Ceci est une ancienne révision du document !
The early days of encryption were tied to the art of war. The Roman empire used scytales and lettered leather strips during battle. Other countries utilized various tools to accomplish the same goal. Perhaps the most known use of encryption is the German Enigma Machine. This code was successfully broken by the British. Later the Japanese Purple Code was broken by the Americans. The Axis powers used the encryption devices to coordinate their military forces into early wins during World War II. Yet these machines were broken, and used by the Allies to win the war theaters in Europe and Asia. The early encryption devices were large, complicated, and required a department of staffers to run.
The father of modern mathematical cryptography is Claude E. Shannon. He recognized the binary condition of communications and wrote a paper called “Communication Theory of Secrecy Systems” while working at Bell Labs. IBM then developed a block process encryption to protect its business during the 1970’s. Later on, this was adopted by the United States as the standard and called it the Data Encryption Standard (DES). DES was not broken until 1996 using supercomputers. A more advanced version of DES is now currently being used called Advanced Encryption Standards. This standard is currently being used.
Consequently, the need for encryption is still persistent with the deployment of cloud services. The powerful laptops today and the desire for privacy drive today’s consumer encrypting needs. The first email privacy tool is Phil Zimmerman’s ‘Pretty Good Privacy’. He released the code to the internet where it enabled private communication among individuals. The debate of encryption is a political flashpoint between corporations, individuals, and government regulation.