
Sign up to save your podcasts
Or


We use encryption every day - in our bank transfers, on our mobile phones and whenever we buy anything online. Yet what is it and why is it so important? Mike Williams explores cryptography from the Roman Caesar Cipher to modern day computer encryption.
Classified as a munition in the USA until the late 90s, lawyer Cindy Cohn recounts the court case she fought which helped put computer encryption into the public’s hands. Science writer Simon Singh talks us through some the mathematics behind the ciphers and Andrew Clark, a specialist in Information Forensics details the darker side of encryption, through its uses in crime.
Encryption also plays into our obsession with secrets, puzzles and hidden messages. We hear from a fan of the electronic duo, Boards of Canada, who obsessively followed a trail of encrypted clues left by the band in 2013. Finally, encryption lies at the heart of the debate about national security and individual privacy. We hear from an anonymous contributor from Pakistan where the use of encryption is restricted.
(Photo: Encrypted icon of a padlock and its keyhole. Credit: Shutterstock)
By BBC World Service4.6
182182 ratings
We use encryption every day - in our bank transfers, on our mobile phones and whenever we buy anything online. Yet what is it and why is it so important? Mike Williams explores cryptography from the Roman Caesar Cipher to modern day computer encryption.
Classified as a munition in the USA until the late 90s, lawyer Cindy Cohn recounts the court case she fought which helped put computer encryption into the public’s hands. Science writer Simon Singh talks us through some the mathematics behind the ciphers and Andrew Clark, a specialist in Information Forensics details the darker side of encryption, through its uses in crime.
Encryption also plays into our obsession with secrets, puzzles and hidden messages. We hear from a fan of the electronic duo, Boards of Canada, who obsessively followed a trail of encrypted clues left by the band in 2013. Finally, encryption lies at the heart of the debate about national security and individual privacy. We hear from an anonymous contributor from Pakistan where the use of encryption is restricted.
(Photo: Encrypted icon of a padlock and its keyhole. Credit: Shutterstock)

78,707 Listeners

11,158 Listeners

26,250 Listeners

7,893 Listeners

378 Listeners

857 Listeners

1,072 Listeners

5,577 Listeners

1,807 Listeners

1,749 Listeners

1,028 Listeners

1,958 Listeners

601 Listeners

959 Listeners

839 Listeners

4,171 Listeners

3,230 Listeners

792 Listeners

15,475 Listeners

2,310 Listeners

787 Listeners