2,400 Years of Secrets

History of Encryption

From wax tablets to quantum computers โ€” the unending war between codemakers and codebreakers

~500 BC

Scytale

๐Ÿ‡ฌ๐Ÿ‡ท Sparta

Spartan generals wrap a strip of leather around a wooden rod of a specific diameter to reveal or conceal a message. It is history's first known transposition cipher โ€” the letters are unchanged, only their order is rearranged.

View exhibit โ†’
~400 BC

Polybius Square

๐Ÿ‡ฌ๐Ÿ‡ท Greece

Greek historian Polybius devises a grid encoding that converts letters to numeric pairs โ€” one of the earliest systems to fractionalize the alphabet. Its principle survives in ADFGVX and tap code.

View exhibit โ†’
~58 BC

Caesar Cipher

๐Ÿ‡ฎ๐Ÿ‡น Rome

Julius Caesar shifts letters by three positions to communicate with his generals during the Gallic Wars. Suetonius confirms it in The Twelve Caesars. It works because most interceptors are illiterate.

View exhibit โ†’
~850 AD

Al-Kindi's Frequency Analysis

๐Ÿ‡ฎ๐Ÿ‡ถ Baghdad

Al-Kindi publishes A Manuscript on Deciphering Cryptographic Messages โ€” the first known description of frequency analysis. Every simple substitution cipher is now breakable. The codebreakers lead for 600 years.

1467

Alberti Cipher Disk

๐Ÿ‡ฎ๐Ÿ‡น Italy

Leon Battista Alberti invents the cipher disk and proposes changing the cipher alphabet mid-message โ€” the birth of polyalphabetic encryption. For the first time, frequency analysis alone is not enough.

View exhibit โ†’
1553

Vigenรจre Cipher

๐Ÿ‡ซ๐Ÿ‡ท France

Blaise de Vigenรจre publishes his tabula recta. The cipher resists casual cryptanalysis for three centuries and earns the title "le chiffre indรฉchiffrable" โ€” the unbreakable cipher. It isn't.

View exhibit โ†’
1605

Bacon's Binary Encoding

๐Ÿ‡ฌ๐Ÿ‡ง England

Francis Bacon devises a 5-bit binary code to hide messages in the typeface โ€” steganography meets binary encoding, 300 years before Shannon.

View exhibit โ†’
1795

Jefferson Disk

๐Ÿ‡บ๐Ÿ‡ธ United States

Thomas Jefferson designs a cylinder cipher with 26 scrambled-alphabet disks on an axle. The concept is so sound it's reinvented by Bazeries and officially adopted as the US Army's M-94 in 1922.

View exhibit โ†’
1854

Playfair Cipher

๐Ÿ‡ฌ๐Ÿ‡ง England

Charles Wheatstone invents the Playfair cipher, championed by Lord Playfair. By encrypting letter pairs instead of individual letters, it defeats simple frequency analysis. Used by the British Army through both world wars.

View exhibit โ†’
1863

Kasiski Examination

๐Ÿ‡ฉ๐Ÿ‡ช Prussia

Friedrich Kasiski publishes a method to determine the key length of polyalphabetic ciphers by analyzing repeated patterns. The "unbreakable" Vigenรจre falls. Babbage had done it earlier but never published.

1917

One-Time Pad

๐Ÿ‡บ๐Ÿ‡ธ United States

Gilbert Vernam patents the one-time pad โ€” proven by Shannon in 1949 to be the only theoretically unbreakable cipher. The catch: the key must be truly random, as long as the message, and never reused.

View exhibit โ†’
1918

ADFGVX Cipher

๐Ÿ‡ฉ๐Ÿ‡ช Germany ยท WWI

Colonel Fritz Nebel deploys the ADFGVX cipher for German spring offensives. It combines Polybius substitution with columnar transposition. Lieutenant Georges Painvin breaks it in a legendary feat of manual cryptanalysis.

View exhibit โ†’
1920sโ€“1945

Enigma Machine

๐Ÿ‡ฉ๐Ÿ‡ช Germany

Arthur Scherbius patents the Enigma in 1918. The German military adopts it with 158 quintillion possible settings. Polish mathematicians crack it in 1932. Turing and Bletchley Park industrialize the break with the Bombe machine, shortening WWII by an estimated two years.

View exhibit โ†’
1940s

Lorenz Cipher & Colossus

๐Ÿ‡ฉ๐Ÿ‡ช๐Ÿ‡ฌ๐Ÿ‡ง Germany / UK

The Lorenz SZ40/42 encrypts German teleprinter traffic. Bill Tutte reverse-engineers the machine without ever seeing it. Tommy Flowers builds Colossus โ€” the first programmable electronic digital computer โ€” to break it.

View exhibit โ†’
1942โ€“1945

Navajo Code Talkers

๐Ÿ‡บ๐Ÿ‡ธ Pacific Theater

420 Navajo Marines transmit battlefield orders in a language no adversary can decode. Their code, based on the Navajo language with military-specific vocabulary layered on top, is the only widely-used military cipher that was never broken.

View exhibit โ†’
1945

Shannon's Secrecy Theory

๐Ÿ‡บ๐Ÿ‡ธ United States

Claude Shannon publishes "Communication Theory of Secrecy Systems" โ€” the mathematical foundation of modern cryptography. He proves the one-time pad is unbreakable and defines confusion and diffusion as the two pillars of cipher design.

1976

Diffie-Hellman Key Exchange

๐Ÿ‡บ๐Ÿ‡ธ United States

Whitfield Diffie and Martin Hellman publish "New Directions in Cryptography" โ€” inventing public-key cryptography. For the first time, two parties can agree on a secret key over an insecure channel without ever meeting. GCHQ had classified equivalent work by James Ellis years earlier.

1977

RSA & DES

๐Ÿ‡บ๐Ÿ‡ธ United States

Rivest, Shamir, and Adleman publish RSA โ€” the first practical public-key cryptosystem. The same year, NIST standardizes DES as the federal encryption standard. The era of algorithmic, standardized cryptography begins.

2001

AES Standardized

๐Ÿ‡ง๐Ÿ‡ช Belgium / ๐Ÿ‡บ๐Ÿ‡ธ NIST

After a 5-year international competition, NIST selects Rijndael (by Joan Daemen and Vincent Rijmen) as the Advanced Encryption Standard. AES remains the backbone of symmetric encryption worldwide.

2005

SHA-1 Collision Attack

๐Ÿ‡จ๐Ÿ‡ณ China

Xiaoyun Wang and team demonstrate theoretical collision attacks against SHA-1, beginning the transition to SHA-256 and SHA-3. A practical collision is demonstrated by Google in 2017.

2013

Snowden Revelations

๐ŸŒ Global

Edward Snowden's disclosures reveal the scale of government surveillance. The revelations accelerate global adoption of end-to-end encryption โ€” HTTPS becomes the default, messaging apps adopt Signal Protocol, and encryption moves from specialist tool to human right.

1969 / Solved 2020

Zodiac Z-340 Cipher

๐Ÿ‡บ๐Ÿ‡ธ San Francisco

The Zodiac Killer mails a 340-character cipher to the San Francisco Chronicle. It resists all attacks for 51 years until David Oranchak, Sam Blake, and Jarl Van Eycke crack it during COVID lockdown โ€” revealing a homophonic substitution hidden behind a diagonal transposition.

View exhibit โ†’
2017โ€“2024

Post-Quantum Cryptography

๐ŸŒ Global ยท NIST

NIST launches the Post-Quantum Cryptography competition in 2017. In 2024, ML-KEM (FIPS 203), ML-DSA (FIPS 204), and SLH-DSA (FIPS 205) are standardized โ€” designed to resist quantum computers running Shor's algorithm. The ancient arms race continues.