
Crypto is being used by everyone with a digital presence, whether or not they are aware of it. And it's set to move beyond privacy and security issues.
It was the decryption of the Zimmerman Telegram by the British intelligence that helped drum up support for the US declaration of war on Germany during World War I. And Alan Turing’s breaking of the Enigma code — an enciphering machine used by the Germans to send messages securely — helped hasten the end of World War II. In both cases cryptography (or crypto) shaped the way history played out.
Crypto — the art of writing or solving codes — is not just part of history. It continues to influence our present, and is bound to play a big role in defining our future as well.
While in ancient times, crypto seemed to be a tool used mostly for tactical purposes by governments and militaries, with the advent of the internet, it is being used by every individual and organisation with a digital presence, whether or not they are aware of it.
While in ancient times, crypto seemed to be a tool used mostly for tactical purposes by governments and militaries, with the advent of the internet, it is being used by everyone with a digital presence
For probably the first time in modern history, governments do not have the technical ability to eavesdrop on communication between her citizens. Depending on who you are, you can either thank or blame crypto for this
The use of cryptography by states and individuals to protect personal and sensitive information isn’t new. Evidence exists of people using scrambled text to hide information as early as 1600 BC in Mesopotamia. As old as cryptography is cryptanalysis, the science of breaking of ciphers and intercepting data. While popular tales such as the Turning machine breaking Enigma are well documented in books and motion pictures, not much has been written about cryptanalysis. It is, however, as complex and interesting as cryptography itself.
In its simplest form, encryption is quite intuitive. For instance, the ‘Caesar Cipher’ encrypts data by replacing a given letter with a different one, consistently. Say, if the sender of a message replaces each character with a letter four places ahead in the English alphabet (ROT4, as it is called), “Mary had a little lamb” becomes “Qevc leh e pmxxpi peqf.”
For the intended recipient to read the message, they need two pieces of information: one, what kind of cipher the sender is using (Caesar Cipher) and two, the number of cyclical shifts each letter has taken (in this case four). Once the receiver has this information, it is pretty simple to shift back each letter by four places to decipher the original message. A cryptanalyst who wishes to “break” the cipher understands that there are only 26 possibilities for the rotation. The simplest way to break the code would be to compute all 26 combinations and examine which one makes sense.
However, modern day cryptography is (thankfully) not intuitive. Scientists spend many years building algorithms that stand up to scrutiny by the world’s best cryptanalysts
The usage of cryptography is set to move beyond privacy and security issues. The advent of cryptocurrencies may usher in a new way of conducting financial transactions, maintaining ledgers etc.
In addition to making technological advances, cryptography has always attracted interest from governments. From the days of King Louis XIV of France, who had a chief cryptographer (Antoine Rossignol of the Great Cipher fame), states have always attempted to use cryptography to gain tactical and strategic advantages.
The usage of cryptography is set to move beyond privacy and security issues alone. The advent of cryptocurrencies may usher in a new way of conducting financial transactions, maintaining ledgers etc