History of Encryption: Roots of Modern-Day Cybersecurity (2024)

The need to hide messages and their meaning from prying eyes (that is, encrypting them) probably surfaced not long after humankind invented writing. The timeline of the history of encryption is long. Encryption can be traced back to its religious use in ancient Egypt, and Greek and Roman military culture, to the World Wars and the creation of the first computer, to finally arrive at its modern use in the era of the World Wide Web.

Today, encryption is used in everyday modern life, and in most cases, users are unaware of it. Encryption is used mostly to handle transactions over insecure channels of communication, such as the internet. Let’s take a look at the history of encryption algorithms in order to understand their significance over time.

A brief history of cryptography

Cryptography is the science or study of techniques of secret writing and hiding messages in any medium. Encryption is only one component of cryptography, in which an original plaintext or data is transformed into a ciphertext that prevents malicious third parties from understanding its content.

The increasing value of knowledge, and in modern times, data, has spurred the evolution of cryptography. The oldest known cryptography preserved religious or commercial knowledge and was then influenced by the need for secure military communication. The next drastic changes came when secure commercial and private communication became a general necessity. Since the 1980s, computers and the internet have increasingly come to dominate our lives. Thus, in the Information Age, all communication is best encrypted, regardless of it being between humans, machines, or humans and machines.

When was encryption invented, and by whom?

The earliest written evidence of encryption can be traced to ancient Egypt. Nearly 4,000 years ago, the tomb of nobleman Khnumhotep II contained a script recording his deeds in life. However, some unusual hieroglyphs were used that obscured the original meaning of the text. Ancient encryption in Egypt was used mainly to protect knowledge, as education was a privilege limited to the highest circles of society and was also a way to show one’s skills in writing. It was also used for religious reasons, for example, to discuss taboos.

The first recorded instance of encryption being used for military purposes dates to around 500 BC. Spartan encryption used an invention called the scytale, which allowed secret messages to be sent and received. A narrow strip of parchment was wound around the device, and the text was written along the length of the device. Once the strip was wound off the cylinder, the text became unreadable unless the reader possessed an identical cylinder. This was the first time the concept of a common key, seen even today in modern cryptographic technologies, was used for both encryption and decryption.

What was the first type of encryption?

The first encryption was the substitution cipher which used a very simple method of replacing units (letters or groups of letters) with other units based on a set of substitution rules, e.g., A=N, B=O, etc. Before computers, the security of encryption was ensured by keeping cipher keys with the sender and receiver. Thus, even if the messenger was captured, the content of the message remained undecipherable.

Roman encryption

Julius Caesar’s legions used the above technique to much success. The Caesar Cipher used the normal sequence of the alphabet but shifted letters to a fixed number of letters further down the alphabet (If A becomes E, then B becomes F). Although such shift ciphers are considered some of the simplest forms of encryption today, the Caesar Cipher was only cracked around 800 AD. The Arab mathematician Al-Kindi looked at the frequency of letters in the encrypted message to determine the shifting rule. The shortest words that frequently appear in a text also help break such codes: e.g., and, the, as, so.

World War 2 encryption

Before and during WW2, encryption changed dramatically as machine and electromechanical encryption and decryption were born. The process contributed to the invention of modern computers. Arthur Scherbius invented the rotor and gear-based Enigma machine. In the early years of the war, the Germans could pass orders and information in total secrecy as a result. Cracking the code would have required trying around 17,000 different combinations within 24 hours.

Breaking Enigma was a necessity to the allied war effort, which led to the institutionalization of cryptography as a science and also inspired Alan Turing to develop and use the first machine capable of using computing power to break encryption.

When did data encryption become popular?

Through the early 1970s, cryptology was dominated by governments both because computers were very expensive and because of the need for information retention.

Several factors pushed encryption towards the mainstream. The most important of these was the invention of the World Wide Web in 1989 and the widespread use of computers. Both industrial-commercial and personal communication had to be protected. For example, financial services were some of the first to require secure electronic transactions. Other businesses wanted to secure their digitally stored trade secrets. Finally, individuals wanted to rest assured that their online communication was secure. Today virtually all digital communication is, or should be, encrypted.

RSA encryption history

In modern cryptography, the security of encryption depends not on the encryption method (or algorithm) but the secrecy of the keys used for encryption and decryption.

The brilliance of the RSA algorithm (named after its inventors Ron Rivest, Adi Shamir, and Leonard Adleman) lies in the use of asymmetric cryptography to generate a public and a private key pair both based on a large prime numbers algorithm. To better understand how symmetric keys work, remember the scytale used by the Spartans. The message was encrypted with the use of a certain length and shaped cylinder, and both sender and receiver had to have the same type of cylinder for both encryption and decryption. The problem begins when the key is compromised, meaning the contents of the message can be read. This was less of a risk with physical tools but much easier in the digital world, allowing both sender and receiver to be exploited.

RSA introduced the concept of a public-private key pair for encryption. The public key is used to encrypt data, which can then only be decrypted with the corresponding private key. Although the two keys are mathematically related, calculating the private key from the public is extremely complex and time-consuming, thanks to a mathematical problem called prime factorization. The RSA algorithm also laid down the foundations for modern authentication methods as the use of a private-public key pair was perfect for identifying if the sender is who he says he is and also ensured better safety in messaging.

Encryption today

Modern encryption is a part of our everyday lives, and it happens every second without most people being aware of it. But why is encryption used so often today?

Simply put, it’s no longer only humans that communicate. Every time a computer connects to the internet, you visit a webpage (HTTPS), use a messaging or e-mail application on your phone, computers, devices, and software are communicating with each other via the internet, Bluetooth, WiFi.

The problem is that computers are also very good at deciphering encryption because of the sheer volume of mathematical operations they can complete in a second. As a result, securing the internet with modern cryptography is complex. The encryptions methods must be sophisticated and also fast enough to secure channels in which data transfer occurs. New types of encryption are based on complex mathematical problems/algorithms and implement a combination of symmetrical and asymmetrical key encryption schemes to secure communication.

Symmetrical key generation uses either stream cipher or block cipher. RC4 is the most widely used stream cipher in which a stream of random numbers is combined with the original message. The technique is used in Secure Socket Layer (SSL) and Wired Equivalent Privacy (WEP)

Current encryption standards adopted by governments and the US National Security Agency are generally based on the AES block cipher, which encrypts a fixed-length group of bits: i.e., it takes a 128-bit block plaintext and outputs a ciphertext of the same size. Other popular block ciphers are Blowfish, Twofish, DES.

Secure authentication (identifying a user and their eligibility for access) and digital certification is also established by using encryption and using private, public, and session keys. Hypertext Transfer Protocol Secure (HTTPS) is a secure extension of the HTTP protocol. In this case, the communication protocol used on the internet to access a website is encrypted using the Transport Layer Security (TLS) protocol, which prevents eavesdropping, tampering, especially man-in-the-middle attacks.

Data and metadata are now the single most valuable assets in the world. With the widespread use of cloud services, especially public clouds accessible through the internet, securing valuable data has become an ever-increasing priority for everyone.

What is the best encryption technology today?

For data at rest, AES 256 Bit (14 round CBC) is considered the best and is unbroken to this day. It uses the Rijndael block cipher with a symmetric-key algorithm.

For data in transit, e.g., secure websites, TLS 1.2 RSA is considered best. RSA claims that 2048-bit keys will be sufficient until 2030, and beyond 2030, 3072 bits should be used to ensure continuous security. NIST key management guidelines further suggest that 15360-bit RSA keys are equivalent in strength to 256-bit symmetric keys. This means that the strength of encryption now mainly depends on the length of the key being used. Tresorit uses 4096-bit RSA keys.

The future of encryption and cybersecurity

It is now clear that cloud computing is the way forward for nearly all users, including enterprises. Nevertheless, the question of how data security, privacy, and integrity can be reinforced remains. Companies increasingly understand the importance of confidentiality (see GDPR, ePrivacy Regulations) and demand transparency, alongside proper security controls from cloud providers. The future of encryption and decryption will have to address how data is handled by cloud services and their customers.

One threat to the future of cybersecurity is the advancement of quantum computing, as the technology’s superior capacity to factor large numbers would pose a serious threat to encryption algorithms (see RSA based on large prime numbers). Quantum-safe cryptography methods are in development. For example, Lattice cryptography would ensure that data is hidden by embedding it inside complex math problems (or algebraic structures) called lattices.

The inherent nature of cloud computing services is another common problem, as they can leave valuable company data exposed during computation and processing. Fully hom*omorphic Encryption (FHE) would allow data to remain encrypted during computation in any type of cloud infrastructure that processes it, thus providing a safer use of hybrid cloud solutions without sacrificing security. As an extension of public-key cryptography, hom*omorphic refers to hom*omorphism in algebra, a structure-preserving mapping from one mathematical structure to another one of the same type. The encryption and decryption functions in this method mean that only a map is created between plaintext and ciphertext spaces without using actual decryption.

The third most important player in the future of encryption will be machine learning or Artificial Intelligence. AI functionalities can perform analyses on vast amounts of data, see complex patterns, and can thus be used to uncover flaws or vulnerabilities in newly developed cryptographic systems. Testing cryptographic systems before they become the new standard is necessary to get ahead of hackers who could utilize the same technology to find vulnerabilities.

Encryption at Tresorit

At Tresorit, we believe in your right to keep your digital valuables safe. All files stored in Tresorit are protected by our zero-knowledge client-side end-to-end encryption. Let’s break that down a bit. Zero-knowledge means that Tresorit knows nothing about what’s in your files or what you change in them. Furthermore, through zero-knowledge authentication, Tresorit will never have access to your password either, as all authentication happens without it leaving your device. This is part of our client-side encryption, which means that no data ever leaves your device in unencrypted form. Finally, end-to-end means that files remain encrypted throughout their lifecycle. As you hold the keys, no one can open them unless you share them.

On the more technical side, Tresorit uses a symmetric key encryption algorithm, more specifically AES-256, in OpenPGP CFB mode described in RFC4880 to encrypt all uploaded files and folders. Every file has a unique, independent, and freshly generated 256-bit encryption key. Each version of a file has a random 128-bit IV. As a result, its encrypted form changes completely, even if only one bit is changed in the file. In practice, this ensures that neither Tresorit nor others have any information about the changes made. Folders are encrypted the same way, and the integrity of all ciphertexts is protected with HMAC-SHA-512.

To learn more about our encryption and authentication technologies, read our Encryption whitepaper or visit our Security page for an overview.

History of Encryption: Roots of Modern-Day Cybersecurity (2024)

FAQs

History of Encryption: Roots of Modern-Day Cybersecurity? ›

When was encryption invented, and by whom? The earliest written evidence of encryption can be traced to ancient Egypt. Nearly 4,000 years ago, the tomb of nobleman Khnumhotep II contained a script recording his deeds in life. However, some unusual hieroglyphs were used that obscured the original meaning of the text.

What is the history of encryption? ›

The first known evidence of the use of cryptography (in some form) was found in an inscription carved around 1900 BC, in the main chamber of the tomb of the nobleman Khnumhotep II, in Egypt. The scribe used some unusual hieroglyphic symbols here and there in place of more ordinary ones.

What is modern day encryption? ›

Encryption is used to protect data from being stolen, changed, or compromised and works by scrambling data into a secret code that can only be unlocked with a unique digital key.

When was data encryption standard invented? ›

Data Encryption Standard
The Feistel function (F function) of DES
General
DesignersIBM
First published1975 (Federal Register) (standardized in January 1977)
Derived fromLucifer
8 more rows

What was the earliest reason for the use of cryptography? ›

The first recorded use of cryptography for correspondence was by the Spartans, who as early as 400 bc employed a cipher device called the scytale for secret communication between military commanders.

Who created the first encryption? ›

Perhaps the earliest cryptosystem was developed by the Greek historian Polybios. He used a grid of letters where each letter of the message was replaced by the two letters indicating the row and column in which the original letter lies. Here is a Polybios square with the English alphabet excluding the letter J.

Who is the father of encryption? ›

1467: Considered the father of modern cryptography, Leon Battista Alberti's work most clearly explored the use of ciphers incorporating multiple alphabets, known as polyphonic cryptosystems, as the middle age's strongest form of encryption.

What are the three 3 types of modern encryption? ›

There are different types of encryption techniques, but the following three are the most common and widely used: Symmetric Encryption, Asymmetric Encryption, and Hashing.

What is the most modern encryption? ›

AES (Advanced Encryption Standard): AES is a widely-used symmetric encryption algorithm that is considered to be very secure. It is used by governments, financial institutions, and other organizations to protect sensitive data. RSA: RSA is an asymm.

What is the difference between traditional and modern cryptography? ›

Classical cryptography was mostly about secret communication. With modern cryptography the scope has expanded. It now deals with digital signatures, digital cash, secure voting… computations.

What was the world's first encryption technology? ›

What was the first type of encryption? The first encryption was the substitution cipher which used a very simple method of replacing units (letters or groups of letters) with other units based on a set of substitution rules, e.g., A=N, B=O, etc.

What is the original data created before encryption called? ›

The original data is known as the plaintext, and the data after the key encrypts it is known as the ciphertext. The formula: plaintext. + key. = ciphertext.

What is the history of AES encryption? ›

The Rise of AES Encryption

It was created by two Belgian cryptographers, Vincent Rijmen and Joan Daemen. The National Institute of Standards and Technology (NIST) organized a competition to find a more secure encryption standard to carry us into the future, and in 2001, AES emerged as the victor.

What is the first known evidence of cryptography can be traced back to? ›

The first known evidence of cryptography can be traced to the use of 'hieroglyph' - a character of the ancient Egyptian writing system. Modern Cryptography - is used to provide secrecy and integrity to our data by mathematical equations.

Where does our computer cryptography have its origins? ›

The roots of cryptography are found in Roman and Egyptian civilizations.

How is hashing different from encryption? ›

Encryption is a two-way function where information is scrambled in such a way that it can be unscrambled later. Hashing is a one-way function where data is mapped to a fixed-length value. Hashing is primarily used for authentication.

What is ancient encryption? ›

Ancient cryptography

However, this wasn't necessarily a secret code. Rather, they changed the form of writing to make it appear more dignified. In 1500 BC, a Mesopotamian scribe used cryptography to conceal a formula for pottery glaze. This example is the first known use of cryptography to hide secret information.

What is the greatest encryption device in history? ›

The Enigma machine is one of the most famous encryption devices in history. It was used by the Germans during World War II to transmit coded messages about their plans between units. This machine offered billions of ways to encode a message, which made it difficult to break the code during the war.

What is the original message before encryption? ›

The main difference between plaintext and ciphertext is that plaintext is the original, unencrypted message, while ciphertext is the encrypted version of that message. The purpose of encryption is to transform plaintext into ciphertext to make it unreadable to anyone who does not have the correct key.

What is the history of identity based encryption? ›

History. The concept of identity-based encryption was first introduced by Shamir in 1984 [12]. His original motivation was to eliminate the need for directories and certificates by using the identity of the receiver as the public key.

Top Articles
Latest Posts
Article information

Author: Twana Towne Ret

Last Updated:

Views: 5771

Rating: 4.3 / 5 (44 voted)

Reviews: 83% of readers found this page helpful

Author information

Name: Twana Towne Ret

Birthday: 1994-03-19

Address: Apt. 990 97439 Corwin Motorway, Port Eliseoburgh, NM 99144-2618

Phone: +5958753152963

Job: National Specialist

Hobby: Kayaking, Photography, Skydiving, Embroidery, Leather crafting, Orienteering, Cooking

Introduction: My name is Twana Towne Ret, I am a famous, talented, joyous, perfect, powerful, inquisitive, lovely person who loves writing and wants to share my knowledge and understanding with you.