Cryptography is the science of secure communication in the presence of adversaries. It involves creating and analyzing protocols to protect private messages from unauthorized access. This field draws upon mathematics, computer science, information security, and other disciplines. Its applications are vast, including e-commerce, digital payments, computer security, and military communications.
Around 1900 BCE, the earliest known use of cryptography was discovered as carved ciphertext on a stone in Egypt. The purpose of this ciphertext is unclear, as it may have been for amusement rather than concealing information.
Around 1900, Bazeries independently reinvented Thomas Jefferson's wheel cipher, a device for encryption and decryption. This cipher was not publicly known at the time of Bazeries's reinvention.
Around 1970, James H. Ellis conceived the principles of asymmetric key cryptography, a groundbreaking concept in the field.
Clifford Cocks invented a solution conceptually similar to RSA in 1973, demonstrating an early understanding of what would become a cornerstone of public-key cryptography.
In 1974, Malcolm J. Williamson is credited with developing the Diffie-Hellman key exchange, showcasing independent discovery of this critical cryptographic concept.
Until June 1976, symmetric-key cryptography, where both the sender and receiver use the same key, was the only publicly known encryption method.
Whitfield Diffie and Martin Hellman published the Diffie-Hellman key exchange algorithm in 1976, marking a significant advancement in the field of cryptography.
Whitfield Diffie and Martin Hellman revolutionized cryptography in 1976 with their proposal of public-key cryptography, a system utilizing two mathematically related keys - a public key and a private key, marking a significant advancement since polyalphabetic substitution.
In 1977, the RSA algorithm, a significant development in cryptography, was published in Martin Gardner's Scientific American column.
Ronald Rivest, Adi Shamir, and Len Adleman successfully ended the search for a practical public-key encryption system in 1978 with their solution, now known as the RSA algorithm.
The source code for Pretty Good Privacy (PGP), an encryption program developed by Philip Zimmermann, was published on the internet in June 1991, prompting a legal battle over cryptography export regulations in the US.
The Clipper chip, an encryption microchip intended for government surveillance, was introduced in 1993, sparking controversy over its potential for abuse and weakening of cryptographic security.
In 1995, Daniel J. Bernstein initiated a lawsuit against the US government, challenging the restrictions on cryptographic algorithms as an infringement on free speech rights.
The Wassenaar Arrangement, an international agreement regulating the export of arms and dual-use technologies including cryptography, was signed by 39 countries in 1996.
A 1997 publication by the British intelligence organization GCHQ revealed that their cryptographers had foreseen several academic advancements in the field.
President Bill Clinton signed the DMCA in 1998, criminalizing the production and distribution of technologies designed to circumvent digital rights management (DRM) schemes, impacting cryptography research.
The Skipjack encryption algorithm, used in the controversial Clipper chip, was declassified in 1998, years after the Clipper initiative lost momentum.
A 1999 ruling in the Bernstein v. United States case affirmed that publishing source code for cryptographic algorithms is protected under the First Amendment right to free speech.
France significantly eased its restrictions on the domestic use of cryptography in 1999, marking a shift in its stance on cryptographic technology.
In 2000, the United States significantly relaxed its export controls on cryptography, making it easier to export software with strong encryption capabilities.
In India, the Kamasutra, written approximately 2000 years ago, discusses two types of ciphers: Kautiliyam and Mulavediya. Kautiliyam uses phonetic relations for letter substitution, while Mulavediya pairs letters and utilizes reciprocals.
The release of encryption keys for Blu-ray and HD DVD content on the internet in 2007 led to widespread DMCA takedown notices, igniting debates about fair use and free speech in the digital age.
The UK's Regulation of Investigatory Powers Act, which allows law enforcement to compel individuals to reveal encryption keys, led to its first successful prosecution in 2009, resulting in a prison sentence and highlighting the legal challenges to encryption privacy.
By 2011, the SHA-2 family, while an improvement over SHA-1, was found to be vulnerable to clashes, prompting the US standards authority to call for a new standard, SHA-3, to enhance security and robustness.
In 2011, cryptanalysts identified vulnerabilities in the SHA-2 hash function family, leading to the need for a more robust cryptographic hash standard.
On October 2, 2012, the US National Institute of Standards and Technology (NIST) announced Keccak as the winner of the SHA-3 hash function design competition, making it the new US national standard.
The case of United States v. Fricosu in 2012 brought up the issue of whether forcing someone to give up their encryption password violates the Fifth Amendment's protection against self-incrimination. The EFF argued that it did, while the court ultimately ruled that the defendant had to provide an unencrypted hard drive under the All Writs Act.
The FBI–Apple encryption dispute in 2016 centered around whether US courts could force manufacturers to help unlock cell phones with encrypted content, raising major legal and privacy concerns.