History

09/07/05

Home
Overview
History
Single-key Encryption
Public-key Encryption
Identity-based Encryption
Interactive
Feedback
References

 

 

      Early History       World Wars        Enigma      

Early History

     It seems reasonable to assume that people have tried to conceal information in written form since writing was developed and examples survive in stone inscriptions and papyruses showing that many ancient civilizations including the Egyptians, Hebrews and Assyrians all developed cryptographic systems. The first recorded use of cryptography for correspondence was by the Spartans who (as early as 400 BC) employed a cipher device called a "scytale" to send secret communications between military commanders. The scytale consisted of a tapered baton around which was wrapped a piece of parchment inscribed with the message. Once unwrapped the parchment appeared to contain an incomprehensible set of letters, however when wrapped around another baton of identical size the original text appeared.

A Scytale, an early device for encryption. Scytale

     The Greeks were therefore the inventors of the first transposition cipher and in the fourth century BC the earliest treatise on the subject was written by a Greek, Aeneas Tacticus, as part of a work entitled On the Defence of Fortifications. Another Greek, Polybius later devised a means of encoding letters into pairs of symbols using a device known as the Polybius checkerboard which contains many elements common to later encryption systems. In addition to the Greeks, there are similar examples of primitive substitution or transposition ciphers in use by other civilisations including the Romans.

     The Polybius checkerboard consists of a five by five grid containing all the letters of the alphabet. Each letter is converted into two numbers, the first is the row in which the letter can be found and the second is the column. Hence the letter A becomes 11, the letter B 12 and so forth.

     The Arabs were the first people to clearly understand the principles of cryptography and to elucidate the beginning of cryptanalysis. They devised and used both substitution and transposition ciphers and discovered the use of letter frequency distributions in cryptanalysis. As a result of this by approximately 1412 al-Kalka-shandi could include in his encyclopaedia Subh al-a’sha a respectable if elementary treatment of several cryptographic systems. He also gave explicit instructions on how to cryptanalyze cipher text using letter frequency counts, including examples illustrating the technique.

     European cryptography dates from the Middle Ages during which it was developed by the Papal and Italian city states. The earliest ciphers involved only vowel substitution (leaving the consonants unchanged). Circa 1379 the first European manual on cryptography, consisting of a compilation of ciphers, was produced by Gabriele de Lavinde of Parma, who served Pope Clement VII. This manual contains a set of keys for correspondents and uses symbols for letters and nulls with several two character code equivalents for words and names. The first brief code vocabularies, called nomenclatures, were expanded gradually and for several centuries were the mainstay of diplomatic communications for nearly all European governments. In 1470 Leon Battista Alberti described the first cipher disk in Trattati in cifra and the Traicté de chiffres, published in 1586 by Blaise de Vigernère contained a square table commonly attributed to him as well as descriptions of the first plaintext and cipher text autokey systems.

     By 1860 large codes were in common use for diplomatic communications and cipher systems had become a rarity for this application however cipher systems prevailed for military communications (except for high-command communications) because of the difficulty of protecting codebooks from capture or compromise. During the US Civil War, the Federal Army extensively used transposition ciphers. The Confederate Army primarily used the Vigenère cipher and on occasional monoalphabetic substitution. While the Union cryptanalysts solved most of the intercepted Confederate ciphers, the Confederacy in desperation, sometimes published Union ciphers in newspapers, appealing for help from readers in cryptanalysing them.

World Wars

     During World War I, both sides employed cipher systems almost exclusively for tactical communications, while code systems were still used mainly for high-command and diplomatic communications. Although field cipher systems such as the U.S. Signal Corps cipher disk lacked sophistication, some complicated cipher systems were used for high-level communications by the end of the war.

     In the 1920's, the maturing of mechanical and electromechanical technology came together with the needs of telegraphy and radio to bring about a revolution in crypto devices - the development of rotor cipher machines. The concept of the rotor had been anticipated in the older mechanical cipher disks however it was an American, Edward Hebern, who recognised how to implement them. Beginning in 1921 and continuing through the next decade, Hebern constructed a series of steadily improving rotor machines that were evaluated by the U.S. Navy. It was undoubtedly this work which led to the United States’ superior position in cryptology during the second world war. At almost the same time as Hebern was inventing the rotor cipher machine in the United States, European engineers such as Hugo Koch (Netherlands) and Arthur Scherbius (Germany) independently discovered the rotor concept and designed the precursors to the most famous cipher machine in history - the German Enigma machine which was used during World War 2.

Enigma Machine

Figure 1. A three-rotor German military Enigma machine showing, from bottom to top, the plugboard, the keyboard, the lamps and the finger-wheels of the rotors emerging from the inner lid (version with labels).    

     The Enigma was a portable cipher machine used to encrypt and decrypt secret messages. More precisely, Enigma was a family of related electro-mechanical rotor machines, as there were a variety of different models.

     The Enigma was used commercially from the early 1920's on, and was also adopted by the military and governmental services of a number of nations — most famously by Nazi Germany before and during World War II. The German military model, the Wehrmacht Enigma, is the version most commonly discussed. The machine has gained notoriety because Allied cryptologists were able to decrypt a large number of messages that had been enciphered on the machine before being broadcast by radio. The intelligence gained through this source — codenamed ULTRA— was a significant aid to the Allied war effort. Some historians have suggested that the end of the European war was hastened by up to a year or more because of the decryption of German ciphers.

     Like other rotor machines, the Enigma machine is a combination of mechanical and electrical systems. The mechanical mechanism consists of a keyboard; a set of rotating disks, called rotors, arranged adjacently along a spindle; and a stepping mechanism to turn one or more of the rotors with each key press. The exact mechanism varies, but the most common form is for the right-hand rotor to step once with every key stroke, and occasionally the motion of neighboring rotors is triggered. The continual movement of the rotors results in a different cryptographic transformation after each key press.

Enigma encryption for two consecutive letters — current is passed into set of rotors, around the reflector, and back out through the rotors again.  Note: The greyed-out lines represent other possible circuits within each rotor, which are hard-wired to contacts on each rotor.  Letter A encrypts differently with consecutive key presses, first to G, and then to C. This is because the right hand rotor has stepped, sending the signal on a completely different route.

     Enigma encryption for two consecutive letters — current is passed into set of rotors, around the reflector, and back out through the rotors again. Note: The grey outlines represent other possible circuits within each rotor, which are hard-wired to contacts on each rotor. Letter A encrypts differently with consecutive key presses, first to G, and then to C. This is because the right hand rotor has stepped, sending the signal on a completely different route.

 

Home | Overview | History | Single-key Encryption | Public-key Encryption | Identity-based Encryption | Interactive | Feedback | References

This site was last updated 09/07/05