| A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
1 | {label} | {start:date} | {end:date} | {description:single} | {image:url} | {cat} | {initials} | |||||||||||||
2 | The Beginnning of Cryptography | -2000 | "It is believed that the oldest known text to contain one of the essential components of cryptography, a modification of the text, occurred some 4000 years ago in the Egyptian town of MENET KHUFU where the hieroglyphic inscriptions on the tomb of the nobleman KHNUMHOTEP II were written with a number of unusual symbols to confuse or obscure the meaning of the inscriptions" (Cypher Research Laboratories Pty. Ltd) | http://library.thinkquest.org/28005/flashed/timemachine/courseofhistory/hierogly.jpg | Ciphers | AFT | ||||||||||||||
3 | Spartan Scytale | -0500 | "The scytale is a wooden staff around which a strip of leather or parchment is wound. [...] THe sender writes the message along the length of the scytale, and then unwinds the strip, which now appears to carry a list of meaningless letters. The message has been scrambled. [...] To recover the message, the receiver simply wraps the leather strip around a scytale of the same diameter as the one used by the sender." (Singh 8-9) | http://global.mitsubishielectric.com/misty/tour/stage1/image/qetimg_02.gif | Military | AFT | ||||||||||||||
4 | Kryptos Sculpture Dedicated in Langley | 1990-11-03 | Coded sculpture, "Kryptos," created by Jim Sanborn was installed at the CIA headquarters as a challenge to CIA employees. The code consists of four parts, three of which have been deciphered to date. The remaining part has become famous as one of the greatest unsolved codes in the world. http://en.wikipedia.org/wiki/Kryptos | http://michaelgr.files.wordpress.com/2008/12/cia-kryptos-sculpture-01.jpg | Unsolved | CSH | ||||||||||||||
5 | German ADFGVX cipher (introduced and deciphered) | 1918-03-05 | 1918-06-02 | A cross between a substitution and a transposition cipher, the ADFGVX cipher was thought to be the most secure means of communication at the time. The German military used it in their offensive, but it took only a few months for frenchman Georges Painvin of the Bureau de Chiffre to decode it. | http://www.cientificosaficionados.com/foros/viewtopic.php?f=1&t=10976&start=0&sid=8412c9ef0dac1c3bce741d899c7afa83 | Ciphers | CSH | |||||||||||||
6 | Traicte de Chifres | 1586 | "A Treatise for Secret Writing," published by Vigenere. | http://www.csiargentina.com/saberhistoria/?tag=espionaje | Culture | CSH | ||||||||||||||
7 | Victor Gendren unearthed letters enciphered with the Great Cipher | 1890 | While researching Louis XIV of France, Gendren discovered these letters, which would become instrumental in breaking the Great Cipher because there was much more ciphertext available. | http://www.gameo.org/encyclopedia/contents/L6713.html | People | CSH | ||||||||||||||
8 | Vigenere's <i>Traicte des Chiffres</i> | 1586 | Blaise de Vigenere published his "Treatise on Secret Writing" in 1586, leading to the Vigenere cipher being named after him. (Singh, p. 51) | http://upload.wikimedia.org/wikipedia/commons/1/1a/Vigenere.jpg | Ciphers | DOB | ||||||||||||||
9 | Zimmerman Telegram Intercepted | 1917-01-17 | Arthur Zimmerman's telegram to the German Ambassador to Mexico was intercepted by the British Room 40. (Singh, p. 107) | http://upload.wikimedia.org/wikipedia/commons/c/ce/Ztel1b.jpg | Military | DOB | ||||||||||||||
10 | Babbage Cracks the Vigenere | 1854 | Charles Babbage likely developed his technique for deciphering the Vigenere cipher this year in response to a challenge from John Hall Brock Thwaits. (Singh, p. 67) | http://upload.wikimedia.org/wikipedia/commons/8/82/CharlesBabbage.jpg | Ciphers | DOB | ||||||||||||||
11 | Edgar Allen Poe's "The Gold Bug" | 1843 | Edgar Allen Poe published "The Gold Bug," which featured a description of frequency analysis. (Singh, p. 81) | http://upload.wikimedia.org/wikipedia/commons/thumb/b/bf/The_Gold_Bug_Herpin.JPG/426px-The_Gold_Bug_Herpin.JPG | Culture | DOB | ||||||||||||||
12 | World War II | 1939 | 1945 | Germany invaded Poland in 1939, beginning the Second World War. The war was over in 1945 when the United States dropped nuclear bombs on Japan. | Military | DOB | ||||||||||||||
13 | Rossignol team become the prominent French cryptanalysts | 1626 | By decoding a letter sent within the Huguenot army, the French are able to defeat them without shots fired. The city of Realmont is saved. | http://upload.wikimedia.org/wikipedia/commons/e/e4/Rossignol,_Antoine.jpg | Military | E.B. | ||||||||||||||
14 | First description of a telegraph machine | 1753 | An anonymous letter in a Scottish magazine describes how messages can be sent by 26 cables, one for each letter of the alphabet. The sender could spell out the message by sending pulses of electricity along each wire. | Technology | E.B. | |||||||||||||||
15 | "Pekinese Dogs" dispatched by Napoleon | 1798 | Napoleon Bonaparte sent a team of historians, scientists and draftsmen to follow the French invading army and record everything they witnessed. | People | E.B. | |||||||||||||||
16 | Rosetta Stone discovered | 1799 | While demolishing a wall, soldiers stationed at Fort Julien in Rosetta found a tablet that was essentially a cryptanalytic crib. It contained the same text written three times, once in Greek, once in demotic, and once in hieroglyphics. | http://liology.files.wordpress.com/2010/01/rosetta-stone.jpeg | Culture | E.B. | ||||||||||||||
17 | Precis du systeme hieroglypique is published. | 1824 | Champollion publishes his book that details his work hierolgyphics. It was now possible to read the histories of the Pharoahs as written by the scribes and to translate any hieroglyphics that Egyptian historians encountered. This work also lead to the interpretation of the demotic and heratic languages. | http://ecx.images-amazon.com/images/I/51YVDHBNDTL._BO2,204,203,200_PIsitb-sticker-arrow-click,TopRight,35,-76_AA300_SH20_OU01_.jpg | Culture, People | E.B. | ||||||||||||||
18 | Linear B tablets discovered on Crete | 1900-03-31 | Sir Arthur Evans discovers a vast collection of tablets on Crete, proving his theory that the Mycean civilization was literate and had developed a written language. The most advanced and recent category of tablets (the collection was divided into three categories based on date and sophistication) dated from 1450 to 1375 B.C. and was dubbed Linear B because of the linear nature of the script. | http://www.utexas.edu/courses/mooreworldlit/troyimages/linearb.jpg | Culture, People | E.B. | ||||||||||||||
19 | "Evidence for the Greek Dialect of the Mycean Archives" is published in The Jounal of Hellenic Studies | 1953 | The work is a combined effort of the knowledge of Greek and decipherment held by Ventris and Chadwick. In it, they propose that Linear B is actually written in Greek, revolutionizing the way historians view the Mycean/Minoan history. From this, many have hypothesized that Linear A is written in a Minoan language that was transformed into Linear B when the Myceans conquered the Minoans. | Culture, People | E.B. | |||||||||||||||
20 | Moriss discovers the Beale ciphers | 1845 | Moriss, the innkeeper whom Beale entrusted his locked box of ciphers, finally opened the box after 23 years in 1845 when he could safely assume that Beale was dead and never returning to reclaim the box. Inside he found three pages of numbers and one sheet of plain English indicating that another message was on its way with the key. The key never made it to Moriss, and since the opening of the box, cryptanalysts have spent lifetimes trying to decipher the three pages of text that supposedly lead to a treasure Beale accumulated in an expedition out West. Only one page has ever been deciphered. The Declaration of Independence was used as a key. | Unsolved | E.B. | |||||||||||||||
21 | Life of Charles Babbage | 1791-12-26 | 1871-10-18 | Charles Babbage, famous for deciphering the vigenere cipher and the creation of the analytical machine, was born on December 12 1791 and died on October 18 1871. | http://www.oldcomputers.arcula.co.uk/files/images/hist301t.jpg | People | JFH | |||||||||||||
22 | Life of Al Kindi | 0801 | 0873 | Al Kindi, creator of frequency analysis, was born Abū Yūsuf Yaʻqūb ibn Isḥāq al-Kindī. He was born in Iraq and contributed greatly to the fields of Mathematics, Philosophy, Music, Medicine, Astrology, Chemistry, Physics, and Psychology. | http://www.mendaki.org.sg/content_images/alkindi2.gif | People | JH, TRS | |||||||||||||
23 | Arrest of Bernardo Provenzano | 2006 | Berrnardo Provenzano, mafia "godfather" was arrested after using a type of Caesar shift cipher in order to encrypt his messages. "A" would be written as 4, "B" would be written as 5 etc. | http://img.thesun.co.uk/multimedia/archive/00401/SNF08CODESPD-682_401539a.jpg | People | JH, TRS | ||||||||||||||
24 | La Cryptographie militaire | 1883 | Dutchman Auguste Kerckhoffs' treatise "La Cryptographie militarie" was an excellent guide and tool for the French with insights into the principles of cryptanalysis. His ideas were implimented into French military tactics on an "industrial scale" | Military | JJO | |||||||||||||||
25 | History of the First World War published by British Royal Navy | 1923 | Restated the fact that interception and cryptanalysis of German communication during World War I aided the Allies in their efforts against the Central Powers | Military | JPZ | |||||||||||||||
26 | Kama-Sutra written | 0300 | Text written by a Brahmin scholar named Vatsyayana who recommended that women should study 64 arts, including the art of secret writing. Specific techniques, such as random letter pairing are cited. | Culture | JPZ | |||||||||||||||
27 | Lives of the Caesars LVI written by Suetonius | 0100 | This text provided a description of some of the cryptographic techniques used by Julius Caesar during his Gallic campaigns. The Caesar shift is a cipher in which the plain alphabet is shifted x number of spaces over in the alphabet, moving every corresponding letter the same amount of spaces away from their original position. | http://questgarden.com/62/15/1/080310122438/images/julius_caesar_statue.jpg | Military | JPZ | ||||||||||||||
28 | Jefferson's Wheel Cypher | 1790 | The invention, by Thomas Jefferson, of a mechanical wheel cypher to encipher messages. The wheel cypher consisted of a number of disks with an alphabet enscribed on their outer edge about a center axis. The disks could be rotated about to form different messages. (Barr, 15) | http://upload.wikimedia.org/wikipedia/commons/thumb/4/40/Jefferson%27s_disk_cipher.jpg/320px-Jefferson%27s_disk_cipher.jpg | Ciphers, People | JPZ | ||||||||||||||
29 | Bazeries Reproduces Wheel Cypher | 1890 | Etienne Bazeries independently reproduced Jefferson's wheel cypher. His reproduction, often called the Bazeries Cylinder, followed the Jeffersonian model very closely. It also served as a future model for similar ciphers during the world wars. (Barr, 16) | http://www.quadibloc.com/crypto/images/baz.gif | Ciphers, People | JPZ | ||||||||||||||
30 | Parker Hitt Designs Strip Cipher | 1916 | Based on the previous models developed by Jefferson and Bazeries, Hitt was able to adapt this cipher for military use. The M-138 strip cipher was one of the first ciphers used by the Americans during the interwar period and was eventually modified for use later in the war. It greatly improved the Americans encrypting abilities and helped provide an advantage, for a time, during World War II. | http://www.vectorsite.net/ttcode_05_02.jpg | Ciphers, People, Military | JPZ | ||||||||||||||
31 | Marconi invents the radio | 1894 | Marconi found that he could transmit information wirelessly across short distances and patented the idea in 1896. He continued to increase the distance that his wireless communications could travel, ultimately reaching over 3500 km. His invention revolutionized military communication and increased the need for secure encryption. | http://upload.wikimedia.org/wikipedia/commons/thumb/0/0d/Guglielmo_Marconi.jpg/225px-Guglielmo_Marconi.jpg | Technology | MHG | ||||||||||||||
32 | Black chamber is disbanded | 1929 | 1929 | Herbert Hoover is elected president and disbands the black chamber, the American cipher bureau that had been established following WWI. | http://upload.wikimedia.org/wikipedia/commons/thumb/9/97/Herbert_Hoover.jpg/245px-Herbert_Hoover.jpg | Military | MHG | |||||||||||||
33 | Origin of the Telegraph | 1753 | 1839 | Letter in a Scottish magazine described a system that would later be called the Wheatstone-Cooke system, which was essentially a way of sending messages across cables, a primitive version of the telegraph. | http://www.connected-earth.com/galleries/Telecommunicationsage/Thetelegraph/Thetelegraphicagedawns/index.htm | Technology | PAB, CSH | |||||||||||||
34 | Difference Engine #1 designed | 1823 | Frustrated by many errors in mathematical tables, Babbage designed the difference engine number one to calculate values accurately. | Technology | PAB | |||||||||||||||
35 | Americans decipher crucial Purple message | 1942-06 | American cryptanalysts were able to decipher a message encoded using Purple, the Japanese cipher machine. The message outlined a plan by the Japanese to stage an attack on the Aleutian Islands to lure defences away from their true objective, Midway Island. With this intelligence, the Americans gained the element of surprise and were able to rout the Japanese. | http://www.nationalmuseum.af.mil/shared/media/photodb/web/070918-F-1234S-005.jpg | Ciphers, Military | RCR | ||||||||||||||
36 | First Navajo Code Talkers trained | 1942-05 | 1942-07 | Navajo was found to be ideal for use as a military code. This was because it was a member of the Na-Dene family of languages, which has no connection to any Asian or European languages, and also because it had not been studied by German students. Within four months of the Japanese attack on Pearl Harbor, 29 Navajo men began an eight-week communications course with the U.S. Marine Corps. By the end of 1942, there was a request for 83 more. Over the course of the war, as many as 420 Navajo served as Code Talkers. | http://blog.longnow.org/wp-content/uploads/2009/11/Navajo_Code_Talkers1.jpg | Ciphers, Military, People | RCR | |||||||||||||
37 | Navajo code declassified | 1968 | The Navajo were recognized as soldiers following the war, but their role in securing communications remained classified until the year 1968. Finally, they were given the full recognition and honor they deserved for their contribution to the Allied victory in World War II. | http://www.lapahie.com/Pictures/NavajoCodeTalker_Silver_Medal_F_Face.jpg | Military, People | RCR | ||||||||||||||
38 | August 14 named "National Navajo Code Talkers Day" | 1982 | The U.S. government dedicated August 14 as a day to recognize the work of the Navajo Code Talkers. | http://americanhonor.bizland.com/store/media/navajo_code_FB.jpg | Military, People | RCR | ||||||||||||||
39 | Persian fleet defeated at Bay of Salamis | -0480 | Demaratus warned the Greeks of an impending Persian attack using steganography. He wrote on wooden tablets and then covered the tablets in wax to conceal the message. Thanks to him, the Greeks were able to prepare and defeat the Persian fleet. | http://www.rankopedia.com/CandidatePix/29026.gif | Military | RCR, TBM | ||||||||||||||
40 | al-Kindi's treatise rediscovered | 1987 | al-Kindi's treatise, "A Manuscript on Deiphering Cryptographic Messages" is found detailing his cryptanalysis techniques | http://www.muslimheritage.com/uploads/page_from_AlKindi_book.JPG | People | RL, DPC | ||||||||||||||
41 | Chaucer's Treatise on the Astrolabe | 1391 | This treatise includes several encrypted paragraphs replacing plain text with symbols. | http://www.fromoldbooks.org/Andrews-HistoricBywaysAndHighways/063-Geoffrey-Chaucer-q75-450x500.jpg | People | RL, DPC | ||||||||||||||
42 | Conan Doyle's "The Dancing Men" | 1903 | Sir Arthur Conan Doyle's Sherlock Holmes story, "The Adventure of the Dancing Men," features a substitution cipher that uses stick figures that appear to be dancing. In the story, the cipher is developed and used by Chicago gangsters. Steganography is also employed here, as the symbols are meant to be passed over as merely children's drawings. As there was no pattern to the cipher, Holmes had to resort to frequency analysis and context clues (such as the name of the messages' recipient) to crack it. "The Dancing Men" remains one of the most popular Holmes stories, ranking in the top ten according to both the Baker Street Irregulars and Conan Doyle himself. (Bantam Classic's <i>Sherlock Holmes: The Complete Novels and Stories Volume I</i> p. 806-831, <i>The Baker Street Journal</i> December 1999 p. 5-11) | http://www.smiling-dolphin.com/blog_images/dancing_man.gif | Culture | RML | ||||||||||||||
43 | Bazeries breaks the Great Cipher | 1890 | 1893 | Étienne Bazeries deciphered several documents belonging to Louis XIV that were encrypted with the Rossignols' Great Cipher. The documents seem to refer to the fabled Man in the Iron Mask, but their veracity is the subject of some debate. (Singh, p. 54-56) | http://upload.wikimedia.org/wikipedia/en/thumb/8/89/Great_Cipher.png/618px-Great_Cipher.png | Ciphers | RML | |||||||||||||
44 | Beale Pamphlets Published | 1885 | Three ciphers, supposedly containing the location of a large store of treasure, were published in a pamphlet. Allegedly, Thomas Beale buried treasure near Lynchburg, VA. To this day, there has been no report of the treasure being found and only one of the ciphers has been deciphered (using the Declaration of Independence as a "book cipher." (Singh p. 82) | http://upload.wikimedia.org/wikipedia/commons/9/9d/Beale_Papers.gif | Unsolved | STM | ||||||||||||||
45 | Rosetta Stone Deciphered by Jean-François Chamollion | 1822 | The Rosetta stone was carved in 196 B.C. and contained the same message in Egyptian hieroglyphics, Egyptian common script, and Greek. During Napoleon's Egyptian campaigns, the stone was found by soldiers and sent back to Europe. Eventually, Champollion used his knowledge of the other scripts to decipher the hieroglyphics, meaning Europeans could now read other hieroglyphic messages. | http://upload.wikimedia.org/wikipedia/commons/2/23/Rosetta_Stone.JPG | Languages | STM | ||||||||||||||
46 | Babington Plot | 1586 | 1587 | Anthony Babington and a crew of conspirators believed Mary Stuart, "Queen of Scots" was the rightful heir to the English throne. The Catholics planned to free Mary from prison, assassinate the protestant Elizabeth I, and install Mary as Queen. A Catholic named Gilbert Gifford offered his help in the conspiracy secretly passed ciphered correspondence between Mary and Babington. Gifford was, however, a double agent who passed the letters to Sir Francis Walsingham, one of the Queen's secretaries who had the messages deciphered. The messages were used as evidence in Mary's trial for treason, which ended with her death. | http://upload.wikimedia.org/wikipedia/commons/e/e0/Babington_postscript.jpg | Military | STM | |||||||||||||
47 | The Great Paris Cipher Broken | 1811 | 1812 | The Armies of Napoleon introduced a grand chiffre known as the "Great Paris Cipher" in 1811. It marked the first time Napoleon's Grand Armée used a cipher with more than 200 code numbers. The Great Paris Cipher was based on the ciphers of Louis XIV, though less complicated. The Cipher was completely broken by Major George Scovell, commander of the Duke of Wellington's "Army's Guides" by late 1812. | http://www.nationalarchives.gov.uk/spies/ciphers/scovell/sc1_x.htm | Ciphers | STM | |||||||||||||
48 | Americans Develop "Holy Grail of Cryptography" | 1918 | American scientists developed a cipher form that eliminated much of the predictability of the Vigenère. They introduced the idea of a keyword as long as the ciphertext. Longer keywords make the cipher much harder to crack. However, keyphrases that were coherent were still predictable and breakable. In an attempt to create an unbreakable cipher, Major Joseph Mauborgne proposed using a completely random sequence of letters as the keyword. The sender and recipient would use a "onetime pad," using each "keyphrase" only once. Such a cipher is unbreakable, but because it is hard to implement it is used only in the most sensitive of communications. | http://upload.wikimedia.org/wikipedia/commons/c/c0/Joseph_Mauborgne.jpg | Ciphers | STM | ||||||||||||||
49 | Public Key Cryptography Developed by GCHQ | 1973 | James H. Ellis, Clifford Cocks, and Malcolm Williamson of the UK's GCHQ developed "non-secret encryption" with use of asymmetrical algorithms, allowing information to be encrypted with one key and decrypted with another. All users have a public key, which is widely distributed, and a private key which is kept secret. Information intended for a specific recipient is encrypted with his public key and can only be decrypted by his private key. In 1976, Whitfield Diffie and Martin Hellman developed the same system publicly and were given credit while the GCHQ work was not properly credited until 1997 because of the top-secret nature of the information. | http://upload.wikimedia.org/wikipedia/commons/f/f9/Public_key_encryption.svg | Technology, People | STM | ||||||||||||||
50 | Secret Intelligence Service Founded | 1909 | The Secret Intelligence Service (SIS) was founded in 1909. The SIS is more commonly known as MI6. It was founded to monitor intelligence operations. Germany was a country of particular interest when SIS was founded. | http://www.trendite.net/wp-content/secret-intelligence-service-adevertising-on-facebook-for-mi6-agents.gif | Military | TBM | ||||||||||||||
51 | First Enigma Machine invented | 1918 | Arthur Scherbius invented the first Enigma machine in 1918. It operated using a keyboard and a series of rotors to encrypt a message. When the key was turned, the rotors would spin altering the electrical circuit. This changed the encryption key used. The Enigma Machine was used by Germany in World War II. | http://upload.wikimedia.org/wikipedia/commons/a/ae/Enigma.jpg | Military | TBM | ||||||||||||||
52 | Germany begins sending messages enciphered by the Enigma | 1926 | British, French, and American code breakers began to intercept messages that they could not decipher. Germany now had secure communication. Britain lost the ability to monitor German communication, thus losing a major edge going into World War II. | http://www.google.com/imgres?imgurl=http://www.hermann-uwe.de/files/images/Enigma-rotor-stack.preview.jpg&imgrefurl=http://www.hermann-uwe.de/node/801&usg=__J1prlhh3pGBpXKDRu1prAKOhoYY=&h=480&w=640&sz=47&hl=en&start=9&zoom=1&tbnid=wiZwo-FpzcmfJM:&tbnh=103&tbnw=137&prev=/images%3Fq%3Denigma%26hl%3Den%26biw%3D1220%26bih%3D621%26gbv%3D2%26tbs%3Disch:1&itbs=1 | Ciphers, Military, Technology | TBM | ||||||||||||||
53 | Alan Turing is Born | 1912 | Alan Turing was a British cryptanalyst working at Blechley Park on cracking the Enigma machine. He attended King's College, Cambridge. He came up with the idea of a machine that could preform any mathematical function, called the universal Turing Machine. It was to be capable of answering any question that could possibly be answered. Turing was also homosexual; he found acceptance while in Cambridge. In 1939, he was invited to the Government Code and Cipher School. He came up with a way to decipher the Enigma without the repetition of the message key. | http://www.google.com/imgres?imgurl=http://sexualityinart.files.wordpress.com/2009/09/alan-turing-2.jpg&imgrefurl=http://sexualityinart.wordpress.com/2009/09/01/in-1952-the-british-government-chemically-castrated-alan-turing-a-leading-cryptanalyst-who-during-ww-ii-broke-the-nazis-enigma-code/&usg=___lyq3vDW6c94a-1N4daU-21RG3M=&h=520&w=473&sz=68&hl=en&start=0&zoom=1&tbnid=lqAgVlgFehKV4M:&tbnh=151&tbnw=142&prev=/images%3Fq%3Dalan%2Bturing%26hl%3Den%26biw%3D1220%26bih%3D621%26gbv%3D2%26tbs%3Disch:1&itbs=1&iact=hc&vpx=132&vpy=104&dur=765&hovh=235&hovw=214&tx=128&ty=115&ei=baK_TIzZCMH98Ab94ITtBA&oei=baK_TIzZCMH98Ab94ITtBA&esq=1&page=1&ndsp=21&ved=1t:429,r:0,s:0 | People | TBM | ||||||||||||||
54 | Alan Turing dies | 1954 | When it was discovered that he was a homosexual, he was forced to meet with a psychiatrist and was placed on hormone treatment. He was also not allowed to continue work on the computer. He became depressed and eventually committed suicide on June 4, 1954. | http://www.bletchleypark.org.uk/doc/image.rhtm/Turing2.jpg | People | TBM | ||||||||||||||
55 | Britain cracked the Enigma Code during WWI | 1941 | In a top secret series of raids on German ships and U-boats, Britain was able to siezed several Enigma machines that the Germans used to encode messages during WWI. Although they had already cracked a small portion of the cipher using previous intelligence, British code breakers were able to decipher German messages that they intercepted that had been enciphered by the Enigma machine after this achievement (this information and more on http://www.militaryhistoryonline.com/wwii/atlantic/enigma.aspx). | http://upload.wikimedia.org/wikipedia/commons/c/c4/Enigma_machine_-_Polish_labels.jpg | Military | TRS | ||||||||||||||
56 | Chaocipher Revealed | 2010 | In 2010, John Byrne's daughter-in-law donated his notes and blueprints about the Chaocipher he created almost a century ago to the National Cryptological Museum. This was the first time the public was able to crack the cipher, which had been unbroken since creation. | http://www.fiziwig.com/crypto/slide04.png | Ciphers, People, Culture | TRS | ||||||||||||||
57 | Chaocipher Created | 1919 | John Byrne created a cipher that he called the Chaocipher in 1919 that he envisioned helping private businesses everywhere communicate securely. His cipher was never cracked by anyone until its algorithm was revealed in 2010, but it never received much recognition, either. | http://3.bp.blogspot.com/_JbOknwQdKo4/S4puIk18TOI/AAAAAAAADpw/rD6vefwGI3k/s400/chaocipher.gif | Ciphers, People | TRS | ||||||||||||||
58 | The Silent Years | 1954 | John Byrne published this autobiography to publicize information about his Chaocipher because it had received much less attention than he expected it would. In it, he challenges readers to figure out how he enciphered given plaintext to create his ciphertext. | http://fanjacc.files.wordpress.com/2007/12/chaocipher.jpg?w=450 | Ciphers | TRS | ||||||||||||||
59 | Etienne Bazeries Breaks Great Cipher | 1890 | 1893 | Bazeries struggled through trial and error to decode the Rossignols Syllabic cipher | Ciphers | TSH | ||||||||||||||
60 | Wheatstone-Playfair Cipher Introduced | 1854 | A digraphic cipher invented by scientist Charles Wheatstone and popularized by Baron Lyon Playfair. Ciphertext is made based on three rules that apply to a set cipher-square. | http://wpcontent.answcdn.com/wikipedia/commons/4/40/Playfair_Cipher_01_HI_to_BM.png | Ciphers, People | TSH | ||||||||||||||
61 | JFK rescued thanks to Playfair Cipher | 1943 | Future President John F. Kennedy Jr. was rammed by a Japanese destroyer in the Solomon Islands, and used the Playfair Cipher to encrypt a message to an Australian Coastwatcher. The Coastwatcher decrypted the message with the keyword “ROYAL NEW ZEALAND NAVY”, and soon thereafter rescued Kennedy and his crew. <http://practicalcryptography.com/ciphers/playfair-cipher/> | http://www.jfklibrary.org/NR/rdonlyres/53EB65EA-97FE-4B08-9A08-DC841347A946/24639/53EB65EA97FE4B089A08DC841347A947.jpg | Ciphers, People, Military | TSH | ||||||||||||||
62 | RSA Revealed to Public | 1977 | The discovery was announced by Martin Gardner in an article in "Scientific American". He issued a challenge to find the prime factorization of an example of an N value. It took 17 years to factor the number. | http://ec1.images-amazon.com/images/P/0486247619.01._SX220_SCLZZZZZZZ_.jpg | Ciphers | TBM | ||||||||||||||
63 | Clifford Cocks discovers function to utilize asymmetric cryptography | 1973 | Clifford Cocks, a graduate of Cambridge University, discovered a one way equation that could be used in asymmetric cryptography. He did this within his first two weeks at the GCHQ. Other cryptographers and mathematicians in the GCHQ had been working on this problem for three years; Cocks solved it in less than a half-hour. | http://www.ulm.ccc.de/old/chaos-seminar/krypto2/cocks.jpg | People | TBM | ||||||||||||||
64 | PGP Introduced to the public | 1991 | Phil Zimmerman creates PGP, or Pretty Good Privacy, a software program the was available for free over the internet. This was the first time strong encryption was made easily available to the mass public. | http://aristotle.tamu.edu/Images/pgp.gif | People, Technology | TSH | ||||||||||||||
65 | HIll cipher is published | 1929 | Lester Hill publishes his article "Cryptography in an Algebraic Alphabet" in which he descibes a method for a cipher that is later named the Hill cipher. The Hill cipher uses linear algebra to encode messages. | http://w10.middlebury.edu/INTD1065A/Lectures%20%20folder/Hill%20Cipher%20Folder/HILL_files/image003.png | People, Ciphers | DPC | ||||||||||||||
66 | "The Codebreakers" is published | 1964 | David Kahn's book, "The Codebreakers" is published. | http://www.ebookchm.com/screen/it-ebooks/0684831309.01._SCLZZZZZZZ_.jpg | People | DPC | ||||||||||||||
67 | NSA founded | 1951 | The United State's National Security Agency is founded | http://www.monomachines.com/blog/wp-content/uploads/2010/01/nsa_seal.jpeg | Military | DPC | ||||||||||||||
68 | Voynich Manuscript Written | 1404 | 1438 | A mysterious book of about 240 pages containing illustrations and some sort of coded writing continues to baffle cryptographers. The manuscript is named after Wilfrid Voynich, a Polish book dealer who owned it at the beginning of the twentieth century. It is currently owned by Yale and is in one of the libraries there. The listed dates are estimates based on carbon dating, though the actual date the book was written, like the contents of the book, is unknown. | http://upload.wikimedia.org/wikipedia/commons/5/5e/Voynich_Manuscript_%28170%29.jpg | Unsolved | STM | |||||||||||||
69 | Polygraphiae Written | 1518 | Written by Johannes Trithemius, "Polygraphiae" is the first printed book about cryptography. It is also the book in which the "Tabua Recta," or Vigenere square, was first introduced. | http://upload.wikimedia.org/wikipedia/commons/2/26/Polygraphiae.jpg | Ciphers | STM | ||||||||||||||
70 | Data Encryption System (DES) | 1975 | 1999 | "The Data Encryption Standard (DES) is a block cipher that uses shared secret encryption. It was selected by the National Bureau of Standards as an official Federal Information Processing Standard (FIPS) for the United States in 1976 and which has subsequently enjoyed widespread use internationally. It is based on a symmetric-key algorithm that uses a 56-bit key. The algorithm was initially controversial with classified design elements, a relatively short key length, and suspicions about a National Security Agency (NSA) backdoor. DES consequently came under intense academic scrutiny which motivated the modern understanding of block ciphers and their cryptanalysis" (Wikipedia: DES). | http://www.smartcardbasics.com/smart_card_images/panel7_3des.gif | Ciphers | AFT | |||||||||||||
71 | Morriss confides the secret of the Beale ciphers | 1862 | At the end of his life, Morriss (whom Beale left his ciphers with) tells his confidant Ward about the ciphers. Ward in turn deciphers one of the papers using the Declaration of Independence as a key. | http://www.storyworkz.com/BlogImages/9.gif | People, unsolved | E.B. | ||||||||||||||
72 | Thackeray uses a Cardano grille in The History of Henry Osmond | 1852 | The Cardano grille technique, where a stiff paper or card is placed over text to reveal a message, is introduced to the public in William Makepeace Thackeray's novel. This form of stenography was used as recently as World War II. | People | E.B. | |||||||||||||||
73 | Atbash Cipher | 0500 | The Atbash cipher is a simple substitution cipher where the first letter of the alphabet is replaced with the last, the second letter with the second to last, and so on. It is obviously weak and susceptible to frequency analysis. | http://techpiece.files.wordpress.com/2009/07/atbash.png%3Fw%3D235%26h%3D264 | Ciphers | AFT | ||||||||||||||
74 | House of Commons releases a report on the Deciphering Branch | 1742 | As early as 1735 parliment members began complaining that their mail appeared to have been opened or tampered with. It was only after this report was released that the members learned that their own deciphering branch had been opening and reading their mail. | Others | E.B. | |||||||||||||||
75 | Stuart Mitchell cracks the code of the ceiling of the Rosslyn chapel. | 2005 | Mitchell, a Scottish composer, cracked a series of codes hidden in 213 cubes on the ceiling of the Rosslyn chapel. Twenty years after he began trying to break the code, he discovered that it is a piece of music written for 13 instruments from the medieval era. It is thought to have a specific significance for the chapel's builders. | http://www.traveladventures.org/continents/europe/images/rosslyn-chapel12.jpg | Culture | E.B. | ||||||||||||||
76 | Polybius Square Cipher | -0120 | "In the Polybius square, the letters of the alphabet were arranged left to right, top to bottom in a 5 x 5 square, (when used with the modern 26 letter alphabet, the letters "I" and "J" are combined). Five numbers were then aligned on the outside top of the square, and five numbers on the left side of the square vertically. Usually these numbers were arranged 1 through 5. By cross-referencing the two numbers along the grid of the square, a letter could be deduced. In The Histories, he specifies how this cypher could be used in fire signals, where long-range messages could be sent by means of torches raised and lowered to signify the column and row of each letter. This was a great leap forward from previous fire signaling, which could send pre-arranged codes only (such as, 'if we light the fire, it means that the enemy has arrived')." (Wikipedia: Polybius) | http://upload.wikimedia.org/wikipedia/commons/d/da/AGMA_Hérodote.jpg | Ciphers | AFT | ||||||||||||||
77 | Dora Bella Cipher is Written | 1897 | In a letter to Dora Penny, Edward Elgar encrypted a message that to this day has proven to be unbreakable. | http://www.ciphermysteries.com/wp-content/uploads/2009/02/dorabella-cipher-image.gif | Ciphers | JFH | ||||||||||||||
78 | Auguste Kerchoff is published in le Journal des Sciences Militaires | 1883 | Kerchoffe's article entitled La Cryptographie Militaire includes the famous Kerchoff's Principle, which states "The design of a system should not require secrecy and compromise of the system should not inconvenience the correspondents" (Wikipedia). | http://upload.wikimedia.org/wikipedia/commons/6/68/Kerkhoffs.jpg | People | AFT | ||||||||||||||
79 | SIGABA | 1937 | "SIGABA was similar to the Enigma in basic theory, in that it used a series of rotors to encipher every character of the plaintext into a different character of ciphertext. Unlike Enigma's three rotors however, the SIGABA included fifteen, and did not use a reflecting rotor. On the downside, the SIGABA was also large, heavy, expensive, difficult to operate, mechanically complex and fragile. It was nowhere near as practical a device as the Enigma, which was smaller and lighter than the radios it was used with." (Wikipedia: SIGABA) | http://en.wikipedia.org/wiki/File:SIGABA-patent.png | Ciphers | AFT | ||||||||||||||
80 | Philips of Marnix, Lord of Saint-Aldegonde | 1540 | 1598 | St. Aldegonde is considered to be the first Dutch cryptographer. For Stadholder William the Silent, he deciphered secret messages that were intercepted from the Spaniards. | http://upload.wikimedia.org/wikipedia/commons/c/c2/Marnix_van_st._aldegonde.gif | People | AFT | |||||||||||||
81 | Zodiac Ciphers | 1969 | The Zodiac killer, who was never caught, sent multiple ciphers to several San Francisco newspapers, which were supposed to reveal information about the murders he had committed. He demanded that they be published so that the public could crack them. Some remain unbroken to this day. | http://upload.wikimedia.org/wikisource/en/7/74/Zod-Vallejo.jpg | ciphers | TRS | ||||||||||||||
82 | Johannes Trithemius | 1462 | 1516 | "Trithemius' most famous work is Steganographia (written c.1499. This book is in three volumes, and appears to be about magic - specifically, about using spirits to communicate over long distances. Since the publication of the decryption key to the first two volumes in 1606, they have been known to be actually concerned with cryptography and steganography. Until recently, the third volume was widely still believed to be about magic, but the "magical" formulae have now been shown to be covertexts for yet more cryptography content.[3] The work has lent its name to the modern field of steganography." (Wikipedia: Johannes Trithemius) | http://upload.wikimedia.org/wikipedia/commons/6/69/Trithemiusmoredetail.jpg | People | AFT | |||||||||||||
83 | Claude Elwood Shannon | 1916 | 2001 | Claude Shannon, known as the father of Information Theory, made many significant contributions to science and cryptography including the Information Theory, the Sampling Theory, and the Communication Theory. Shannon also worked with section D-2 of the National Defense Research Committee during World War II. (Wikipedia: Claude Shannon) | http://upload.wikimedia.org/wikipedia/en/2/2f/Claude_Elwood_Shannon_%281916-2001%29.jpg | People | AFT | |||||||||||||
84 | Serpent | 1998 | "Serpent is a symmetric key block cipher which was a finalist in the Advanced Encryption Standard (AES) contest, where it came second to Rijndael. Serpent was designed by Ross Anderson, Eli Biham, and Lars Knudsen. Serpent has a block size of 128 bits and supports a key size of 128, 192 or 256 bits[2]. The cipher is a 32-round substitution-permutation network operating on a block of four 32-bit words. Each round applies one of eight 4-bit to 4-bit S-boxes 32 times in parallel. Serpent was designed so that all operations can be executed in parallel, using 32 1-bit slices. This maximizes parallelism, but also allows use of the extensive cryptanalysis work performed on DES. The Serpent cipher has not been patented. It is completely in the public domain and can be freely used by anyone." (WIkipedia: Serpent (cipher)) | http://upload.wikimedia.org/wikipedia/commons/d/de/Serpent-linearfunction.svg | Ciphers | AFT | ||||||||||||||
85 | Bellaso's Cipher | 1553 | Giovan Bellaso offered encrypted passages and this message to challenge cryptanalysts: "The seven appended messages have been accurately compiled according to the concepts taught. They contain some beautiful things that are interesting to know. This will give the skilled and ingenious cryptographers the opportunity to strive to solve them, especially those who assert being capable to solve all kinds of ciphers. If this is true, as many believe, it will not be difficult for them to solve these cryptograms knowing all the rules by which they have been compiled, considering that the different ciphering methods are practically numberless." Bellaso said that he would reveal the contents of the message a year after it was published, however he did not follow up on his word, leaving the cipher still unbroken. (http://www.ciphermysteries.com/bellasos-ciphers) | Unsolved | AFT | |||||||||||||||
86 | D’agapeyeff Cipher | 1939 | The D’Agapeyeff cipher is an as-yet unbroken cipher that appears in the first edition of Codes and Ciphers, an elementary book on cryptography published by the Russian-born English cartographer Alexander D’Agapeyeff in 1939. "Offered as a “challenge cipher” at the end of the book, it was not included in later editions, and D’Agapeyeff is said to have admitted later to having forgotten how he had encrypted it. It has been argued that the failure of all attempts at decryption is due to D’Agapeyeff incorrectly encrypting the original text. However, it has been argued that the cipher may still be successfully attacked using computational methods such as genetic algorithms" (http://www.dailycognition.com/index.php/2009/02/15/top-10-uncracked-codes.html) | Unsolved | AFT | |||||||||||||||
87 | Shugborough Hall Enscription | 1750 | "The Shepherd’s Monument at Shugborough Hall carries a relief (pictured above) that shows a woman watching three shepherds pointing to a tomb. On the tomb is depicted the Latin text “Et in arcadia ego” (”I am also in Arcadia” or “I am even in Arcadia”). The relief is based on a painting by the French artist Nicholas Poussin, known itself as Et in Arcadia ego, but the relief has a number of modifications — most noticeably that it is reversed horizontally. Another difference is a change in which letter of the tomb a shepherd is pointing at. In the painting the letter R in ARCADIA is being pointed to. The finger in the sculpture is broken, but was pointing to the N in IN. The sculpture also adds an extra sarcophagus to the scene, placed on top of the one with the Latin phrase. Below the image of the monument are the following letters: D O.U.O.S.V.A.V.V. M. For adherents of the modern Grail-conspiracy legend, the inscription is alleged to hold a clue to the location of the Holy Grail. Following the claims in the book The Holy Blood and the Holy Grail that Poussin was a member of the Priory of Sion and that the painting contains a message about the location of the grail, it has been speculated that the inscription may encode secrets related to the Priory" ( | http://3.bp.blogspot.com/_opptvFBa4ck/SU47NM1OckI/AAAAAAAAJGA/G21adGplmdQ/s400/10-Most-Famous-Uncracked-Codes-004.jpg | Unsolved | AFT | ||||||||||||||
88 | Chinese Gold Bar Cipher | 1933 | "In 1933, seven gold bars were allegedly issued to a General Wang in Shanghai, China. These gold bars appear to represent metal certificates related to a bank deposit with a U.S. Bank. The gold bars themselves have pictures, Chinese writing, some form of script writing, and cryptograms in latin letters. Not surprisingly, there is a dispute concerning the validity of the claim for the deposit. It may help to resolve the dispute if someone can decipher the cryptograms on the bars. Nobody has yet put for the a theory as to their meaning. The Chinese writing has been translated, and discusses a transaction in excess of $300,000,000. It also refers to these gold bars which weigh a total of 1.8 kilograms" (http://www.dailycognition.com/index.php/2009/02/15/top-10-uncracked-codes.html). | http://4.bp.blogspot.com/_opptvFBa4ck/SU47FAMDxMI/AAAAAAAAJF4/4SENmrqT79U/s400/10-Most-Famous-Uncracked-Codes-005.jpg | Unsolved | AFT | ||||||||||||||
89 | The Phaistos Disk | -1700 | "The disc of Phaistos is the most important example of hieroglyphic inscription from Crete and was discovered in 1903 in a small room near the depositories of the “archive chamber”, in the north - east apartments of the palace, together with a Linear A tablet and pottery dated to the beginning of the Neo-palatial period (1700- 1600 B.C.). Both surfaces of this clay disc are covered with hieroglyphs arranged in a spiral zone, impressed on the clay when it was damp. The signs make up groups divided from each other by vertical lines, and each of these groups should represent a word. Forty five different types of signs have been distinguished, of which a few can be identified with the hieroglyphs in use in the Proto- palatial period. Some hieroglyphic sequences recur like refrains, suggesting a religious hymn, and Pernier regards the content of the text as ritual. Others have suggested that the text is a list of soldiers, and lately it has suggested to be a document in the Hittic language in which a king discusses the erection of the Palace of Phaistos" (http://www.dailycognition.com/index.php/2009/02/15/top-10-uncracked-codes.html) | http://listverse.files.wordpress.com/2010/03/top-10-uncracked-codes.jpg | Unsolved | AFT | ||||||||||||||
90 | Quantum Cryptography first invented | 1968 | Stephen Wiesner, a grad student at Columbia University, comes up with the idea for quantum encryption for "quantum money" which would make forgery impossible. He understood that tampering with encryption (i.e. trying to intercept a message) would render it indecipherable. However, his idea was too far ahead of his time, and quantum money was much too costly to gain any popularity at the time. | http://www.technologyreview.com/blog/arxiv/files/35966/Quantum%20Money.jpg | People, Ciphers | TSH | ||||||||||||||
91 | Rejewski and colleagues broke the Enigma using bombes | 1930 | 1938 | Through mathematics, ingenuity, and the help of Hans-Thilo Schmidt, Rejewski and the other Polish cryptanalysts were able to break the German enigma for most of the 1930's, until they handed off their achievements to British cryptanalysts on July 24, 1939. | http://www.matematiksider.dk/enigma/marian_rejewski.jpg | People, Ciphers | TSH | |||||||||||||
92 | Diffie-Hellman-Merkle key exchange scheme revealed to the public | 1976 | The trio of Whitfield Diffie, Martin Hellman, and Ralph Merkle, demonstrate the first public key cryptographic system at the National Computer Conference, and filed for a patent the following year. The exchange scheme was a major step forward in cryptography, however was not perfect, due to its inconvenience. | http://www.livinginternet.com/g/diffie_hellman_merkle.jpg | People, Ciphers | TSH | ||||||||||||||
93 | Anson Stager develops Cipher for Union Army | 1861 | Stager's cipher replaced certain words with codewords; once the replacement was complete, the telegraph operator used a "route" or predetermined word that was placed at the beginning of the message to rearrange the other words in a set way. The recipient then undid the rearrangement and replaced coded words with their plaintext counterparts according to his copy of the codebook. | http://upload.wikimedia.org/wikipedia/en/7/70/General-Anson-Stager.jpg | Military | STM | ||||||||||||||
94 | Traité Élémentaire de Cryptographie written by Delastelle | 1901 | Delastelle invented the Bifid, Trifid and Four-Square Ciphers and came up with a version of the Playfair Cipher independent of its original creation. The three ciphers he invented all use grids as their basis. | no picture available | People | STM | ||||||||||||||
95 | Phil Zimmerman becomes the subject of grand jury investigation. | 1993 | 1996 | The FBI accuses Zimmerman of "exporting munitions" to hostile foreign countries by allowing the distribution of PGP. The case is dropped in 1996. | http://regmedia.co.uk/2006/11/21/phil_zimmerman.jpg | People | MHG | |||||||||||||
96 | RSA algorithm released into public domain | 2000 | Nearly 17 years after the ground-breaking public key algorithm had been patented, it is finally released into the public domain on September 6th, 2000. | http://www.codeproject.com/KB/security/EZRSA/rsa.gif | Ciphers | MHG | ||||||||||||||
97 | Clue to Kryptos is published by creator | 2010-11-21 | Jim Sanborn, frustrated with the delay of the cracking of the fourth part of his cipher, Kryptos, released a six-character clue, the word Berlin, which sent Kryptos-obsessed cryptanalysts into a frenzy. | http://www.nytimes.com/2010/11/21/us/21code.html?_r=1&scp=1&sq=kryptos&st=cse | Ciphers | CSH | ||||||||||||||
98 | Sherlock Holmes movie comes out | 2009-12-25 | Robert Downey Jr. as Sherlock Holmes in a modern rendition of the classic mysteries | http://www.imdb.com/title/tt0988045/ | Culture | CSH | ||||||||||||||
99 | Sherlock Holmes character appears in Arthur Conan Doyle's books | 1887 | Holmes was featured in 4 novels and 56 short stories. He has become a well known figure associated with detective work. | http://en.wikipedia.org/wiki/Sherlock_Holmes | Culture | CSH | ||||||||||||||
100 | GNU Privacy Guard software published | 2010-07-19 | A free software alternative to PGP encryption, which has received funding from the German government. |