We always talk about the latest and greatest (or worst for that matter) of what is happening in our industry. But we don’t ever talk about how it all began. Since encryption is such an important part of infosecurity, let’s take a walk back through history.
According to Wikipedia, encryption “has long been used by the military and governments to facilitate secret communication. It is now commonly used in protecting information within many kinds of civilian systems. For example, the Computer Security Institute reported that in 2007, 71% of companies surveyed utilized encryption for some of their data in transit, and 53% utilized encryption for some of their data in storage. Encryption can be used to protect data 'at rest', such as files on computers and storage devices. In recent years there have been numerous reports of confidential data such as customers' personal records being exposed through loss or theft of laptops or backup drives. Encrypting such files at rest helps protect them should physical security measures fail.”
Since the time we started talking, there were secrets to be kept. At first, this was achieved by only allowing certain members of society to learn to read and write. This way, it didn’t matter what was written because no one except a few could read it. But as the number of readers grew, different ways of sending messages had to be developed.
The Spartans of ancient Greece developed the first method. Their method was achieved by wrapping a piece of “paper” around a stick of a certain dimension. A message was written on it. The only way to retrieve the message was to have a stick of the same dimension and rewrap it in order to decode it. This method was the first Tranpositional Cipher. The same letters where used but the order was changed.
The Greeks were the first to use steganography. When Histaiaeus shaved the head of his messenger, he wrote the message on the messenger’s scalp and waited for the hair to regrow. Then the messenger was sent to the recipient, and his head was shaved again to reveal the message.
The method used by the Romans was called a Shift Cipher and entailed taking a message and shifting the letters of that message a number of set places in the alphabet. The modern day equivalent is ROT13.
Over time, as ciphers became more complicated and automated, mechanical and electronic devices were used not only to create messages but also to crack them. Sometimes it was just plain luck and cunning that resulted in the code being broken. If we never got our hands on the Enigma machine that the Germans created, who knows, World War II might have lasted longer. Or the outcome might have been different. A sobering thought, wouldn't you say?
Our industry has grown by leaps and bounds and has embedded itself into everyday life – both professionally and personally – and yet, for all the technology that we’ve developed and depend on, let’s not forget, it all began with a stick.
About the Author: Allan Pratt teaches CompTIA A+ and Security+ certification courses, writes on infosecurity topics for InfosecIsland.com and InternetTechSpecialists.com, and has been quoted by InfoWorld. An infosecurity strategist, Allan represents the alignment of management and technology. With an MBA Degree and four CompTIA certs in hardware, software, networking, and security, Allan translates tech issues into everyday language that is easily understandable by all business units. His expertise includes the installation and maintenance of all aspects of the PC and peripheral lifecycle and the planning and integration of end-to-end security solutions. Follow Allan on Facebook and Twitter: @Tips4Tech.
Editor’s Note: The views expressed in this article are the opinions of the author. Security Bistro is not responsible for the article’s content or messaging.
- About Corero
- Investor Relations
- News Room
- Executive Management Team
- Corero Offices
- Contact Us