Although most people claim they’re not familar with cryptography, they are often familar with the concept of ciphers, whether or not they are actually concious of it.
Ciphers are arguably the corner stone of cryptography. In general, a cipher is simply just a set of steps (an algorithm) for performing both an encryption, and the corresponding decryption.
Despite might what seem to be a relatively simple concept, ciphers play a crucial role in modern technology. Technologies involving communication (including the internet, mobile phones, digital television or even ATMs) rely on ciphers in order to maintain both security and privacy.
This section (quite appropriately) deals with individual ciphers and algorithms. They have been divided based on their era and category (i.e. when were they used and how do they work). If you’re looking for a reference guide, refer to the alphabetical list to the right, otherwise continue reading.
Although most people claim they’re not familar with cryptography, they are often familar with the concept of ciphers, whether or not they are actually concious of it. Recent films such as The Da Vinci Code and National Treature: Book of Secrets have plots centered around cryptography and ciphers, bringing these concepts to the general public.
The eras of cryptography?
Crytography has been through numerous phases of evolution. Early ciphers in cryptography were designed to allow encryption and decryption to take place by hand, while those which are developed and used today are only possible due to the high computational performance of modern machines (i.e the computer you are using right now). The major eras which have shaped cryptography are listed below.
Mechanical Ciphers are those that were developed around the second World War, which rely on sophisticated gearing mechanisms to encipher text.
- Enigma Cipher
- Lorenz Cipher
Modern algorithms are those that are used in current technology e.g. block ciphers, public key cryptosystems etc. These alogrithms are very secure (otherwise they would not be used), but in many cases we can practice on weakened versions of the algorithms.