Author

Topic: [Information] Ancient Cryptography (Read 268 times)

hero member
Activity: 1806
Merit: 672
September 22, 2020, 06:28:36 PM
#7
Cryptography wasn't the only thing people use to hide message in ancient times, I also recall that during these time as well steganography was also used. Steganography is simply hiding an information by putting it on other content like books, songs, or art basically hiding these messages in plain sight that only the other person who was meant to read it will be the one to understand it.  Both Steganography and Cryptography I think during that time was used since privacy and safety was really important during that time that's why they have created various techniques on hiding information.
full member
Activity: 686
Merit: 125
September 22, 2020, 05:12:11 PM
#6
I also have one which we used in boy scouts  Cheesy

Germanikus
1234567890

Example:

Quote
Me love you long time BTC!

Encrypted:

Quote
42 lov2 yo9 lo61 t742 BTC

A bit too easy to crack from this postion, but it was awesome when I was a kid Cheesy
You sure have a great time when you are in boys scouts.

Yeah it looks really fun for the kids to break down codes given to them or message that is being encrypted by codes and let them crack it as their challenge. This is fun to watch especially in doing some adventure, trecking and other fun activitiew giving instructions through codes.

I think of some use of this one to be applied in my kids at home so that they will.not get bored too tha instead of bringing them to nice place, we can do it in our home. Nice share info.
legendary
Activity: 3346
Merit: 3130
September 22, 2020, 04:14:27 PM
#5
Great article mate. And it's important to mention, one of the main uses the cryptography has was for the war. In the first and second world war the armies need a way to send messages in a secure way, and cryptography was the right way to do it. That was why it gets to the complexity we see today with the sha* and other cryptosystems.
sr. member
Activity: 378
Merit: 335
https://t.me/CRYPTOVlKING
September 22, 2020, 01:05:45 AM
#4
I also have one which we used in boy scouts  Cheesy

Germanikus
1234567890

Example:

Quote
Me love you long time BTC!

Encrypted:

Quote
42 lov2 yo9 lo61 t742 BTC

A bit too easy to crack from this postion, but it was awesome when I was a kid Cheesy
full member
Activity: 868
Merit: 185
Roobet supporter and player!
September 21, 2020, 02:34:31 AM
#3
Actually I already made this cipher information. Here is the link where I also posted it in this section, https://bitcointalksearch.org/topic/m.54464190

Anyway, it is good that you become interested about Ancient Cryptography or Ciphers. It may unlock our own knowledge about how can we hid and secure our passwords against a potential hacking. In this case, we can make a more secured password that cannot break easily. Imagine, if you can encrypt a certain message into different ciphers then no one can easily break it. But, cipher is easily be broken in our generation due to the fact that they can be easily decrypted using digital apps. That is why hashes are more secured and used in cryptocurrency because hash are more safe and unbreakable algorithms.
legendary
Activity: 3024
Merit: 2148
September 20, 2020, 12:52:30 PM
#2
I’ve been interested in reading about cryptocurrency and want to learn cryptography but it’s too complicated for me to learn the cryptography especially the algorithms and the other terms that is unfamiliar for me, so I started in the beginning of cryptography which is the ancient times and it’s very interesting and very easy to understand, so I just want to share the things that I discover and it might interest the newbies and other members to read and learn about cryptography.

You can continue learning about cryptography by learning how to break these historical ciphers. I suggest you to check cryptopals, their first chapters teaches you how to do it without holding your hand all the time, so you can actually learn by solving the problem. And the following chapters will teach you about modern cryptography.
sr. member
Activity: 1204
Merit: 388
September 18, 2020, 12:12:56 PM
#1
I’ve been interested in reading about cryptocurrency and want to learn cryptography but it’s too complicated for me to learn the cryptography especially the algorithms and the other terms that is unfamiliar for me, so I started in the beginning of cryptography which is the ancient times and it’s very interesting and very easy to understand, so I just want to share the things that I discover and it might interest the newbies and other members to read and learn about cryptography.


Cryptography
  • The word cryptography is comes from two Greek words, “kryptos” which means hidden and “graphien” which means writing.
  • During ancient times cryptography is commonly associated with the word encryption or a method of protecting information through the use of codes or ciphers, or it is a process of converting a normal letters, texts, or numbers into an unintelligible text, figures, images  and something that only the writer and receiver should understand, which is commonly used in communications in war during ancient times.
  • The process where an ordinary plain text is converted to cipher text is known as encryption while the process of conversion of cipher text to plain text this is known as decryption.

There are many primitive and other techniques that had been used by different civilizations.

1. The Caesar Shift Cipher

  • This cipher was named in honor of Julius Caesar, this method was effective during the times of war not only because the text was encrypted but the enemies of Rome are also illiterate, and only after the fall of Rome it is decrypted through the analysis of Al-Kindi.
  • The concept is the simplest and most widely-known encryption techniques which uses monoalphabetic substitution. It is a substitution cipher with a shift of 3 either to left or right in the alphabet.
Quote
Plain: ABCDEFGHIJKLMNOPQRSTUVWXYZ
Cipher using right rotation: DEFGHIJkLMNOPQRSTUVWXYZABC
Cipher using left rotation: XYZABCDEFGHIJKLMNOPQRSTUVW

Example: (With a shift of +3)
Plain Text:
Quote
We're no strangers to love
You know the rules and so do I
Cipher Text:
Quote
Tb'ob kl pqoxkdbop ql ilsb
Vlr hklt qeb oribp xka pl al F

  • There is also another version of it the Augustus Cipher, that is made by his nephew Augustus but with a shift of 1 only.

Example: (With a shift of -1)
Plain Text:
Quote
A full commitment's what I'm thinking of
You wouldn't get this from any other guy
Cipher Text:
Quote
Z etkk bnllhsldms'r vgzs H'l sghmjhmf ne
Xnt vntkcm's fds sghr eqnl zmx nsgdq ftx

2. Alberti-Vigenere Cipher

  • This one is also interesting , using a polyalphabetic substitution which the alphabets is embedded within a 2 movable concentric disk that is attached by a pin. The large one is called Stabilis which is fixed or stationary and the Mobilis which is the smaller one and the movable disk. (the characters in mobilis may vary)
Quote
Stabilis: ABCDEFGILMNOPQRSTVXZ1234
Mobilis: (random characters)
  • Each disk consists of 24 equal cells he Stabilis consist of uppercase letter and 4 numbers while the Mobilis consists of lowercase letters and a special character.

Example:(with Stabilis: ABCDEFGILMNOPQRSTVXZ1234 & Mobilis: c&bmdgpfznjyutoskerlhaiw)
Plain Text:
Quote
I just wanna tell you how Im feeling
Gotta make you understand
Cipher Text:
Quote
1 munp ufbhs petu ccg fzk Ia cpmunmi
Gzpbf hzjj yzg &laduztsbe

3. Scytale

  • The scytale was first used in Ancient Greece by the Spartans for secret communication between the war commanders, it is consisted of a stretched leather which has characters written on It seemed like a meaningless sequence of characters but when the stretch of leather is winded around a piece of wood with the correct diameter, an encoded message can be read.
  • may consist of: ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz

Example: (7 turns)
Plain Text:
Quote
Never gonna give you up
Never gonna let you down
Cipher Text:
Quote
Nnyva denoe lova ure we
gugtn ripoy gvN noo eenu
Rendered:
Quote
| N | e | v | e | r | g | o |
| n | n | a | g | i | v | e |
| y | o | u | u | p | N | e |
| v | e | r | g | o | n | n |
| a | l | e | t | y | o | u |
| d | o | w | n |   |   |   |

4.The Polybius Square

  • The Polybius Square is an ancient Greek invention, discovered by a scholar named Polybius. For the Greek alphabet of 24 letters, it consisted of a 5 by 5 grid where each square of the grid was filled by a single letter. In the English Alphabet of 26 letters, we have one too many letters. To get round this we combine two letters, traditionally "i" and "j".
  • It is also possible to combine other pairs, such as "v" and "u". Another alternative to the Polybius Square for english is to include the digits 0-9, so we have 36 characters. It is also possible to just remove one of the letter such as J,VW,Q and Z or make a mixed square.
  • It's either you will use the common 5x5 grid with the 25 Alphabets or you can increase the grid and used mixed square, This is also very simple let's use the figure on the right and let's encrypt the word "Bitcointalk" you just gonna follow the number grid so it should be 2142443143423344111352

[b]Example (Let's use the figure above but without the J)[/b]
Plain Text:
Quote
Never gonna run around and desert you
Never gonna make you cry
Cipher Text:
Quote
3315511542 2234333311 424533 114234453314 113314 1415431542 44543445
3315511542 2234333311 32112515 543445 134254

5. Pigpen Cipher

  • The Pigpen Cipher is another example of a substitution cipher, but rather than replacing each letter with another letter, the letters are replaced by symbols.It used mainly by the mason but the origins of the characters that is used is unknown. Most notoriously, it was the cipher of choice for use by the Freemasons, a secret society in the 18th Century. In fact, they used it so much, that it is often referred to as the Freemasons Cipher. However, it was not exclusively used by them, with Union prisoners in Confederate camps using it to communicate in the American Civil War.

Example: (Standard)
Plain Text:
Quote
Never gonna say goodbye
Never gonna tell a lie and hurt you
Cipher Text:
Quote




https://economictimes.indiatimes.com/definition/cryptography
https://usa.kaspersky.com/resource-center/definitions/what-is-cryptography
https://www.geeksforgeeks.org/cryptography-and-its-types/
https://www.cs.mcgill.ca/~rwest/wikispeedia/wpcd/wp/c/Caesar_cipher.htm#:~:text=The%20Caesar%20cipher%20is%20named%20after%20Julius%20Caesar%2C%20who%2C%20according,word%20could%20be%20made%20out.
http://www.icits2015.net/ancient-cryptography-history/#:~:text=The%20word%20cryptography%20is%20comes,from%20one%20place%20to%20another.
https://en.wikipedia.org/wiki/Alberti_cipher_disk
https://www.cryptool.org/en/cto-ciphers/scytale
https://www.dcode.fr/scytale-cipher
http://cryptogramma.com/cryptogramma/How_it_works.html
https://interestingengineering.com/11-cryptographic-methods-that-marked-history-from-the-caesar-cipher-to-enigma-code-and-beyond
https://crypto.interactive-maths.com/polybius-square.html
Jump to: