You are on page 1of 4

The Evolution of Cryptography from Old Concept to Modern Concept

Castillo, John Loyd T.

BS Industrial Security Management 2D


PROF. NAME
Occidental Mindoro State College
SCHOOL ADDRESS
DATE
INTRODUCTION
It has always been necessary to communicate secretly. Steganography's two most popular
applications are in cryptography and covert communication, which both hide the sender's identity
[1]. One instance of steganography is the use of invisible ink that could only be read when
heated. However, cryptography is more widely used and known. A communication is not hidden
when it is encrypted; rather, it is disguised. In order to understand cryptography, certain key
terminology must be defined. The original communication, also referred to as the encrypted
plaintext, is subsequently made visible by the recipient by decrypting the received ciphertext. A
cipher, or cryptosystem, is used to encrypt and decrypt the messages [2]. Typically, a key chosen
by both sender and recipient is utilized. A decryption key is needed to recover the original
message from the ciphertext after the ciphertext has been encrypted [3]. Symmetric/private keys
and asymmetric/public keys are the two types of cipher keys. Both the sender and the recipient
know the key in symmetric key systems, while in public key systems, the encryption key is
known but the decryption key, if it exists, cannot be found since it is computationally impossible
[4]. Both newer and more established symmetric key methods are available. The original
substitution cipher used a large symmetric key structure.

EVOLUTION INFORMATION
When the Internet is not a primary source of information, society strives to create
the services that are required and safeguard the rights of people to their lives, thoughts, and
expression. Online security is frequently linked to concepts like "coding" or "cryptography," as
well as the goal to develop a unique system that allows for secure data access. During World
War II, British experts deciphered the German Enigma code, demonstrating how cryptography
may be used as a military tactic in conjunction with electronic communication technologies (Paar
& Pelzi, 2010). When writing systems were first developing, the Ancient Egyptians made the
earliest attempts to encrypt data.

OLD CONCEPT FROM MODERN CONCEPT


Every century symbolizes a new achievement with the chance to learn from mistakes and
make necessary improvements, as was already mentioned in the discussion of the evolution of
cryptography. Military ciphers from the 1930s were well known, and it was necessary to
decipher them in order to gain the required information. A distinguishing feature of encryption in
the 1930s was the impact of the German Enigma machine. There were numerous attempts to
crack the code, understand German objectives and tactics, and influence the state of the world.
The development of cryptography was influenced by politics and strife, not to develop new
techniques but to undermine those already in use.

CRYPTOGRAPHY METHOD
In the history of cryptography, the transition from mechanical to digital ciphers
represents an important advancement. The mechanical period of cryptography was appropriately
identified when gearing devices were used to encrypt letters and preserve communication during
World War II. Undoubtedly one of the most well-known mechanical technology is the Enigma
machine from the 1920s. Digital encryption techniques gained popularity towards the turn of the
20th century, when electronic data was becoming more common and people wanted to safeguard
their data. In contrast to mechanical encryption, digital encryption systems enable data exchange
through phone networks, the Internet, e-commerce transactions, television, and other media. The
evolution of cryptography methods has made it feasible to bypass some barriers and seize new
opportunities. For instance, whereas mechanical ciphers are rather confined, computerized
ciphers are accessible in a range of difficulty levels (Singht, 2000). The next achievement relates
to speed because creating electronic ciphers requires less time now that much of the labor is
automated. The usage of numbers in messages has completely disappeared thanks to
advancements in digital encryption technology, and they have also demonstrated how binary
numbers can be used (Singh, 2000). These modifications had to be made since the world,
information technology, and the practice of cryptography are all constantly changing, even
though none of them were easy.

CONCLUSION
Numerous unique ciphers and cryptosystems have been employed in the art of
cryptography from the beginning of recorded history. These ciphers and cryptosystems have also
developed Through time, information security methods have changed from being straightforward
and unreliable to those that make use of complex mathematics. Number theory is one of the more
important areas of mathematics that has had an impact on the growth of cryptography. The shift
and Vigenere ciphers, as well as other early ciphers, were created and employed without being
aware that number theory was required for both the encryption and decoding processes. The
RSA and ElGamal systems, among other modern public key cryptosystems, heavily rely on
number theory. These cryptosystems are significantly more secure than their symmetric key
forerunners will eventually make these cryptosystems outdated and insecure. As a result, the
investigation into the understanding the origins, development, and underlying mathematical
concepts of cryptography is essential. additional research to safeguard data, these cryptosystems'
growth and security must be advanced data security, which the cryptosystems are guarding. The
reader is exhorted to conduct further research and make contributions to the ongoing
development of cryptography for secure data. Cryptography consists of two Greek words,
“Kryptos” and “graphics,” meaning “secret writing” When studying the development of
cryptography, it is vital to focus on three key facets: the ancient, technological, and paradoxical.
starting with the oldest time period, the events of 3500 B.C. This resulted in the development of
military cryptography in the 20th century (Udugahapattuwa et al., 2019). According to Singh (2000),
codes have "punctuated throughout history," influencing both battles and people's daily lives (p. x). As
a result, numerous codes and techniques were created in relation to the advancement of civilization as
soon as the need for cryptography was recognized. The concealed hieroglyphics used by the
Egyptians have been adapted in diverse forms by many nations where written language first emerged.
REFERENCES
https://www.gcsu.edu/sites/default/files/documents/2021-06/shores.pdf
https://studycorgi.com/the-evolution-of-cryptography/

You might also like