Recent from talks
Be the first to start a discussion here.
Be the first to start a discussion here.
Be the first to start a discussion here.
Be the first to start a discussion here.
Contribute something
Welcome to the community hub built to collect knowledge and have discussions related to List of cryptographers.
Nothing was collected or created yet.
List of cryptographers
View on Wikipediafrom Wikipedia
This is a list of cryptographers. Cryptography is the practice and study of techniques for secure communication in the presence of third parties called adversaries.
Pre twentieth century
[edit]- Al-Khalil ibn Ahmad al-Farahidi: wrote a (now lost) book on cryptography titled the "Book of Cryptographic Messages".
- Al-Kindi, 9th century Arabic polymath and originator of frequency analysis.
- Athanasius Kircher, attempts to decipher crypted messages
- Augustus the Younger, Duke of Brunswick-Lüneburg, wrote a standard book on cryptography
- Ibn Wahshiyya: published several cipher alphabets that were used to encrypt magic formulas.[1]
- John Dee, wrote an occult book, which in fact was a cover for crypted text
- Ibn 'Adlan: 13th-century cryptographer who made important contributions on the sample size of the frequency analysis.
- Duke of Mantua Francesco I Gonzaga is the one who used the earliest example of homophonic Substitution cipher in the early 1400s.[2][3]
- Ibn al-Durayhim: gave detailed descriptions of eight cipher systems that discussed substitution ciphers, leading to the earliest suggestion of a "tableau" of the kind that two centuries later became known as the "Vigenère table".
- Ahmad al-Qalqashandi: Author of Subh al-a 'sha, a fourteen volume encyclopedia in Arabic, which included a section on cryptology. The list of ciphers in this work included both substitution and transposition, and for the first time, a cipher with multiple substitutions for each plaintext letter.
- Charles Babbage, UK, 19th century mathematician who, about the time of the Crimean War, secretly developed an effective attack against polyalphabetic substitution ciphers.
- Leone Battista Alberti, polymath/universal genius, inventor of polyalphabetic substitution (more specifically, the Alberti cipher), and what may have been the first mechanical encryption aid.
- Giovanni Battista della Porta, author of a seminal work on cryptanalysis.
- Étienne Bazeries, French, military, considered one of the greatest natural cryptanalysts. Best known for developing the "Bazeries Cylinder" and his influential 1901 text Les Chiffres secrets dévoilés ("Secret ciphers unveiled").
- Giovan Battista Bellaso, Italian cryptologist
- Giovanni Fontana (engineer), wrote two encrypted books
- Hildegard of Bingen used her own alphabet to write letters.
- Julius Caesar, Roman general/politician, has the Caesar cipher named after him, and a lost work on cryptography by Probus (probably Valerius Probus) is claimed to have covered his use of military cryptography in some detail. It is likely that he did not invent the cipher named after him, as other substitution ciphers were in use well before his time.
- Friedrich Kasiski, author of the first published attack on the Vigenère cipher, now known as the Kasiski test.
- Auguste Kerckhoffs, known for contributing cipher design principles.
- Edgar Allan Poe, author of the book, A Few Words on Secret Writing, an essay on cryptanalysis, and The Gold Bug, a short story featuring the use of letter frequencies in the solution of a cryptogram.
- Johannes Trithemius, mystic and first to describe tableaux (tables) for use in polyalphabetic substitution. Wrote an early work on steganography and cryptography generally.
- Philips van Marnix, lord of Sint-Aldegonde, deciphered Spanish messages for William the Silent during the Dutch revolt against the Spanish.
- John Wallis codebreaker for Cromwell and Charles II.
- Sir Charles Wheatstone, inventor of the so-called Playfair cipher and general polymath.
World War I and World War II wartime cryptographers
[edit]- François Cartier (1862–1953) French military cryptographer, Head of the Cipher Service of the French Ministry of War during World War I.
- Richard J. Hayes (1902–1976) Irish code breaker in World War II.
- Jean Argles (1925–2023), British code breaker in World War II
- Arne Beurling (1905–1986), Swedish mathematician and cryptographer.
- Lambros D. Callimahos, US, NSA, worked with William F. Friedman, taught NSA cryptanalysts.
- Ann Z. Caracristi, US, SIS, solved Japanese Army codes in World War II, later became deputy director of National Security Agency.
- Alec Naylor Dakin, UK, Hut 4, Bletchley Park during World War II.
- Ludomir Danilewicz, Poland, Biuro Szyfrow, helped to construct the Enigma machine copies to break the ciphers.
- Patricia Davies (born 1923), British code breaker in World War II
- Alastair Denniston, UK, director of the Government Code and Cypher School at Bletchley Park from 1919 to 1942.
- Agnes Meyer Driscoll, US, broke several Japanese ciphers.
- Genevieve Grotjan Feinstein, US, SIS, noticed the pattern that led to breaking Purple.
- Elizebeth Smith Friedman, US, Coast Guard and US Treasury Department cryptographer, co-invented modern cryptography.[4]
- William F. Friedman, US, SIS, introduced statistical methods into cryptography.
- Cecilia Elspeth Giles, UK, Bletchley Park
- Jack Good UK, Government Code and Cypher School, Bletchley Park worked with Alan Turing on the statistical approach to cryptanalysis.
- Nigel de Grey, UK, Room 40, played an important role in the decryption of the Zimmermann Telegram during World War I.
- Dillwyn Knox, UK, Room 40 and Government Code and Cypher School, broke commercial Enigma cipher as used by the Abwehr (German military intelligence).
- Solomon Kullback US, SIS, helped break the Japanese Red cipher, later Chief Scientist at the National Security Agency.
- Frank W. Lewis US, worked with William F. Friedman, puzzle master
- William Hamilton Martin and Bernon F. Mitchell, U.S. National Security Agency cryptologists who defected to the Soviet Union in 1960.
- Leo Marks UK, Special Operations Executive cryptography director, author and playwright.
- Donald Michie UK, Government Code and Cypher School, Bletchley Park worked on Cryptanalysis of the Lorenz cipher and the Colossus computer.
- Consuelo Milner, US, cryptographer for the Naval Applied Science Lab.
- Max Newman, UK, Government Code and Cypher School, Bletchley Park headed the section that developed the Colossus computer for Cryptanalysis of the Lorenz cipher.
- Georges Painvin French, broke the ADFGVX cipher during the First World War.
- Marian Rejewski, Poland, Biuro Szyfrów, a Polish mathematician and cryptologist who, in 1932, solved the Enigma machine with plugboard, the main cipher device then in use by Germany. The first to break the cipher in history.
- John Joseph Rochefort US, made major contributions to the break into JN-25 after the attack on Pearl Harbor.
- Leo Rosen US, SIS, deduced that the Japanese Purple machine was built with stepping switches.
- Frank Rowlett US, SIS, leader of the team that broke Purple.
- Jerzy Różycki, Poland, Biuro Szyfrów, helped break German Enigma ciphers.
- Luigi Sacco, Italy, Italian General and author of the Manual of Cryptography.
- Laurance Safford US, chief cryptographer for the US Navy for 2 decades+, including World War II.
- Abraham Sinkov US, SIS.
- John Tiltman UK, Brigadier, Room 40, Government Code and Cypher School, Bletchley Park, GCHQ, NSA. Extraordinary length and range of cryptographic service
- Alan Mathison Turing UK, Government Code and Cypher School, Bletchley Park where he was chief cryptographer, inventor of the Bombe that was used in decrypting Enigma, mathematician, logician, and renowned pioneer of Computer Science.
- William Thomas Tutte UK, Government Code and Cypher School, Bletchley Park, with John Tiltman, broke Lorenz SZ 40/42 encryption machine (codenamed Tunny) leading to the development of the Colossus computer.
- Betty Webb (code breaker), British codebreaker during World War II
- William Stone Weedon, US,
- Gordon Welchman UK, Government Code and Cypher School, Bletchley Park where he was head of Hut Six (German Army and Air Force Enigma cipher. decryption), made an important contribution to the design of the Bombe.
- Herbert Yardley US, MI8 (US), author "The American Black Chamber", worked in China as a cryptographer and briefly in Canada.
- Henryk Zygalski, Poland, Biuro Szyfrów, inventor of Zygalski sheets, broke German Enigma ciphers pre-1939.
- Karl Stein German, Head of the Division IVa (security of own processes) at Cipher Department of the High Command of the Wehrmacht. Discoverer of Stein manifold.
- Gisbert Hasenjaeger German, Tester of the Enigma. Discovered new proof of the completeness theorem of Kurt Gödel for predicate logic.
- Heinrich Scholz German, Worked in Division IVa at OKW. Logician and pen friend of Alan Turning.
- Gottfried Köthe German, Cryptanalyst at OKW. Mathematician created theory of topological vector spaces.
- Ernst Witt German, Mathematician at OKW. Mathematical Discoveries Named After Ernst Witt.
- Helmut Grunsky German, worked in complex analysis and geometric function theory. He introduced Grunsky's theorem and the Grunsky inequalities.
- Georg Hamel.
- Oswald Teichmüller German, temporarily employed at OKW as cryptanalyst. Introduced quasiconformal mappings and differential geometric methods into complex analysis. Described by Friedrich L. Bauer as an extreme Nazi and a true genius.
- Hans Rohrbach German, Mathematician at AA/Pers Z, the German department of state, civilian diplomatic cryptological agency.
- Wolfgang Franz German, Mathematician who worked at OKW. Later significant discoveries in Topology.
- Werner Weber German, Mathematician at OKW.
- Georg Aumann German, Mathematician at OKW. His doctoral student was Friedrich L. Bauer.
- Otto Leiberich German, Mathematician who worked as a linguist at the Cipher Department of the High Command of the Wehrmacht.
- Alexander Aigner German, Mathematician who worked at OKW.
- Erich Hüttenhain German, Chief cryptanalyst of and led Chi IV (section 4) of the Cipher Department of the High Command of the Wehrmacht. A German mathematician and cryptanalyst who tested a number of German cipher machines and found them to be breakable.
- Wilhelm Fenner German, Chief Cryptologist and Director of Cipher Department of the High Command of the Wehrmacht.
- Walther Fricke German, Worked alongside Dr Erich Hüttenhain at Cipher Department of the High Command of the Wehrmacht. Mathematician, logician, cryptanalyst and linguist.
- Fritz Menzer German. Inventor of SG39 and SG41.
Other pre-computer
[edit]- Rosario Candela, US, Architect and notable amateur cryptologist who authored books and taught classes on the subject to civilians at Hunter College.
- Claude Elwood Shannon, US, founder of information theory, proved the one-time pad to be unbreakable.
Modern
[edit]See also: Category:Modern cryptographers for a more exhaustive list.
Symmetric-key algorithm inventors
[edit]- Ross Anderson, UK, University of Cambridge, co-inventor of the Serpent cipher.
- Paulo S. L. M. Barreto, Brazilian, University of São Paulo, co-inventor of the Whirlpool hash function.
- George Blakley, US, independent inventor of secret sharing.
- Eli Biham, Israel, co-inventor of the Serpent cipher.
- Don Coppersmith, co-inventor of DES and MARS ciphers.
- Joan Daemen, Belgian, Radboud University, co-developer of Rijndael which became the Advanced Encryption Standard (AES), and Keccak which became SHA-3.
- Horst Feistel, German, IBM, namesake of Feistel networks and Lucifer cipher.
- Lars Knudsen, Denmark, co-inventor of the Serpent cipher.
- Ralph Merkle, US, inventor of Merkle trees.
- Bart Preneel, Belgian, KU Leuven, co-inventor of RIPEMD-160.
- Vincent Rijmen, Belgian, KU Leuven, co-developer of Rijndael which became the Advanced Encryption Standard (AES).
- Ronald L. Rivest, US, MIT, inventor of RC cipher series and MD algorithm series.
- Bruce Schneier, US, inventor of Blowfish and co-inventor of Twofish and Threefish.
- Xuejia Lai, CH, co-inventor of International Data Encryption Algorithm (IDEA).
- Adi Shamir, Israel, Weizmann Institute, inventor of secret sharing.
- Walter Tuchman. US. led the Data Encryption Standard development team at IBM and inventor of Triple DES
Asymmetric-key algorithm inventors
[edit]
- Leonard Adleman, US, USC, the 'A' in RSA.
- David Chaum, US, inventor of blind signatures.
- Clifford Cocks, UK GCHQ first inventor of RSA, a fact that remained secret until 1997 and so was unknown to Rivest, Shamir, and Adleman.
- Whitfield Diffie, US, (public) co-inventor of the Diffie-Hellman key-exchange protocol.
- Taher Elgamal, US (born Egyptian), inventor of the Elgamal discrete log cryptosystem.
- Shafi Goldwasser, US and Israel, MIT and Weizmann Institute, co-discoverer of zero-knowledge proofs, and of Semantic security.
- Martin Hellman, US, (public) co-inventor of the Diffie-Hellman key-exchange protocol.
- Neal Koblitz, independent co-creator of elliptic curve cryptography.
- Alfred Menezes, co-inventor of MQV, an elliptic curve technique.
- Silvio Micali, US (born Italian), MIT, co-discoverer of zero-knowledge proofs, and of Semantic security.
- Victor Miller, independent co-creator of elliptic curve cryptography.
- David Naccache, inventor of the Naccache–Stern cryptosystem and of the Naccache–Stern knapsack cryptosystem.
- Moni Naor, co-inventor the Naor–Yung encryption paradigm for CCA security.
- Rafail Ostrovsky, co-inventor of Oblivious RAM, of single-server Private Information Retrieval, and proactive cryptosystems.
- Pascal Paillier, inventor of Paillier encryption.
- Michael O. Rabin, Israel, inventor of Rabin encryption.
- Ronald L. Rivest, US, MIT, the 'R' in RSA.
- Adi Shamir, Israel, Weizmann Institute, the 'S' in RSA.
- Victor Shoup, US, NYU Courant, co-inventor of the Cramer-Shoup cryptosystem.
- Moti Yung, co-inventor of the Naor–Yung encryption paradigm for CCA security, of threshold cryptosystems, and proactive cryptosystems.
Cryptanalysts
[edit]- Joan Clarke, English cryptanalyst and numismatist best known for her work as a code-breaker at Bletchley Park during the Second World War.
- Ross Anderson, UK.
- Eli Biham, Israel, co-discoverer of differential cryptanalysis and Related-key attack.
- Matt Blaze, US.
- Dan Boneh, US, Stanford University.
- Niels Ferguson, Netherlands, co-inventor of Twofish and Fortuna.
- Ian Goldberg, Canada, University of Waterloo.
- Lars Knudsen, Denmark, DTU, discovered integral cryptanalysis.
- Paul Kocher, US, discovered differential power analysis.
- Mitsuru Matsui, Japan, discoverer of linear cryptanalysis.
- Kenny Paterson, UK, previously Royal Holloway, now ETH Zurich, known for several attacks on cryptosystems.
- David Wagner, US, UC Berkeley, co-discoverer of the slide and boomerang attacks.
- Xiaoyun Wang, the People's Republic of China, known for MD5 and SHA-1 hash function attacks.
- Alex Biryukov, University of Luxembourg, known for impossible differential cryptanalysis and slide attack.
- Moti Yung, Kleptography.
- Bill Buchanan, creator of ASecuritySite - one of the most comprehensive cryptography website in the World.[5]
Algorithmic number theorists
[edit]- Daniel J. Bernstein, US, developed several popular algorithms, fought US government restrictions in Bernstein v. United States.
- Don Coppersmith, US.
- Dorian M. Goldfeld, US, Along with Michael Anshel and Iris Anshel invented the Anshel–Anshel–Goldfeld key exchange and the Algebraic Eraser. They also helped found Braid Group Cryptography.
- Victor Shoup, US, NYU Courant.
Theoreticians
[edit]- Mihir Bellare, US, UCSD, co-proposer of the Random oracle model.
- Dan Boneh, US, Stanford.
- Gilles Brassard, Canada, Université de Montréal. Co-inventor of quantum cryptography.
- Claude Crépeau, Canada, McGill University.
- Oded Goldreich, Israel, Weizmann Institute, author of Foundations of Cryptography.
- Shafi Goldwasser, US and Israel.
- Silvio Micali, US, MIT.
- Rafail Ostrovsky, US, UCLA.
- Charles Rackoff, co-discoverer of zero-knowledge proofs.
- Oded Regev, inventor of learning with errors.
- Phillip Rogaway, US, UC Davis, co-proposer of the Random oracle model.
- Amit Sahai, US, UCLA.
- Victor Shoup, US, NYU Courant.
- Gustavus Simmons, US, Sandia, authentication theory.
- Moti Yung, US, Google.
Government cryptographers
[edit]- Clifford Cocks, UK, GCHQ, secret inventor of the algorithm later known as RSA.
- James H. Ellis, UK, GCHQ, secretly proved the possibility of asymmetric encryption.
- Lowell Frazer, US, National Security Agency
- Laura Holmes, US, National Security Agency
- Julia Wetzel, US, National Security Agency
- Malcolm Williamson, UK, GCHQ, secret inventor of the protocol later known as the Diffie–Hellman key exchange.
Cryptographer businesspeople
[edit]- Bruce Schneier, US, CTO and founder of Counterpane Internet Security, Inc. and cryptography author.
- Scott Vanstone, Canada, founder of Certicom and elliptic curve cryptography proponent.
See also
[edit]References
[edit]- ^ Whitman and Mattord (2010). Principles of Information Security (4th ed.). Course Technology. p. 351. ISBN 978-1111138219.
- ^ David Salomon. Coding for Data and Computer Communications. Springer, 2005.
- ^ Fred A. Stahl. "A homophonic cipher for computational cryptography" Proceedings of the national computer conference and exposition (AFIPS '73), pp. 123–126, New York City, 1973.
- ^ Worrall, Simon (7 October 2017). "This Woman Saved the Americas From the Nazis". National Geographic. Archived from the original on 7 October 2017. Retrieved 1 April 2018.
- ^ Buchanan, Bill. "ASecuritySite". ASecuritySite.
External links
[edit]Look up cryptographer in Wiktionary, the free dictionary.
List of cryptographers
View on Grokipediafrom Grokipedia
A list of cryptographers catalogs individuals who have advanced the field of cryptography, defined as the science of securing information through encoding techniques that prevent unauthorized access while enabling legitimate recovery.[1] Cryptography encompasses both the creation of encryption methods and their mathematical analysis, often drawing on number theory, algebra, and computational complexity to withstand adversarial attacks.[2] Throughout history, cryptographers have influenced military outcomes, such as Allied code-breaking efforts in World War II that provided decisive intelligence advantages, and modern digital infrastructure, including protocols underpinning secure online transactions and data protection.[3] This compilation highlights pioneers whose empirical innovations and theoretical breakthroughs have demonstrably enhanced causal chains of secure information flow, from ancient ciphers to contemporary quantum-resistant algorithms.[4]
Pre-Modern Cryptographers (Before 1900)
Ancient and Classical Era Cryptographers
Aeneas Tacticus, a Greek military author active in the 4th century BC, provided the earliest known systematic descriptions of cryptographic techniques for securing military communications. In his treatise On the Defense of Fortified Positions (Πολιόρκητικά), particularly chapter 31, he outlined methods including substitution ciphers, where letters were replaced by numbers or symbols; steganography, such as hiding messages under wax on wooden tablets; and signaling systems using torches or flags to convey encoded information without interception.[5] [6] These approaches emphasized practical defense against espionage during sieges, reflecting the era's focus on transposition and concealment over complex substitution.[7] The Spartan military employed the scytale, a transposition cipher using a cylindrical baton wrapped with parchment or leather inscribed with a message in a spiral pattern, dating to at least the 5th century BC and possibly earlier.[8] Described by Herodotus in his Histories as a tool for secure orders during campaigns, such as those under Lysander in the Peloponnesian War (431–404 BC), the device required a matching baton diameter for decryption, rendering intercepted messages illegible without it.[8] This method's simplicity suited rapid field use but offered limited security against physical capture of the key tool.[9] Cleoxenus and Democleitus, ancient Greek inventors credited in historical accounts from the 3rd–2nd centuries BC, developed a 5x5 grid system for encoding messages into numeric pairs, later known as the Polybius square after its documentation by the historian Polybius (c. 200–118 BC).[10] Polybius adapted this for hydraulic semaphore signaling with torches, dividing the alphabet into coordinates (e.g., 1-1 for alpha) to transmit information efficiently over distances, as detailed in his Histories Book X.[10] While primarily for visual communication, the grid enabled substitution-based secrecy, influencing later ciphers by reducing messages to numerical sequences resistant to casual reading.[11] Julius Caesar (100–44 BC), Roman general and statesman, utilized a monoalphabetic substitution cipher shifting plaintext letters by three positions (e.g., A to D) for confidential military dispatches, as recorded by Suetonius in The Twelve Caesars.[4] This "Caesar cipher" facilitated secure orders to legions during the Gallic Wars (58–50 BC) and civil conflicts, with variations possibly employing different shifts; its strength relied on the secrecy of the fixed offset, though it remained vulnerable to frequency analysis given Latin's letter distributions.[8] No other named Roman cryptographers from this era are prominently attested, underscoring cryptography's ad hoc military application rather than formalized theory.[12]Medieval and Renaissance Cryptographers
Al-Kindi (c. 801–873), an Arab polymath during the Islamic Golden Age, is credited with developing the first systematic method of cryptanalysis, including frequency analysis, which involves tallying letter occurrences in ciphertext to match against known plaintext frequencies for decryption.[13] His treatise Risalah fi'l-rumuz (Manuscript on Deciphering Cryptographic Messages) outlined techniques for breaking monoalphabetic substitution ciphers, marking a foundational advance in understanding linguistic patterns for codebreaking.[14] This empirical approach relied on statistical probabilities derived from Arabic texts, such as the Quran, to identify common letters like alif and lam.[15] In the Renaissance, European cryptography advanced amid diplomatic and military needs, particularly in Italian city-states like Venice, where professional codebreakers emerged as state functionaries.[16] Leon Battista Alberti (1404–1472), an Italian architect and scholar, invented the first polyalphabetic cipher in 1467, using a rotating disk with two alphabets to vary substitutions and evade frequency analysis.[17] Described in De Cifris, his system employed a movable index and mixed alphabets (one standard, one with numerals and symbols), allowing key-driven shifts that produced ciphertext resistant to simple statistical attacks.[18] Johannes Trithemius (1462–1516), a German abbot, authored Polygraphia (published 1518), the first printed book on cryptography, detailing progressive ciphers where each letter shifts by an increasing amount (e.g., +1 for the first, +2 for the second).[19] His work also covered steganography in Steganographia (c. 1499), blending occult themes with practical concealment methods, influencing later tabular ciphers.[20] Giovan Battista Bellaso (1505–1578), an Italian, introduced a keyed polyalphabetic cipher in 1553's La cifra del. Sig. Giovan Battista Bellaso, using a passphrase to select rows from an alphabet tableau, generating unique substitutions per position.[21] This autokey-like variant, predating similar claims, enhanced security by personalizing the cipher wheel against unauthorized decryption.[22] Blaise de Vigenère (1523–1596), a French diplomat, refined polyalphabetic techniques in 1586's Traicté des Chiffres, describing an autokey cipher where the plaintext itself extends the key stream, and promoting tableau-based encryption misattributed to him as the "Vigenère cipher."[23] His contributions emphasized practical diplomatic use, building on Italian precedents to counter emerging cryptanalytic threats.[24]17th to 19th Century Cryptographers
- Antoine Rossignol (c. 1600–1682) was a French cryptographer who gained prominence by deciphering intercepted Huguenot messages during the 1626 siege of Réalmont, using frequency analysis on a homophonic cipher, which impressed Cardinal Richelieu and led to his appointment as royal cryptographer.[25] He served under Louis XIII and later Louis XIV, establishing the Cabinet noir for intercepting and decoding diplomatic correspondence.[26] Collaborating with his son Bonaventure, Rossignol devised the Grand Chiffre, a complex homophonic substitution cipher employing over 500 symbols with variable encodings to obscure letter frequencies, which protected French state secrets for over two centuries until its solution in 1893.[25]
- Bonaventure Rossignol (died 1701), son of Antoine, continued the family legacy as chief cryptographer to Louis XIV, refining the Grand Chiffre into a system resistant to contemporary attacks by incorporating digraphs, trigraphs, and nulls alongside monosyllabic substitutions.[25] Their work emphasized practical state security, with Bonaventure managing decryption operations that influenced French military and diplomatic decisions.
- John Wallis (1616–1703), English mathematician and Savilian Professor of Geometry at Oxford, served as chief codebreaker for Parliament during the English Civil War (1642–1651), intercepting and solving Royalist ciphers, including those of James II, using systematic frequency analysis and pattern recognition on substitution and polyalphabetic systems.[27] Post-Restoration, he continued cryptanalytic work for the crown until 1689, pioneering methods like estimating message lengths from probable words and advocating variable keys for enhanced security, though he published little on cryptography due to its classified nature.[28]
- Thomas Jefferson (1743–1826) invented the wheel cipher, or Jefferson disk, in the early 1790s—a mechanical device comprising 36 wooden wheels, each inscribed with a randomized alphabet, allowing polyalphabetic encryption by aligning plaintext on one index line and reading ciphertext from another.[29] Designed for diplomatic use, it supported keys via wheel permutations and resisted frequency analysis through its 26^26 possible configurations, predating similar devices like the U.S. M-94 adopted in 1922; Jefferson described it in notes dated before March 1802 but did not deploy it widely.[30]
- Charles Babbage (1791–1871), British mathematician and inventor of the analytical engine, independently solved the Vigenère polyalphabetic cipher around 1854 during the Crimean War era by identifying repeated sequences to deduce key lengths, employing statistical methods and cribs without publishing details, which delayed formal recognition until later confirmations.[31] His unpublished cryptanalytic insights, applied to intercepted diplomatic messages, demonstrated the vulnerability of repeating-key systems to length analysis, influencing subsequent theoretical advances.
- Friedrich Kasiski (1805–1881), Prussian military officer and cryptographer, published Die Geheimschriften und die Dechiffrir-Kunst in 1863, introducing the Kasiski examination—a method to break polyalphabetic ciphers like Vigenère by detecting repeated trigram or longer sequences in ciphertext, whose distances reveal key length via greatest common divisors, enabling subsequent single-alphabet frequency attacks.[32] This systematic approach marked a shift toward probabilistic cryptanalysis, effective against keyword-based encryptions with periods under 20, though limited against short or non-repeating keys.[33]
Early 20th Century Cryptographers
Pre-World War I Cryptographers
Parker Hitt (1871–1955), a U.S. Army officer, conducted early systematic cryptanalysis for the American military, including solving encrypted Mexican diplomatic messages during his service in the Philippines from 1900 to 1906 and later at Fort Leavenworth from 1911 onward.[34] He authored the U.S. Army's first manual on codes and ciphers, establishing foundational practices amid limited institutional support for cryptology prior to sustained wartime efforts.[34] François Cartier (1862–1953), a French military officer, served on official commissions evaluating cryptographic systems in the late 19th and early 20th centuries, contributing to France's prewar cipher security as head of the army's cryptographic bureau by 1914.[35] His work emphasized practical military applications, bridging manual cipher traditions with emerging needs for secure field communications.[36] Ernst Fetterlein (1873–1945), a Russian cryptanalyst in the Ministry of Foreign Affairs from 1896, specialized in breaking German, Austrian, and British diplomatic codes through frequency analysis and pattern recognition before 1914. His prewar successes informed Russia's early wartime intelligence advantages, relying on empirical reconstruction of codebooks without mechanical aids.World War I Cryptographers
Georges Painvin, a French Army captain and geologist, led the cryptanalysis of the German ADFGVX field cipher introduced on March 1, 1918, solving the first key on April 5, 1918, and achieving a full break by early June, which yielded intelligence on German troop movements during the Second Battle of the Marne.[37][38] Fritz Nebel, a German radio staff officer, invented the ADFGVX cipher in 1918 as a fractionating transposition system to secure mobile army communications, replacing earlier ADFGX variants amid increasing Allied intercepts.[39] In Britain, Room 40 of the Admiralty conducted naval cryptanalysis; Nigel de Grey and William Montgomery decrypted the Zimmermann Telegram on January 16, 1917, exposing German proposals for a Mexican alliance against the U.S., which influenced American entry into the war on April 6, 1917.[40] Alfred Dillwyn Knox contributed to breaking German naval and diplomatic codes in Room 40, applying classical scholarship to pattern recognition in ciphers.[41] Herbert O. Yardley, commissioned as a U.S. Army second lieutenant on June 29, 1917, headed Military Intelligence Section 8 (MI-8), directing the decryption of over 10,000 German diplomatic messages and observing Allied methods in Europe during the war's final months.[42][43] Elizebeth S. Friedman and William F. Friedman, working for the U.S. government from 1917, pioneered statistical cryptanalysis techniques applied to German codes, training cryptologists and establishing foundational methods for frequency analysis in machine-era signals intelligence.[44][45]Interwar Period Cryptographers
Herbert O. Yardley (1889–1958) directed the United States' Cipher Bureau, known as the Black Chamber, from its establishment in 1919 until its disbandment in 1929, where his team decrypted thousands of foreign diplomatic messages, including Japanese codes during the Washington Naval Conference of 1921–1922.[46] The organization collaborated with the State Department to intercept and analyze cable traffic, revealing sensitive negotiations and espionage activities, though it was shut down amid budget cuts and privacy concerns under Secretary Henry Stimson.[46] William F. Friedman (1891–1969), working for the U.S. Army's Signal Intelligence Service after 1930, advanced cryptanalytic techniques and machine-based methods during the interwar years, including authorship of key textbooks on cryptanalysis and leadership in developing the organizational framework for military codebreaking that persisted into World War II.[47] Friedman's efforts emphasized the shift toward rotor machines and complex algorithms, recognizing their growing role in cryptography by the mid-1930s.[48] In Poland, the Cipher Bureau (Biuro Szyfrów), formed in 1919, employed mathematicians Marian Rejewski (1906–1980), Jerzy Różycki (1909–1942), and Henryk Zygalski (1906–1978), who achieved the first breaks into the German Enigma machine in December 1932 using mathematical permutation analysis and limited message intercepts.[49] Their interwar innovations, including cyclometer devices and perforated sheets for rapid decryption, enabled ongoing recovery of daily Enigma settings until 1939, providing critical intelligence during the Polish-Soviet War of 1919–1920 and against German threats.[50] Gilbert Vernam (1890–1960) patented an electrical multiplexing system in 1919 that evolved into the one-time pad cipher when combined with random keys, offering theoretical perfect secrecy as later formalized, though practical implementation lagged until wartime applications.[51] Edward Hebern (1868–1952) developed one of the first rotor-based cipher machines in the early 1920s, patenting a device in 1922 that used rotating disks to substitute letters, influencing subsequent electromechanical designs like Enigma despite commercial failures.World War II Cryptographers
Cryptosystem Designers
Fritz Menzer (1908–2005), a German cryptologist in the Wehrmacht's signals intelligence agency (In 7/VI), designed the Schlüsselgerät 41 (SG-41), a portable, hand-cranked rotor-based cipher machine introduced in 1941 for secure tactical communications as a less complex alternative to the Enigma.[52] [53] The SG-41 featured 11 rotors and produced a 10-to-1 substitution, with production reaching approximately 5,000 units by 1944 for army field use. Menzer also contributed to evaluations and modifications of captured foreign devices, such as Swedish B-21 machines, informing German designs.[54] Kazuo Tanabe served as chief designer of Japan's Type B Cipher Machine (U.S. codenamed Purple), an electromechanical stepping-switch system deployed by the Foreign Ministry from 1939 for diplomatic traffic, succeeding the weaker Type A (Red).[55] Engineers Masaji Yamamoto and Eikichi Suzuki assisted, incorporating 25-position switches to mimic rotor stepping and address Red's vulnerabilities, with over 300 units built by war's end. Purple encrypted 5-bit International Telegraph Alphabet No. 2 code, using 6 telephone-type selectors for key generation, though its design flaws enabled U.S. cryptanalytic recovery by 1940. Oswyn George William Lywood, a Royal Air Force Wing Commander, led the development of the British Typex rotor machine in 1934, which entered widespread military service by 1939 with variants like Mk VI for high-security use.[56] Collaborators included Flight Lieutenant Coulson, E.W. Smith, and Sergeant Albert Lemon; the machine employed five or six rotors (unlike Enigma's three), a reflecting plugboard, and power drive, producing output on paper tape.[57] Over 10,000 Typex units were manufactured during the war, securing Allied communications until the 1950s.[58] In the United States, the SIGABA (ECM Mark II) rotor cipher machine, adopted by Army and Navy in 1940, was developed by the Signal Intelligence Service under William F. Friedman, with key input from Frank Rowlett; it featured 15 rotors in two independent banks for irregular stepping, ensuring resistance to known attacks.[59] [60] The design originated from 1930s prototypes, with final implementation using 10 cipher rotors and 5 control rotors, encrypting teletype traffic; no breaks occurred during wartime use despite intensive Axis efforts.[61]Cryptanalysts and Codebreakers
Cryptanalysts and codebreakers during World War II focused on decrypting Axis cipher systems, such as the German Enigma and Japanese Purple machines, yielding intelligence like Ultra that shortened the war by an estimated two years through Allied naval and air successes.[62][60] Their work relied on mathematical innovations, captured materials, and electromechanical aids, often under secrecy oaths that delayed public recognition until the 1970s.- Marian Rejewski, Jerzy Różycki, and Henryk Zygalski, Polish mathematicians recruited by the Cipher Bureau in 1929, exploited Enigma's message protocols and built cyclometer devices to deduce rotor wirings by late 1932, achieving routine breaks until German changes in 1938; they delivered Enigma replicas and algorithms to British and French allies on July 26, 1939, enabling wartime continuations.[49][63]
- Alan Turing, a British mathematician at Bletchley Park's Hut 8 from 1939, refined Polish methods and designed the electromechanical Bombe (first operational March 1940) to test Enigma wheel settings against cribs—known plaintexts—breaking U-boat traffic by May 1941 and four-rotor naval variants by December 1942.[62][64]
- Gordon Welchman, head of Bletchley Park's Hut 6 (air and army Enigma) from 1939, enhanced the Bombe with a "Welchman diagonal board" for logical deductions from traffic analysis, processing up to 39,000 messages monthly by 1943 and coordinating with RAF Bomber Command.[65][66]
- Dilly Knox, a veteran Admiralty cryptanalyst, manually broke early Enigma variants using captured keys and "pinch" methods pre-1939, contributing to Abwehr breaks in 1940 despite health decline.[65]
- Hugh Alexander, succeeding Turing in Hut 8 by 1943, optimized procedures for three- and four-rotor Enigma, achieving 90% daily breaks by war's end through statistical cribbing and shift management.[65]
- William Friedman, chief of the U.S. Army's Signals Intelligence Service from 1930, directed the cryptanalytic attack on Japan's Type B (Purple) diplomatic machine, with team successes in recovering stepping mechanisms by August 1940 and full breaks by September, decrypting 10,000 messages annually via analog computers.[67][68]
- Frank Rowlett, Friedman's deputy, led the Purple solution team from 1939, exploiting recovered plaintext and machine recoveries to reconstruct the stepping cam and plugboard equivalents by mid-1940, informing U.S. diplomacy pre-Pearl Harbor.[69]
Mid-20th Century Cryptographers (1945-1970)
Government and Military Cryptographers
William F. Friedman (1891–1969), a pioneering U.S. Army cryptologist, directed cryptographic research and development for the Armed Forces Security Agency and its successor, the National Security Agency (NSA), from 1949 until his retirement in 1955 due to health issues.[70] His post-World War II efforts focused on advancing secure communications systems and training cryptanalysts to counter Soviet encryption techniques amid escalating Cold War tensions.[71] Ann Z. Caracristi (1918–2011) served as a cryptanalyst at the NSA from its inception in 1952 through the 1960s, specializing in the exploitation of Soviet diplomatic and military communications.[72] Recruited from wartime service at Arlington Hall, she led teams that applied manual and early computational methods to break high-level cipher systems, contributing to U.S. signals intelligence successes in monitoring communist bloc activities during the Korean War and beyond.[73] Dorothy "Dottie" Toplitzky Blum (1924–1980) worked as a cryptanalyst and computer specialist at the NSA from 1944 into the 1970s, pioneering the integration of electronic computers for codebreaking tasks in the 1950s and 1960s.[74] Her innovations in automating cryptanalytic processes supported military intelligence operations, including the analysis of encrypted signals from adversarial states, and she advanced from code clerk to senior technical roles by 1960.[74] Frank B. Austin (1916–2000), an Army Signal Corps officer, led cryptanalytic teams at Arlington Hall and later NSA facilities from the late 1940s through the 1960s, focusing on traffic analysis and machine-aided decryption of foreign military codes.[75] His work emphasized defensive cryptography, developing safeguards against interception that informed U.S. military doctrine during early Cold War conflicts.[75] William H. Martin (1931–2016) and Bernon S. Mitchell (1929–2001), mathematicians employed as NSA cryptologists in the 1950s, conducted advanced theoretical cryptanalysis on Soviet systems until their defection to the USSR in June 1960. Their expertise in high-level mathematics enabled breakthroughs in evaluating encryption vulnerabilities, though their subsequent revelations compromised U.S. capabilities and prompted internal security reforms at NSA.[76]Academic and Theoretical Contributors
Claude Elwood Shannon (1916–2001), an American mathematician and electrical engineer at Bell Laboratories, laid the mathematical foundations of modern cryptography by applying information theory to secrecy systems.[12] In a classified 1945 memorandum followed by his declassified 1949 publication "Communication Theory of Secrecy Systems" in the Bell System Technical Journal, Shannon defined perfect secrecy as a condition where the posterior probability distribution of the plaintext given the ciphertext equals the prior distribution, rendering the ciphertext statistically independent of the plaintext.[77] He proved that perfect secrecy requires the key space to be at least as large as the message space, achievable via a one-time pad with a truly random key of equal length to the message, which an adversary cannot distinguish from random noise without the key.[78] Shannon further quantified practical security limits through the concept of unicity distance, calculated as the ratio of the key length to the redundancy rate of the language (approximately 1.3 bits per letter in English), indicating the minimum ciphertext length needed for cryptanalytic uniqueness of the key.[12] His analysis extended to product and source ciphers, showing that secrecy degrades with reuse or predictable patterns, and emphasized entropy as a measure of uncertainty in cryptosystems.[77] These information-theoretic bounds established absolute theoretical limits on secure communication, independent of computational assumptions, and demonstrated that no system shorter than a one-time pad can guarantee unconditional security against an eavesdropper with unlimited resources.[78] Beyond Shannon, academic and theoretical advancements in cryptography during 1945–1970 were sparse, as research remained dominated by classified government efforts amid Cold War secrecy constraints, with limited public dissemination until the 1970s.[12] Shannon's framework influenced isolated studies, such as early explorations of error-correcting codes intersecting with secure coding, but no comparable theoretical paradigms emerged from universities in this era, reflecting the field's institutional silos.[12] His work bridged communication theory and secrecy, enabling later probabilistic models, though practical implementations awaited computational maturity.[77]Modern Cryptographers (1970-Present)
Public-Key and Asymmetric Cryptography Pioneers
Public-key cryptography, a cornerstone of modern asymmetric encryption systems, enables secure key exchange and digital signatures without requiring parties to share secret keys in advance, fundamentally addressing limitations in symmetric cryptography for open networks. The field's conceptual origins trace to 1970, when James H. Ellis at the British Government Communications Headquarters (GCHQ) proposed "non-secret encryption" as a theoretical framework for public dissemination of encryption keys while retaining decryption secrecy, though practical implementation eluded him and the work remained classified until 1997. Building on Ellis's vision, Clifford Cocks at GCHQ devised a viable asymmetric scheme in 1973, equivalent to the later RSA algorithm, using large prime factorization difficulty for security; this too stayed secret until declassification in 1997.[79] Malcolm Williamson, also at GCHQ, independently developed a key agreement protocol in 1974 analogous to Diffie-Hellman, leveraging discrete logarithm problems, further advancing the classified foundations before public disclosure decades later.[79] In the United States, Whitfield Diffie and Martin Hellman publicly introduced the paradigm in their 1976 paper "New Directions in Cryptography," proposing the Diffie-Hellman key exchange protocol, which allows two parties to compute a shared secret over an insecure channel using modular exponentiation and the hardness of the discrete logarithm problem.[80] Their work, published on November 1, 1976, explicitly outlined public-key distribution systems and one-way functions, earning them the 2015 ACM Turing Award for foundational contributions to secure communications.[81] Ralph Merkle, a University of California, Berkeley student, concurrently advanced related ideas through his 1974 invention of Merkle Puzzles—a probabilistic key exchange precursor—and later trapdoor knapsack functions for public-key encryption, recognized as co-inventing core public-key concepts alongside Diffie and Hellman.[82] The RSA cryptosystem, named after its inventors Ron Rivest, Adi Shamir, and Leonard Adleman, emerged in 1977 from MIT, providing a practical public-key encryption and signature scheme based on the integer factorization problem: users generate key pairs where encryption uses the public modulus (product of two large primes) and exponent, while decryption relies on the private factorization knowledge.[83] Rivest conceived the approach on April 4, 1977, with Shamir and Adleman refining it; they patented it on September 20, 1983 (U.S. Patent 4,405,829), enabling widespread applications in secure data transmission.[84] These American innovations, unburdened by classification, spurred rapid adoption and commercialization, contrasting with the delayed impact of GCHQ's earlier but undisclosed breakthroughs.[82]Symmetric-Key and Block Cipher Developers
Cryptographers specializing in symmetric-key and block cipher development post-1970 focused on creating algorithms that process data in fixed-length blocks using a shared secret key, emphasizing security against emerging cryptanalytic attacks while balancing efficiency for practical deployment. These efforts built on Feistel networks and substitution-permutation paradigms, leading to standards like DES and AES that underpin secure communications, data storage, and financial systems worldwide. Key innovations addressed vulnerabilities in earlier ciphers, incorporating larger key sizes, resistance to differential and linear cryptanalysis, and adaptability to hardware constraints.[85]- Horst Feistel (1915–1990): German-American cryptographer at IBM who invented the Feistel network structure in the late 1960s and early 1970s, enabling reversible block ciphers without needing distinct decryption functions; his Lucifer cipher, developed around 1971, served as the prototype for DES after modifications by IBM and NSA review.[85][86]
- Joan Daemen (born 1965) and Vincent Rijmen (born 1970): Belgian cryptographers who designed Rijndael in 1998, a substitution-permutation network block cipher with 128-bit blocks and variable key lengths up to 256 bits; selected by NIST as the AES standard in 2001 after a multi-year competition evaluating security margins and performance across platforms.[87][88]
- Bruce Schneier (born 1963): American cryptographer who created Blowfish in 1993, a 64-bit block Feistel cipher with variable key lengths up to 448 bits, featuring key-dependent S-boxes for resistance to known attacks and free licensing to promote adoption in software like SSH; later led the Twofish team, an AES finalist in 1998 using a 128-bit block with advanced key scheduling and pseudorandom permutations.[89][90]
- Xuejia Lai and James Massey (1934–2013): Swiss cryptographers who developed IDEA in 1991, a 64-bit block cipher employing the Lai-Massey scheme with 128-bit keys, combining addition, XOR, and multiplication operations for proven security against differential cryptanalysis at the time; initially proposed as PES and refined for commercial use in protocols like early PGP.[91][92]
- Ross Anderson (born 1956), Eli Biham (born 1960), and Lars Knudsen (born 1962): International team who designed Serpent in 1998, a 128-bit block cipher with up to 256-bit keys using a narrow-pipe Feistel-like structure with 32 rounds and conservative S-boxes derived from DES; ranked second in the AES competition for its high security margin against brute-force and analytical attacks, prioritizing long-term robustness over speed.[93][94]
