Ancient One of the earliest forms of encryption is symbol replacement, which was first found in the tomb of
Khnumhotep II, who lived in 1900 BC
Egypt. Symbol replacement encryption is "non-standard," which means that the symbols require a cipher or key to understand. This type of early encryption was used throughout Ancient Greece and Rome for military purposes. One of the most famous military encryption developments was the
Caesar cipher, in which a plaintext letter is shifted a fixed number of positions along the alphabet to get the encoded letter. A message encoded with this type of encryption could be decoded with a fixed number on the Caesar cipher.'''''' Around 800 AD, Arab mathematician
al-Kindi developed the technique of
frequency analysis – which was an attempt to crack
ciphers systematically, including the Caesar cipher. and
Leon Battista Alberti (in 1465), which varied the substitution alphabet as encryption proceeded in order to confound such analysis.
19th–20th century Around 1790,
Thomas Jefferson theorized a cipher to encode and decode messages to provide a more secure way of military correspondence. The cipher, known today as the Wheel Cipher or the
Jefferson Disk, although never actually built, was theorized as a spool that could jumble an English message up to 36 characters. The message could be decrypted by plugging in the jumbled message to a receiver with an identical cipher.'''''' A similar device to the Jefferson Disk, the
M-94, was developed in 1917 independently by
US Army Major Joseph Mauborne. This device was used in U.S. military communications until 1942. In
World War II, the
Axis powers used a more advanced version of the M-94 called the
Enigma Machine. The Enigma Machine was more complex because unlike the
Jefferson Wheel and the M-94, each day the jumble of letters switched to a completely new combination. Each day's combination was only known by the Axis, so many thought the only way to break the code would be to try over 17,000 combinations within 24 hours. The Allies used computing power to severely limit the number of reasonable combinations they needed to check every day, leading to the breaking of the Enigma Machine.
Modern Today, encryption is used in the transfer of communication over the
Internet for security and commerce. One of the first "modern" cipher suites,
DES, used a 56-bit key with 72,057,594,037,927,936 possibilities; it was cracked in 1999 by
EFF's brute-force
DES cracker, which required 22 hours and 15 minutes to do so. Modern encryption standards often use stronger key sizes, such as
AES (256-bit mode),
TwoFish,
ChaCha20-Poly1305,
Serpent (configurable up to 512-bit). Cipher suites that use a 128-bit or higher key, like AES, cannot be brute-forced because the total number of keys is 3.4028237e+38 possibilities. The most likely option for cracking ciphers with large key sizes is to find vulnerabilities in the cipher itself, like inherent biases and
backdoors or by exploiting physical side effects through
Side-channel attacks. For example,
RC4, a stream cipher, was cracked due to inherent biases and vulnerabilities in the cipher. == Encryption in cryptography ==