Beyond the Museum

Modern Cryptography

Not just ciphers — an entirely different discipline

Every exhibit in this museum is a cipher — a reversible method for turning plaintext into ciphertext and back. Modern cryptography includes ciphers (AES, ChaCha20), but also key exchange protocols, digital signatures, and hash functions that are not ciphers at all. This page maps the journey from classical failure to modern practice.

The Complete Journey

Classical → Modern: What Each Failure Taught

Classical Cipher TypeFatal WeaknessModern SolutionModern Example
Caesar / MonoalphabeticFrequency analysis — letter mapping preservedNon-linear S-boxes destroy all frequency patternsAES SubBytes
Homophonic SubstitutionStill monoalphabetic — poor distribution leaks infoUniformly random output: every ciphertext byte equally likelyAES with proper IV
Polyalphabetic / VigenèreRepeating key creates detectable periodicityNon-repeating pseudorandom keystreams, nonce + counterChaCha20, AES-GCM
Transposition (Rail Fence, Columnar)Letters preserved — anagram attacks workSubstitution combined with permutation every roundAES ShiftRows + MixColumns
Playfair / Hill (block)Small blocks leak digraph statistics; linear algebra solvable128-bit blocks, non-linear operations, round keysAES (128-bit block)
Fractionation (Bifid, ADFGVX)Coordinate mixing insufficient with static key squareMultiple rounds of mixing with key-derived round keysAES 10–14 rounds
Military layered (ADFGVX, VIC)Substitution + transposition — each layer still attackable10–14 rounds of 4 operations — computationally infeasible to reverseAES, Camellia, SM4
Rotor machines (Enigma, Lorenz)Physical key distribution; operator errors; structural flawsPublic-key cryptography eliminates need for shared secret distributionRSA, Diffie-Hellman, ECDH
One-Time PadImpractical key management — reuse is catastrophicComputationally secure with short key; KDFs for key derivationAES-256, X25519 key exchange
Caesar / Monoalphabetic
WeaknessFrequency analysis — letter mapping preserved
SolutionNon-linear S-boxes destroy all frequency patterns
ExampleAES SubBytes
Homophonic Substitution
WeaknessStill monoalphabetic — poor distribution leaks info
SolutionUniformly random output: every ciphertext byte equally likely
ExampleAES with proper IV
Polyalphabetic / Vigenère
WeaknessRepeating key creates detectable periodicity
SolutionNon-repeating pseudorandom keystreams, nonce + counter
ExampleChaCha20, AES-GCM
Transposition (Rail Fence, Columnar)
WeaknessLetters preserved — anagram attacks work
SolutionSubstitution combined with permutation every round
ExampleAES ShiftRows + MixColumns
Playfair / Hill (block)
WeaknessSmall blocks leak digraph statistics; linear algebra solvable
Solution128-bit blocks, non-linear operations, round keys
ExampleAES (128-bit block)
Fractionation (Bifid, ADFGVX)
WeaknessCoordinate mixing insufficient with static key square
SolutionMultiple rounds of mixing with key-derived round keys
ExampleAES 10–14 rounds
Military layered (ADFGVX, VIC)
WeaknessSubstitution + transposition — each layer still attackable
Solution10–14 rounds of 4 operations — computationally infeasible to reverse
ExampleAES, Camellia, SM4
Rotor machines (Enigma, Lorenz)
WeaknessPhysical key distribution; operator errors; structural flaws
SolutionPublic-key cryptography eliminates need for shared secret distribution
ExampleRSA, Diffie-Hellman, ECDH
One-Time Pad
WeaknessImpractical key management — reuse is catastrophic
SolutionComputationally secure with short key; KDFs for key derivation
ExampleAES-256, X25519 key exchange
Shannon's Framework

Confusion & Diffusion

🌀Confusion

Making the relationship between key and ciphertext as complex as possible. Caesar has zero confusion: C = P + 3. One known pair reveals the entire key.

Modern solution: AES S-boxes are highly non-linear. Every output bit depends on every input bit in a way that can't be described by any simple mathematical relationship.

🌊Diffusion

Spreading each plaintext bit's influence across many ciphertext bits. Caesar has zero diffusion: change one letter, change exactly one ciphertext letter.

Modern solution: AES avalanche effect — after 2 rounds, every output bit depends on every input bit. After 10 rounds, changing 1 bit changes ~50% of all output bits.

The Modern Landscape

What Replaced Classical Cryptography

⚠️

Taxonomy note: Only the first category below — symmetric ciphers — contains actual ciphers (reversible plaintext↔ciphertext transformations). Key exchange, public-key cryptography, and hash functions are cryptographic primitives, not ciphers. They solve different problems: establishing shared secrets, proving identity, and verifying integrity.

🏛️

Looking for the exhibits? The five core modern primitives — DES, Diffie-Hellman, RSA, AES, and SHA-256 — each have a full four-part exhibit page in Hall XI · Modern Cryptography. This page provides the wider context: the journey from classical failure to modern practice, and the primitives (ChaCha20, ECDH, post-quantum) that sit alongside the canonical five.

🔐 Ciphers — Plaintext → Ciphertext → Plaintext
📦AES-256 (Symmetric) → exhibit

128-bit blocks, 256-bit key, 14 rounds. 2²⁵⁶ possible keys with no known practical attack. Protects everything from HTTPS to full-disk encryption.

Simplified diagram of AES encryption showing the substitution-permutation round structure
AES encryption — simplified view of the substitution-permutation rounds that protect modern data. Illustration: Google Gemini AI
🌊ChaCha20 (Stream Cipher)

Designed by Daniel Bernstein. 256-bit key, 64-bit nonce. XORs plaintext with a cryptographically random, never-repeating keystream.

🔑 Key Exchange — Creating a Shared Secret
🤝Diffie-Hellman Key Exchange → exhibit

Derives a shared secret over a public channel. Based on the discrete logarithm problem. Not a cipher — it does not encrypt data.

Diagram illustrating the Diffie-Hellman key exchange protocol
Diffie-Hellman key exchange — how two parties establish a shared secret over an insecure channel. Illustration: Google Gemini AI
🔓 Public-Key Cryptography — Asymmetric Encryption & Signatures
🔑RSA (Asymmetric) → exhibit

Rivest, Shamir, Adleman (1977). Two keys — public (encrypt) and private (decrypt) — secured by the difficulty of factoring large primes. Used in TLS, email, and digital signatures.

Diagram illustrating the principles of public key cryptography
Public key cryptography — asymmetric encryption using public and private key pairs. Illustration: Google Gemini AI
#️⃣ Hash Functions — One-Way Fingerprints
🔒SHA-256 (Hash Function) → exhibit

Produces a fixed 256-bit fingerprint of any input. One-way: given the hash, you cannot recover the input. Collision-resistant: finding two inputs with the same hash requires 2¹²⁸ operations. Used in digital signatures, certificate verification, blockchain. Not a cipher — it cannot be reversed.

Diagram showing the avalanche effect in hash functions where small input changes produce completely different outputs
The avalanche effect — changing a single input bit transforms the entire hash output. Illustration: Google Gemini AI
🔮 The Future — Post-Quantum Cryptography
🔮Post-Quantum Cryptography

Quantum computers will break RSA and Diffie-Hellman. NIST is standardizing quantum-resistant algorithms: CRYSTALS-Kyber (key exchange) and CRYSTALS-Dilithium (signatures), based on lattice problems believed to resist quantum attacks.

🎓

The museum's final lesson: Every classical cipher failed because it relied on obscurity or physical key distribution. Modern cryptography replaced both with mathematical hardness and public-key mathematics — and expanded far beyond ciphers into protocols, signatures, and proofs.

Continue Learning

Resources

🛠️CrypTool-Online

Free browser-based cryptography toolkit. Encrypt and decrypt with dozens of classical and modern ciphers. Visualize algorithms step by step.

📖The Code Book

Simon Singh’s The Code Book traces the history of cryptography from ancient Egypt to quantum computing. The definitive popular introduction to the field.

🎬Cryptography I (Stanford)

Dan Boneh’s free Coursera course covers modern cryptographic primitives: stream ciphers, block ciphers, MACs, public-key encryption, and key exchange.