The History of Information Security 2007
DOI: 10.1016/b978-044451608-4/50012-2
|View full text |Cite
|
Sign up to set email alerts
|

The rise of cryptology in the European Renaissance

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
10
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
6
1
1

Relationship

1
7

Authors

Journals

citations
Cited by 12 publications
(10 citation statements)
references
References 19 publications
0
10
0
Order By: Relevance
“…Cryptology is a science that is usually explained based on its historical development. In the study of cryptography, its methods and systems, the various procedures and techniques, are explained: the Greek Skytalé, the substitution of Aeneas, the methods of the statesman and military general Gaius Iulius Caesar (100 BC-44 BC) and the emperor Gaius Iulius Caesar Octavianus Augustus (63 BC-14) [1], the polyalphabetic substitution of Johannes Heidenberg, OSB, known as Tritemius (1462-1516) [2], the Girolamo Cardano grille (1501-1576) [3] (pp. 95-97), other transposition ciphers (rows-columns, series, groups) [4] (pp.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Cryptology is a science that is usually explained based on its historical development. In the study of cryptography, its methods and systems, the various procedures and techniques, are explained: the Greek Skytalé, the substitution of Aeneas, the methods of the statesman and military general Gaius Iulius Caesar (100 BC-44 BC) and the emperor Gaius Iulius Caesar Octavianus Augustus (63 BC-14) [1], the polyalphabetic substitution of Johannes Heidenberg, OSB, known as Tritemius (1462-1516) [2], the Girolamo Cardano grille (1501-1576) [3] (pp. 95-97), other transposition ciphers (rows-columns, series, groups) [4] (pp.…”
Section: Introductionmentioning
confidence: 99%
“…• Bigramic (2-g to 2-g), and in general, n-gramic to n-gramic. Giambattista della Porta (1535-1615) was the inventor of the 2-g monoalphabetic substitution system to 2-g [2] (pp. 291-292), a scheme from which the generalization of n-grams to n-grams is possible, as we find in various nomenclators or the Playfair system [6] (pp.…”
mentioning
confidence: 99%
“…It is believed [1] that the Spartan general Lysander used the skytale to secure critical information in a battle against the Persians in 405 BC, and the subsequent victory of the Spartans had a lasting impact on early European history. The idea that the skytale was used as a cryptographic device dates back to Cicero (106-43 BC) [2], however this idea has come under scrutiny in recent times. In 1998, after studying the available Greek source material, Kelly [3] claims that "the skytale was nothing more than a piece of leather or parchment attached to a stick" [3, p. 260].…”
Section: History Of Cryptographymentioning
confidence: 99%
“…This value coincides with the value of the Hebrew word ‫,"אליעזר"‬ Eliezer, Abraham's servant, thus identifying both senses in response to the search for solutions to the divine and prophetical questions of the sacred texts by the mystics of Judaism ( [36], pp. 79, 91-92; [37,38]). We will now put Hebrew aside and talk about the Greek language, since we will refer at this point to the case of a Christian book written in Greek, the Book of Revelation.…”
Section: The Christ Blessing At Kunstmuseum In Winterthur Switzerlandmentioning
confidence: 99%