History of cryptography
Cryptography, the use of codes and ciphers to protect secrets, began thousands of years ago. Until recent decades, it has been the story of what might be called classic cryptography — that is, of met...
History of cryptography - Wikipedia
Dutch police 'read' Blackberry emails
A police forensics unit has claimed that it can decrypt messages on locked-down Blackberry handsets.
600 year old mystery manuscript decoded by University of Bedfordshire professor - beds.ac.uk
A professor from the University of Bedfordshire has followed in the footsteps of Indiana Jones by cracking the code of a 600 year old manuscript, deemed as ‘the most mysterious’ document in the world....
Battle of Midway - Video
The Battle of Midway Documentary.
Classical cipher
A cipher is a means of concealing a message, where letters of the message are substituted or transposed for other letters, letter pairs, and sometimes for many letters. In cryptography, a classical ci...
Voynich manuscript
The Voynich manuscript is an illustrated codex hand-written in an unknown writing system. The vellum in the book pages has been carbon-dated to the early 15th century (1404–1438), and may have been co...
Voynich manuscript - Wikipedia
Biuro Szyfrów
The Biuro Szyfrów ([ˈbʲurɔ ˈʂɨfruf], Polish for "Cipher Bureau") was the interwar Polish General Staff's agency charged with both cryptography (the use of ciphers and codes) and cryptology (the study ...
Biuro Szyfrów - Wikipedia
Bletchley Park
Bletchley Park, in Milton Keynes, Buckinghamshire, was the central site of the United Kingdom's Government Code and Cypher School (GC&CS), which during the Second World War regularly penetrated th...
Bletchley Park - Wikipedia
Code talker
Code talkers are people in the 20th century who used obscure languages as a means of secret communication during wartime. The term is now usually associated with the United States soldiers during the ...
Code talker - Wikipedia
Rotor machine
In cryptography, a rotor machine is an electro-mechanical stream cipher device used for encrypting and decrypting secret messages. Rotor machines were the cryptographic state-of-the-art for a prominen...
Rotor machine - Wikipedia
Venona project
The Venona project was a counter-intelligence program initiated by the United States Army Signal Intelligence Service (a forerunner of the National Security Agency) that lasted from 1943 to 1980. The ...
Venona project - Wikipedia
Dutch police 'read' Blackberry emails
A police forensics unit has claimed that it can decrypt messages on locked-down Blackberry handsets.
Japanese cryptology from the 1500s to Meiji
The cipher system that Uesugi used is basically a simple substitution usually known as a Polybius square or “checkerboard.” The i-ro-ha alphabet contains forty-eight letters, so a seven-by-seven squar...
Japanese cryptology from the 1500s to Meiji - Wikipedia
Edward Hebern
Edward Hugh Hebern (April 23, 1869 – February 10, 1952) was an early inventor of rotor machines, devices for encryption.
Edward Hugh Hebern was born in Streator, Illinois on April 23, 1869. ...
Edward Hebern - Wikipedia
Operation Ruthless
Operation Ruthless was the name of a deception operation devised by Ian Fleming in the British Admiralty during World War II, in an attempt to gain access to German Naval Enigma codebooks.
With th...
Mulabhadra
Mūlabhadra was a secret method of communication employed by the royal spies of the erstwhile Travancore Kingdom during the medieval period. The scheme was also colloquially referred to as Mūlapatra. ...
Frank Woodrow O'Flaherty
Frank Woodrow O’Flaherty was born in Tonopah, Nevada, 26 February 1918.
O’Flaherty entered the U.S. Naval Reserve on 25 September 1940 and was appointed Aviation Cadet 27 January 1941. He was comm...
World War II cryptography
Cryptography was used extensively during World War II, with a plethora of code and cipher systems fielded by the nations involved. In addition, the theoretical and practical aspects of cryptanalysis, ...
World War II cryptography - Wikipedia
600 year old mystery manuscript decoded by University of Bedfordshire professor - beds.ac.uk
A professor from the University of Bedfordshire has followed in the footsteps of Indiana Jones by cracking the code of a 600 year old manuscript, deemed as ‘the most mysterious’ document in the world....
Cryptologia
Cryptologia is a journal in cryptography published quarterly since January 1977. Its remit is all aspects of cryptography, but there is a special emphasis on historical aspects of the subject. The fou...
Fenn treasure
The Fenn Treasure is a treasure reportedly worth $1m–$3m hidden by art dealer and writer Forrest Fenn in the Rocky Mountains. According to Fenn, many people have claimed to have found the treasure, bu...
Enigma rotor details
This article contains technical details about the rotors of the Enigma machine.Understanding the way the machine encrypts requires taking into account the current position of each rotor, the ring sett...
Enigma rotor details - Wikipedia