Hall II · Medieval — Renaissance · 800 – 1700

Classical Substitution

The arms race between letter-mappers and frequency counters

For a thousand years after Caesar, cryptographers mapped letters to other symbols and believed their ciphers were unbreakable. Then in 850 AD, Al-Kindi of Baghdad wrote a nine-page treatise that shattered every substitution cipher ever made — and every one that would be made for the next four centuries. This hall shows the battle that followed.

Medieval Renaissance Victorian 2 Hard-to-Break Exhibits
💀

Al-Kindi's insight (850 AD): Count how often each letter appears in ciphertext. The most frequent symbol probably represents E (12.7% of English). The second most frequent is probably T (9.1%). Map frequencies to expected values — the key reveals itself. This technique alone broke every cipher in this hall.

What This Hall Teaches

The Substitution Arms Race

📊Frequency Analysis

Al-Kindi's 850 AD technique. Every monoalphabetic cipher is broken by counting symbol frequencies and matching them to known language distributions. The Caesar cipher is a trivial special case.

🎲Homophonic Defense

Assign multiple ciphertexts to common letters to flatten frequency peaks. A sophisticated attacker can still detect the homophonic system through structural patterns and solve it with enough ciphertext.

📦Digraph Encryption → AES Blocks

Playfair encrypts letter pairs; AES encrypts 128-bit blocks. The principle is the same: operate on multiple characters simultaneously to defeat single-character statistical attacks.

🔢Matrix Multiplication → Modern Mixing

Hill's matrix multiplication concept — mixing multiple input letters to produce each output letter — became the MixColumns step in AES, one of the four core operations providing diffusion.

← Previous Hall Hall I: Birth of Cryptography