preview

History of Cryptology

explanatory Essay
627 words
627 words
bookmark

Cryptology played a crucial role during WWII and after cryptology really became a modern use of technology, but the real story is where cryptology actually had its beginnings. In order to truly understand cryptology and its purpose we must go back thousands of years ago to its first beginnings in Ancient Egypt and discover how cryptology rose to its infamous aid of the Second World War.
Approximately four thousand years ago in Menet Khufu, a small village in Ancient Egyptian, the beginnings of an essential component to cryptology was founded, the modification of text. In a tomb of a local noblesman, Khnumhotep II, hieroglyphic inscriptions were written with unusual symbols in order to confuse and obscure the meaning of the inscriptions being written. It is said that a nobleman’s tomb’s decorations often “break” with the norms of a typical Egyptian tomb (www.cs.dartmouth.edu). Khnumhotep’s tomb is an example of this “breaking from the norm”, which could signify his importance during his lifetime. The next example of cryptology surfacing in ancient times is about 400 years later in Ancient Mesopotamia.
A tablet found on the banks of the Tigris river contained en encrypted formula for pottery glaze. This small three by two inch tablet must have been important to have encrypted such a recipe. Pottery was a crafted art done by individuals that specialized in creating different types of pottery. It can be seen that such a highly prized art form would have wanted to maintain its trade secret so that only those trained would be allowed to succeed in such a business. By encrypting this recipe the Sumerians clearly wanted to keep this ability, glazing pottery, a secret but also by making it into a tablet, they wanted the recipe to last. ...

... middle of paper ...

.../egypt.html>.
• "History of Cryptography." History of Cryptography. Cypher Research Laboratories, 17 Apr. 2013. Web. 20 Nov. 2013. http://www.cypher.com.au/crypto_history.htm.
• Lyons, James. "Atbash Cipher." Practical Cryptography. James Lyons, n.d. Web. 21 Nov. 2013. .
• Mollin, Richard A. Codes: The Guide to Secrecy from Ancient to Modern times. Boca Raton: Chapman & Hall/CRC, 2005. Google Books. Google. Web. 20 Nov. 2013.
• "steganography." The Free On-line Dictionary of Computing. Denis Howe. 20 Nov. 2013. .
• "The Scytale Cipher." Enigma Group. Enigma Group, 10 May 2008. Web. 21 Nov. 2013.
• "1900 BC." ThinkQuest. Oracle Foundation, n.d. Web. 20 Nov. 2013. .

In this essay, the author

  • Explains that beutelspacher, albrecht, "the spartan scytale." cryptology.
  • Explains gardner's art through the ages: the western perspective. boston, ma: wadsworth/cengage learning, 2014.
  • Explains cypher research laboratories' history of cryptography.
  • Explains that mollin, richard a. codes: the guide to secrecy from ancient to modern times.
  • Explains how cryptology began in ancient egypt and how it rose to its infamous aid of the second world war.
Get Access