Topic > A Brief History of Cryptography - 1864

Computing is a broad field that includes almost everything related to computers. Every day there is information transmitted everywhere on the Internet. Photos are uploaded, transactions are made on thousands of online retail sites, and banking transactions happen every day on the Internet. All these transactions have created the need for secure communications. People want to hide things like banking, medical, and political information from unwelcome parties. This created the need for encryption. Cryptography is the science or study of secret writing techniques, especially codes and cipher systems, and is used by everyone from the average citizen to the government and military. Cryptography was first used long before the invention of computers. A well-known system has been attributed to the reign of Julius Caesar (Klein ix). Another example is the famous Zimmerman telegraph, sent from Germany to Mexico during World War I (ix). In a more modern context, cryptology was primarily used by the government until the late 1970s (Simpson 1). This is largely because computers were too expensive and therefore not many families or businesses owned them (1). However, after the information revolution, cryptography became more public, especially in the commercial sector where there was a greater need to secure things like transactions (1). One of the most important aspects of trading is the transaction. Transactions are necessary whenever two parties exchange money or information. Since the information age began, transactions are more common on the Internet, where it is more imperative for transactions to be secure (Klein x). Businesses have also become more prevalent, which means encryption is necessary to protect… half of documents and promises. New York: CambridgeUP, 2014. Print.Magnini, Giacomo. "Introduction to Public Key Cryptography". Mozilla Developer Network. Red Hat, Inc., September 26, 2005. Web. March 3, 2014. Mone, Gregorio. “Future-proof encryption.” Premier of academic research. EBSCO, November 1, 2013. Network. March 3, 2014.?sid=49de02cd-bd5b-430f-a76b 30ab568bef4d%40sessionmgr4004&vid=23&hid=4107>.Northcutt, Stephen. "Security laboratory." Hash functions. Sans Technology Institute and Web. March 3, 2014."RSA Cryptocurrency." RSA cryptocurrency. Np, nd Web. March 3, 2014.Simpson, Sarah. “Cryptography Defined/A Brief History.” Cryptography Defined/Brief History. University of Texas, 1997. Web. March 3, 2014. Smith, Craig. "Basic techniques of cryptanalysis." www.sans.org. Sans Institute, November 17, 2001. Network. March 3. 2014.