Ethical Hacking

History of cryptography


Listen Later

hello everyone my name is vijay kumar devireddy and i am glad to have you back on my episode 04 well we had
discussed about cryptography and how it helps us to protect the information in the internet world in this 
episode we are going to discuss about how it had evolved . for that 
we will jump into the history to know it briefly .
Sending secret messages has been a documented human activity for thousands of years. The earliest example I 
am aware of can be found in the bible, from approximately 2600 years ago. it was named as The AT BASH cipher 
which we call it as substitution ciper now in this Encryption works by substituting each letter in the alphabet 
by another letter.
Caesar’s Cipher
Another substitution cipher from the ancient world is “Caesar’s Cipher”, named after Julius Caesar who used 
it in his private correspondence, about 500 years after ATBASH cipher. To encrypt a message with 
Caesar’s cipher, each letter is replaced by a letter 3 places earlier in the alphabet: “shifting back by 3” 
- so D becomes A, E becomes B, and wrapping around so A becomes X.
For many centuries cryptography was used quite extensively - as a “dark art”, employed by royals, diplomats, 
spies, and the military. It played an important role in many historical events. Probably the most famous in
 modern history is the story of the Enigma cipher used by the Germans in World War 2, and the allied forces’
 success in breaking that cipher.
 
This all changed in the 1970s. By then important and sensitive electronic communication systems emerged in the
 civilian market - most notably “Automatic Teller Machines” (ATMs) allowing cash withdrawals. Motivated by the 
need to protect civilian communications from criminals, the US standards body (which is now called NIST), 
realized that a cipher is needed to protect sensitive (but non-classified) information. 
The result was the design, and public standardization, of the first civilian cipher, called the Data Encryption
 Standard (DES). DES was designed by IBM in the 1970s and became a US federal standard in 1977.
and des was used for 30 years and later found it as vulnerable to protect the sensitive information with the 
modern technologies we will discuss this later
...more
View all episodesView all episodes
Download on the App Store

Ethical HackingBy vijaykumar Devireddy


More shows like Ethical Hacking

View all
Darknet Diaries by Jack Rhysider

Darknet Diaries

7,879 Listeners