
Sign up to save your podcasts
Or


We use encryption every day - in our bank transfers, on our mobile phones and whenever we buy anything online. Yet what is it and why is it so important? Mike Williams explores cryptography from the Roman Caesar Cipher to modern day computer encryption.
Classified as a munition in the USA until the late 90s, lawyer Cindy Cohn recounts the court case she fought which helped put computer encryption into the public’s hands. Science writer Simon Singh talks us through some the mathematics behind the ciphers and Andrew Clark, a specialist in Information Forensics details the darker side of encryption, through its uses in crime.
Encryption also plays into our obsession with secrets, puzzles and hidden messages. We hear from a fan of the electronic duo, Boards of Canada, who obsessively followed a trail of encrypted clues left by the band in 2013. Finally, encryption lies at the heart of the debate about national security and individual privacy. We hear from an anonymous contributor from Pakistan where the use of encryption is restricted.
(Photo: Encrypted icon of a padlock and its keyhole. Credit: Shutterstock)
By BBC World Service4.6
182182 ratings
We use encryption every day - in our bank transfers, on our mobile phones and whenever we buy anything online. Yet what is it and why is it so important? Mike Williams explores cryptography from the Roman Caesar Cipher to modern day computer encryption.
Classified as a munition in the USA until the late 90s, lawyer Cindy Cohn recounts the court case she fought which helped put computer encryption into the public’s hands. Science writer Simon Singh talks us through some the mathematics behind the ciphers and Andrew Clark, a specialist in Information Forensics details the darker side of encryption, through its uses in crime.
Encryption also plays into our obsession with secrets, puzzles and hidden messages. We hear from a fan of the electronic duo, Boards of Canada, who obsessively followed a trail of encrypted clues left by the band in 2013. Finally, encryption lies at the heart of the debate about national security and individual privacy. We hear from an anonymous contributor from Pakistan where the use of encryption is restricted.
(Photo: Encrypted icon of a padlock and its keyhole. Credit: Shutterstock)

78,393 Listeners

11,019 Listeners

26,225 Listeners

7,585 Listeners

374 Listeners

889 Listeners

1,049 Listeners

5,454 Listeners

1,794 Listeners

1,751 Listeners

1,045 Listeners

2,085 Listeners

601 Listeners

973 Listeners

848 Listeners

4,163 Listeners

3,188 Listeners

715 Listeners

15,271 Listeners

2,308 Listeners

741 Listeners