Logo - springer
Slogan - springer

Computer Science - General Issues | A Brief History of Cryptology and Cryptographic Algorithms

A Brief History of Cryptology and Cryptographic Algorithms

Dooley, John

2013, XII, 99 p. 33 illus.

Available Formats:

Springer eBooks may be purchased by end-customers only and are sold without copy protection (DRM free). Instead, all eBooks include personalized watermarks. This means you can read the Springer eBooks across numerous devices such as Laptops, eReaders, and tablets.

You can pay for Springer eBooks with Visa, Mastercard, American Express or Paypal.

After the purchase you can directly download the eBook file or read it online in our Springer eBook Reader. Furthermore your eBook will be stored in your MySpringer account. So you can always re-download your eBooks.


(net) price for USA

ISBN 978-3-319-01628-3

digitally watermarked, no DRM

Included Format: PDF and EPUB

download immediately after purchase

learn more about Springer eBooks

add to marked items


Softcover (also known as softback) version.

You can pay for Springer Books with Visa, Mastercard, American Express or Paypal.

Standard shipping is free of charge for individual customers.


(net) price for USA

ISBN 978-3-319-01627-6

free shipping for individuals worldwide

usually dispatched within 3 to 5 business days

add to marked items

  • Traces the history of the conflict between cryptographer and cryptanalyst
  • Explores in some depth the algorithms created to protect messages
  • Suggests where the field of cryptology is going in the future

The science of cryptology is made up of two halves. Cryptography is the study of how to create secure systems for communications. Cryptanalysis is the study of how to break those systems. The conflict between these two halves of cryptology is the story of secret writing. For over two thousand years governments, armies, and now individuals have wanted to protect their messages from the “enemy”. This desire to communicate securely and secretly has resulted in the creation of numerous and increasingly complicated systems to protect one's messages. On the other hand, for every new system to protect messages there is a cryptanalyst creating a new technique to break that system. With the advent of computers the cryptographer seems to finally have the upper hand. New mathematically based cryptographic algorithms that use computers for encryption and decryption are so secure that brute-force techniques seem to be the only way to break them – so far. This work traces the history of the conflict between cryptographer and cryptanalyst, explores in some depth the algorithms created to protect messages, and suggests where the field is going in the future.

Content Level » Research

Keywords » AES - Cryptographic Algorithms - Cryptology - DES - Herbert Yardley - Public-Key Cryptography - Quantum Cryptography - RSA - Vigenere Square - William Friedman

Related subjects » General Issues - History of Science - Security and Cryptology

Table of contents 

Introduction: A Revolutionary Cipher

Cryptology Before 1500: A Bit of Magic

The Black Chambers: 1500 – 1776

Crypto goes to War: 1861 – 1865

Crypto and the War to End All Wars: 1914 – 1917

The Interwar Period: 1919 – 1939

The Coming of the Machines: 1918 – 1945

The Machines Take Over: Computer Cryptography

Alice and Bob and Whit and Martin: Public Key Crypto

Popular Content within this publication 



Read this Book on Springerlink

Services for this book

New Book Alert

Get alerted on new Springer publications in the subject area of History of Computing.