History of Encryption
From wax tablets to quantum computers โ the unending war between codemakers and codebreakers
Scytale
๐ฌ๐ท SpartaSpartan generals wrap a strip of leather around a wooden rod of a specific diameter to reveal or conceal a message. It is history's first known transposition cipher โ the letters are unchanged, only their order is rearranged.
View exhibit โPolybius Square
๐ฌ๐ท GreeceGreek historian Polybius devises a grid encoding that converts letters to numeric pairs โ one of the earliest systems to fractionalize the alphabet. Its principle survives in ADFGVX and tap code.
View exhibit โCaesar Cipher
๐ฎ๐น RomeJulius Caesar shifts letters by three positions to communicate with his generals during the Gallic Wars. Suetonius confirms it in The Twelve Caesars. It works because most interceptors are illiterate.
View exhibit โAl-Kindi's Frequency Analysis
๐ฎ๐ถ BaghdadAl-Kindi publishes A Manuscript on Deciphering Cryptographic Messages โ the first known description of frequency analysis. Every simple substitution cipher is now breakable. The codebreakers lead for 600 years.
Alberti Cipher Disk
๐ฎ๐น ItalyLeon Battista Alberti invents the cipher disk and proposes changing the cipher alphabet mid-message โ the birth of polyalphabetic encryption. For the first time, frequency analysis alone is not enough.
View exhibit โVigenรจre Cipher
๐ซ๐ท FranceBlaise de Vigenรจre publishes his tabula recta. The cipher resists casual cryptanalysis for three centuries and earns the title "le chiffre indรฉchiffrable" โ the unbreakable cipher. It isn't.
View exhibit โBacon's Binary Encoding
๐ฌ๐ง EnglandFrancis Bacon devises a 5-bit binary code to hide messages in the typeface โ steganography meets binary encoding, 300 years before Shannon.
View exhibit โJefferson Disk
๐บ๐ธ United StatesThomas Jefferson designs a cylinder cipher with 26 scrambled-alphabet disks on an axle. The concept is so sound it's reinvented by Bazeries and officially adopted as the US Army's M-94 in 1922.
View exhibit โPlayfair Cipher
๐ฌ๐ง EnglandCharles Wheatstone invents the Playfair cipher, championed by Lord Playfair. By encrypting letter pairs instead of individual letters, it defeats simple frequency analysis. Used by the British Army through both world wars.
View exhibit โKasiski Examination
๐ฉ๐ช PrussiaFriedrich Kasiski publishes a method to determine the key length of polyalphabetic ciphers by analyzing repeated patterns. The "unbreakable" Vigenรจre falls. Babbage had done it earlier but never published.
One-Time Pad
๐บ๐ธ United StatesGilbert Vernam patents the one-time pad โ proven by Shannon in 1949 to be the only theoretically unbreakable cipher. The catch: the key must be truly random, as long as the message, and never reused.
View exhibit โADFGVX Cipher
๐ฉ๐ช Germany ยท WWIColonel Fritz Nebel deploys the ADFGVX cipher for German spring offensives. It combines Polybius substitution with columnar transposition. Lieutenant Georges Painvin breaks it in a legendary feat of manual cryptanalysis.
View exhibit โEnigma Machine
๐ฉ๐ช GermanyArthur Scherbius patents the Enigma in 1918. The German military adopts it with 158 quintillion possible settings. Polish mathematicians crack it in 1932. Turing and Bletchley Park industrialize the break with the Bombe machine, shortening WWII by an estimated two years.
View exhibit โLorenz Cipher & Colossus
๐ฉ๐ช๐ฌ๐ง Germany / UKThe Lorenz SZ40/42 encrypts German teleprinter traffic. Bill Tutte reverse-engineers the machine without ever seeing it. Tommy Flowers builds Colossus โ the first programmable electronic digital computer โ to break it.
View exhibit โNavajo Code Talkers
๐บ๐ธ Pacific Theater420 Navajo Marines transmit battlefield orders in a language no adversary can decode. Their code, based on the Navajo language with military-specific vocabulary layered on top, is the only widely-used military cipher that was never broken.
View exhibit โShannon's Secrecy Theory
๐บ๐ธ United StatesClaude Shannon publishes "Communication Theory of Secrecy Systems" โ the mathematical foundation of modern cryptography. He proves the one-time pad is unbreakable and defines confusion and diffusion as the two pillars of cipher design.
Diffie-Hellman Key Exchange
๐บ๐ธ United StatesWhitfield Diffie and Martin Hellman publish "New Directions in Cryptography" โ inventing public-key cryptography. For the first time, two parties can agree on a secret key over an insecure channel without ever meeting. GCHQ had classified equivalent work by James Ellis years earlier.
RSA & DES
๐บ๐ธ United StatesRivest, Shamir, and Adleman publish RSA โ the first practical public-key cryptosystem. The same year, NIST standardizes DES as the federal encryption standard. The era of algorithmic, standardized cryptography begins.
AES Standardized
๐ง๐ช Belgium / ๐บ๐ธ NISTAfter a 5-year international competition, NIST selects Rijndael (by Joan Daemen and Vincent Rijmen) as the Advanced Encryption Standard. AES remains the backbone of symmetric encryption worldwide.
SHA-1 Collision Attack
๐จ๐ณ ChinaXiaoyun Wang and team demonstrate theoretical collision attacks against SHA-1, beginning the transition to SHA-256 and SHA-3. A practical collision is demonstrated by Google in 2017.
Snowden Revelations
๐ GlobalEdward Snowden's disclosures reveal the scale of government surveillance. The revelations accelerate global adoption of end-to-end encryption โ HTTPS becomes the default, messaging apps adopt Signal Protocol, and encryption moves from specialist tool to human right.
Zodiac Z-340 Cipher
๐บ๐ธ San FranciscoThe Zodiac Killer mails a 340-character cipher to the San Francisco Chronicle. It resists all attacks for 51 years until David Oranchak, Sam Blake, and Jarl Van Eycke crack it during COVID lockdown โ revealing a homophonic substitution hidden behind a diagonal transposition.
View exhibit โPost-Quantum Cryptography
๐ Global ยท NISTNIST launches the Post-Quantum Cryptography competition in 2017. In 2024, ML-KEM (FIPS 203), ML-DSA (FIPS 204), and SLH-DSA (FIPS 205) are standardized โ designed to resist quantum computers running Shor's algorithm. The ancient arms race continues.