Cryptography has four main goals:
However, not all cryptographic systems achieve all of the above goals. Although possible, most have not been practically feasible until the recent development of complex algorithms and machinery to carry out such algorithms.
Although cryptography has a long and complex history, it is only in the 20th century that it has developed into a rigorous science with a sound mathematical basis. Even then, it has taken the ubiquity of the internet to fully deploy cryptography in a public manner.
The earliest use of cryptography is probably found with the use of non-standard hieroglyphics? by the Egyptians? around 1900 BCE. Hebrew scholars also made use of simple [substitution ciphers]? (such as the [Atbash cipher]?) around 500 to 600 BCE.
The era of modern cryptography started with Claude Shannon, arguably the father of mathematical cryptography. In 1949 he published the paper [Communication Theory of Secrecy Systems]. This, in addition to his other works on information and communication theory would establish a strong mathematical basis for cryptography.
1976 saw two major advances. First was the DES (Data Encryption Standard) developed by IBM and the NSA in an effort to develop secure banking facilities (DES was later published as a Federal Information Processing Standard in 1977). DES, and more secure variants of it, are still used today.
Secondly, and more importantly, was the publication of the paper [New Directions in Cryptography] by [Whitfield Diffie]? and [Martin Hellman]?. This paper introduced a radical new method of distrubting cryptographic keys, known as [public key cryptography].
See also:
Public key cryptosystems (asymmetric algorithms):
Secret key cryptosystems (symmetric algorithms):
Terminology:
Echelon, Enigma, Ultra, Security engineering, Steganography, Cryptographers