prior to the late medieval period in western Europe tended to be extremely simple by today's standards. Advances in mathematics made possible the development of ever more sophisticated systems. Further improvements in cryptology accompanied the creation of modern standing armies and intelligence services during the nineteenth century. Following the world wars and the creation of the computer, cryptology entered a far more advanced stage, resulting in the creation of codes and ciphers so sophisticated that virtually no amount of human genius unaided by computer technology can break them.
Early examples of cryptology can be found in the work of Mesopotamian, Egyptian, Chinese, and Indian scribes. In those four cradles of civilization, which emerged during
the period between 3500 and 2000 b.c., few people could read and write, therefore, written language was a secret code in itself. Further concealment of meaning behind opaque hieroglyphs, cuneiform, or ideograms served to narrow the intended audience even further.
The specialization of writing skills served, in two cases, to prevent the transmission of these skills to later generations. Knowledge of hieroglyphic writing in Egypt died out, and without the discovery and deciphering of the Rosetta Stone in the early nineteenth century, translation of Egyptian texts would probably have not occurred until the computer age—if at all. The fact that the written language of the Indus River valley civilizations in ancient India remains to be translated serves as proof that computers cannot solve all cryptologic questions without a crib or key.
Greece and Rome. Modern scholars know a great deal more about cryptologic systems in Greece and Rome than in earlier civilizations. The Spartans in about 400 b.c. used a cryptographic system called a scytale, whereby a sheet of papyrus was wrapped around a staff, a message was written down the length of the staff, and then the papyrus was unwrapped. In order to read the message properly, the recipient had to have a staff of exactly the same diameter.
Two centuries later, the Greek historian Polybius introduced what became known as the Polybius square, a 5 x 5 grid that used the 24 letters of the Greek alphabet—a model for the ADFGX cipher used by the Germans in World War I. Julius Caesar in the first century b.c. employed one of the first known ciphers, a system that involved a shift three letters to the right: for example, a plain text Z would become a C, an A a D, and so on.
Progress in cryptology—as with most other areas of study—came to a virtual standstill between the decline of the Roman Empire in the third century and the rise of Islam in the seventh. Arab scholars pioneered cryptanalysis, the solving of ciphers or codes without the aid of a key, from the eighth century onward. In 1412, al-Kalka-shandi published a treatise in which he introduced the technique, later made famous to popular audiences by Edgar Allan Poe in "The Gold Bug," of solving a cipher based on the relative frequency of letters in the language.
By that time, cryptology had begun to advance again in Europe, where the Italian city states used secret codes for their diplomatic messages in the fourteenth century. Messages were carried on horseback, and even in peacetime, the roads of Europe were plagued with highway robbers, so secrecy in communication was of the utmost importance.
Progress in mathematical learning from the twelfth century onward aided these advances. In the early thirteenth century, Italian mathematician Leonardo Fibonacci introduced the Fibonacci sequence, wherein each number is the sum of the previous two: 1, 1, 2, 3, 5, 8, and so on. Fibonacci's sequence would prove highly influential in cryptology: even in the late twentieth century, some cryptologic systems relied on an electronic machine called a Fibonacci generator, which produced numbers in a Fibonacci sequence.
In the late fifteenth century, another influential Italian mathematician, Leon Battista Alberti, published a work in which he introduced the idea of a cipher disk. The latter is a device for encoding and decoding messages by use of concentric wheels imprinted with alphabetic and numeric characters. Even in the late nineteenth century, cryptographers were using cipher disks based on the model pioneered by Alberti.
The Early Modern Era (1500–1900)
Due to its secret nature, cryptography—a word based on Greek roots meaning "secret writing"—had long been
associated with the occult, and one occultist who advanced the art was the early sixteenth-century German monk Trithemius. Trithemius developed a table in which each row contained all the letters of the alphabet, but each successive row was shifted over by one letter. The first letter of plain text would be encrypted using the first line, the second letter using the second line, and so on. Late in the 1500s, French cryptographer Blaise de Vigenère adapted the Trithemius table for his own Vigenère table, which in the twentieth century became the basis for the widely used data encryption standard, or DES.
By the eighteenth and early nineteenth centuries, cryptography had become widely used in Europe, where governments employed special offices called "black chambers" to decipher intercepted communications. In America, Thomas Jefferson developed an early cipher wheel, and in the 1840s, Samuel F. B. Morse introduced a machine that would have a vast impact on cryptology: the telegraph. Up to this time, all encoded or enciphered communication had been written and carried by hand, and the telegraph marked the first means of remote transmission. It also employed one of the most famous codes in the world, the Morse code, and helped influence widespread popular interest in cryptography. (It is no accident that Poe's fictional writing on cryptology coincided with this era.)
In the 1850s, Charles Wheatstone and Lyon Playfair introduced the Playfair system, which used a Polybius square and encrypted letters in pairs. This pairing made deciphering more difficult, since it was less easy to see how frequently certain letters appeared. The Playfair system proved so effective that the Allies used it in limited form against the Japanese during World War II. Despite these advances of the era, cryptography was still far from advanced during the American Civil War. The Confederacy was so disadvantaged in the realm of cryptanalysis that its government sometimes published undeciphered Union messages in newspapers with a request for readers' help in deciphering them.
The Twentieth Century
In the early twentieth century, another invention, the radio, had a profound effect on cryptography by greatly improving the capacity of senders to transmit messages to remote areas. World War I marked a watershed in cryptography. Not only was it the first major conflict in which radio was used, it was the last in which a great power failed to employ cryptographic communications. On the Eastern Front, the Russians sent uncoded messages that were easily interpreted by Russian-speaking intelligence officers on the German and Austrian side, leading to a massive victory for the Central Powers at Tannenberg in 1914.
The war also marked the debut of the Germans' ADFGX cipher, which was so sophisticated that French cryptanalysts only deciphered it for one day, after which the Germans again changed the key. But the cryptographic dimension of the war did not belong entirely to the Central Powers. British signal intelligence cracked the German cipher, and intercepted a message from German foreign minister Arthur Zimmermann to the Mexican president, promising to return territories Mexico had lost to the United States in the Mexican War if the country attacked the United States. Informed of the Zimmermann telegram, President Woodrow Wilson declared war on Germany.
Also in 1917, American engineer Gilbert S. Vernam developed the first significant automated encryption and decryption device when he brought together an electromagnetic ciphering machine with a teletypewriter. A year later, Major Joseph O. Mauborgne of the U.S. Army devised the one-time pad, whereby sender and received possess identical pads of cipher sheets that are used once and then destroyed—a virtually unbreakable system. World War I also saw the development of a cipher machine by Edward Hebern, who tried to sell his idea to the U.S. Navy. The Navy rejected Hebern's system, which was later taken by the Japanese and used in World War II. By the time of that war, Hebern had developed Mark II (SIGABA), which became the most secure U.S. cipher system during the conflict.
Allied cryptologic victories against the Axis in World War II have long been celebrated in the intelligence community, and few have received more acclaim that the cracking of the German Enigma code. The Germans' Enigma machine, invented by German electrical engineer Arthur Scherbius around the same time Hebern introduced his device, was a complex creation in which the variable settings of rotors and plugs determined the keys. Solving it was a major victory for the Allies, who kept secret the fact that they had cracked the system so as to keep exploiting it. Cracking of codes also aided victories in North Africa and the Pacific. At the same time, American use of codetalkers transmitting enciphered messages in the Navajo Indian language made their transmissions indecipherable to the Japanese.
The computer age. American cryptologic work during World War II had contributed to the development of a machine, the computer, which would revolutionize cryptology to an even greater extent than the telegraph or radio had previously. Most cryptologic advances since the war have involved, or made use of, computers. A quarter-century after the war's end, in the early 1970s, American electrical engineers Martin Hellman and Whitfield Diffie introduced the idea of asymmetric or public-key ciphers, which are extremely hard to crack. This led to the development of the RSA algorithm (named for its creators, Rivest, Shamir, and Adelman) at the Massachusetts Institute of Technology in 1977.
Also in 1977, the U.S. federal government introduced DES, a transposition-substitution algorithm so complex that it seemed a safe means of guarding computer data. Given the fact that DES had some 256 possible keys (a number roughly equivalent to a 1 followed by 17 zeroes), it had seemed unbreakable at the time. By the early 1990s, however, vast increases in the processing speed of computers had made it possible for hackers to break DES using "brute-force" means—that is, trying every possible value for a given cipher until finding a solution. To guard against these attacks, new Advanced Encryption Standard (AES) algorithms were developed to replace DES.
Advances in computers, and in communication by electronic means over the Internet, have both enabled and necessitated progress in cryptology. For example, electronic commerce requires sophisticated encryption systems to protect users' credit card information. Similarly, digital communication via cellular telephones requires encryption to prevent easy interception of phone calls. Developments of the 1990s include Phil Zimmermann's PGP (Pretty Good Privacy) to protect e-mail communications.
█ FURTHER READING:
Beutelspacher, Albrecht. Cryptology: An Introduction to the Art and Science of Enciphering, Encrypting, Concealing, Hiding, and Safeguarding Described Without Any Arcane Skullduggery But Not Without Cunning Waggery for the Delectation and Instruction of the General Public. Washington, D.C.: Mathematical Association of America, 1994.
Haldane, Robert A. The Hidden War. New York: St. Martin's Press, 1978.
Kahn, David. Kahn on Codes: Secrets of the New Cryptology. New York: Macmillan, 1983.
Konheim, Alan G. Cryptography, a Primer. New York: Wiley, 1981.
Lubbe, J. C. A. van der. Basic Methods of Cryptography. New York: Cambridge University Press, 1995.
Melton, H. Keith. The Ultimate Spy Book. New York: DK Publishing, 1996.
"Cryptology, History." Encyclopedia of Espionage, Intelligence, and Security. . Encyclopedia.com. (October 21, 2018). http://www.encyclopedia.com/politics/encyclopedias-almanacs-transcripts-and-maps/cryptology-history
"Cryptology, History." Encyclopedia of Espionage, Intelligence, and Security. . Retrieved October 21, 2018 from Encyclopedia.com: http://www.encyclopedia.com/politics/encyclopedias-almanacs-transcripts-and-maps/cryptology-history
Encyclopedia.com gives you the ability to cite reference entries and articles according to common styles from the Modern Language Association (MLA), The Chicago Manual of Style, and the American Psychological Association (APA).
Within the “Cite this article” tool, pick a style to see how all available information looks when formatted according to that style. Then, copy and paste the text into your bibliography or works cited list.
Because each style has its own formatting nuances that evolve over time and not all information is available for every reference entry or article, Encyclopedia.com cannot guarantee each citation it generates. Therefore, it’s best to use Encyclopedia.com citations as a starting point before checking the style against your school or publication’s requirements and the most-recent information available at these sites:
Modern Language Association
The Chicago Manual of Style
American Psychological Association
- Most online reference entries and articles do not have page numbers. Therefore, that information is unavailable for most Encyclopedia.com content. However, the date of retrieval is often important. Refer to each style’s convention regarding the best way to format page numbers and retrieval dates.
- In addition to the MLA, Chicago, and APA styles, your school, university, publication, or institution may have its own requirements for citations. Therefore, be sure to refer to those guidelines when editing your bibliography or works cited list.