World Origins of Cryptography
Where secrecy began across civilizations: Egypt, Hebrew, Greek, Roman, Indian, and Arabic traditions
Before mathematics, before computers, and before modern nation states, people across many regions already needed to hide messages. This hall begins with the surviving Hebrew, Greek, and Roman systems already on display and expands in Round 3 to include Egyptian substitution traditions, Indian Kama Sutra techniques, and Arabic nomenclator practice. The through-line is global: different scripts, different political settings, one recurring problem - how to communicate secretly when interception is expected.
What this hall teaches: Cryptography did not emerge from one civilization. Substitution and fractionation appear in multiple cultural traditions, then converge into the foundations of later military, diplomatic, and modern cryptographic practice.
Suggested route: Start with Egyptian Substitution and the Rosetta Stone, then move through Histiaeus, Scytale, Atbash, and Caesar. End with Arabic Nomenclators to see how early global traditions converge into the cryptanalysis of al-Kindi.
The Khnumhotep II inscription uses unusual glyph variants to obscure ordinary text: the oldest surviving substitution-style concealment.
A trilingual decree that restored the ability to read hieroglyphs and became history's clearest known-plaintext lesson.
The earliest famous steganography story: a revolt order tattooed on a shaved scalp, hidden again by regrown hair.
Spartan generals wrapped leather strips around wooden rods of a specific diameter. Only a rod of the same size could reassemble the message — the earliest known transposition cipher.
READ: HDUEANPTTDMAECREITAK
Julius Caesar shifted every letter of his messages by 3 positions. Simple. Fast. Unreadable to an illiterate enemy. The alphabet had to be known just to read — and only a handful of Romans were literate.
SHIFT: +3
CIPH: KHOOR
Polybius of Megalopolis invented a grid system where each letter becomes a pair of coordinates. Originally designed for torch signalling across mountains — each number represented by torch count. The first fractionation cipher.
HELLO = 23 15 31 31 34
The oldest known substitution cipher. Hebrew scribes mapped the first letter of the alphabet to the last, the second to the second-to-last, and so on — a perfect mirror. Hidden inside the Book of Jeremiah, where Babel becomes Sheshach.
HELLO = SVOOL
Mlecchita Vikalpa from Vatsyayana's Kama Sutra: a paired-letter substitution proving classical South Asia had its own cipher tradition.
A practical military handbook of concealment tricks and tactical signaling methods from siege warfare in the Greek world.
Administrative codebooks and substitutions from the Abbasid world, paired with al-Kindi's foundational frequency analysis.
A modern museum coda: the internet's spoiler veil demonstrates how ancient substitution ideas persisted into digital culture.
Foundational Concepts
The Caesar cipher wraps around the alphabet using modulo 26. (position + shift) mod 26. This operation is fundamental to modern symmetric encryption including AES.
Polybius's grid converts letters to (row, col) pairs — splitting each letter into two symbols. This "fractionation" concept underlies the Bifid, ADFGVX, and modern bit-slicing techniques.
Both ciphers preserve letter frequencies. In English, E appears ~12.7% of the time. Any cipher that maps E to one symbol can be attacked by finding the most common symbol in the ciphertext.