Hall I · World Origins · ~1900 BCE - ~1350 CE

World Origins of Cryptography

Where secrecy began across civilizations: Egypt, Hebrew, Greek, Roman, Indian, and Arabic traditions

Before mathematics, before computers, and before modern nation states, people across many regions already needed to hide messages. This hall begins with the surviving Hebrew, Greek, and Roman systems already on display and expands in Round 3 to include Egyptian substitution traditions, Indian Kama Sutra techniques, and Arabic nomenclator practice. The through-line is global: different scripts, different political settings, one recurring problem - how to communicate secretly when interception is expected.

Ancient Egypt Ancient Israel Ancient Greece Ancient Rome Classical India Abbasid Baghdad All Broken
📜

What this hall teaches: Cryptography did not emerge from one civilization. Substitution and fractionation appear in multiple cultural traditions, then converge into the foundations of later military, diplomatic, and modern cryptographic practice.

🧭

Suggested route: Start with Egyptian Substitution and the Rosetta Stone, then move through Histiaeus, Scytale, Atbash, and Caesar. End with Arabic Nomenclators to see how early global traditions converge into the cryptanalysis of al-Kindi.

What This Hall Teaches

Foundational Concepts

🔄Modular Arithmetic

The Caesar cipher wraps around the alphabet using modulo 26. (position + shift) mod 26. This operation is fundamental to modern symmetric encryption including AES.

📍Coordinate Encoding

Polybius's grid converts letters to (row, col) pairs — splitting each letter into two symbols. This "fractionation" concept underlies the Bifid, ADFGVX, and modern bit-slicing techniques.

📊Frequency Analysis (the weakness)

Both ciphers preserve letter frequencies. In English, E appears ~12.7% of the time. Any cipher that maps E to one symbol can be attacked by finding the most common symbol in the ciphertext.