Timeline of cryptography

Below is a timeline of notable events related to cryptography.

B.C.

  • 36th century – The Sumerians develop cuneiform writing and the Egyptians develop hieroglyphic writing.
  • 16th century – The Phoenicians develop an alphabet
  • 600-500 – Hebrew scholars make use of simple monoalphabetic substitution ciphers (such as the Atbash cipher)
  • c. 400 – Spartan use of scytale (alleged)
  • c. 400 – Herodotus reports use of steganography in reports to Greece from Persia (tattoo on shaved head)
  • 100-1 A.D.- Notable Roman ciphers such as the Caesar cipher.

1–1799 A.D.

1800–1899

1900–1949

1950–1999

2000 and beyond

  • January 14, 2000 – U.S. Government announce restrictions on export of cryptography are relaxed (although not removed). This allows many US companies to stop the long running process of having to create US and international copies of their software.
  • March 2000 – President of the United States Bill Clinton says he doesn't use e-mail to communicate with his daughter, Chelsea Clinton, at college because he doesn't think the medium is secure.
  • September 6, 2000 – RSA Security Inc. released their RSA algorithm into the public domain, a few days in advance of their U.S. patent 4,405,829 expiring. Following the relaxation of the U.S. government export restrictions, this removed one of the last barriers to the worldwide distribution of much software based on cryptographic systems
  • 2000 – UK Regulation of Investigatory Powers Act requires anyone to supply their cryptographic key to a duly authorized person on request
  • 2001 – Belgian Rijndael algorithm selected as the U.S. Advanced Encryption Standard (AES) after a five-year public search process by National Institute of Standards and Technology (NIST)
  • 2001 – Scott Fluhrer, Itsik Mantin and Adi Shamir publish an attack on WiFi's Wired Equivalent Privacy security layer
  • September 11, 2001 – U.S. response to terrorist attacks hampered by lack of secure communications
  • November 2001 – Microsoft and its allies vow to end "full disclosure" of security vulnerabilities by replacing it with "responsible" disclosure guidelines
  • 2002 – NESSIE project releases final report / selections
  • August 2002, PGP Corporation formed, purchasing assets from NAI.
  • 2003 – CRYPTREC project releases 2003 report / recommendations
  • 2004 – The hash MD5 is shown to be vulnerable to practical collision attack
  • 2004 – The first commercial quantum cryptography system becomes available from id Quantique.
  • 2005 – Potential for attacks on SHA1 demonstrated
  • 2005 – Agents from the U.S. FBI demonstrate their ability to crack WEP using publicly available tools
  • May 1, 2007 – Users swamp Digg.com with copies of a 128-bit key to the AACS system used to protect HD DVD and Blu-ray video discs. The user revolt was a response to Digg's decision, subsequently reversed, to remove the keys, per demands from the motion picture industry that cited the U.S. DMCA anti-circumvention provisions.[1]
  • November 2, 2007 – NIST hash function competition announced.
  • 2009 – Bitcoin network was launched.
  • 2010 – The master key for High-bandwidth Digital Content Protection (HDCP) and the private signing key for the Sony PlayStation 3 game console are recovered and published using separate cryptoanalytic attacks. PGP Corp. is acquired by Symantec.
  • 2012 – NIST selects the Keccak algorithm as the winner of its SHA-3 hash function competition.
  • 2013 – Edward Snowden discloses a vast trove of classified documents from NSA. See Global surveillance disclosures (2013–present)
  • 2013 – Dual_EC_DRBG is discovered to have a NSA backdoor.
  • 2013 – NSA publishes Simon and Speck lightweight block ciphers.
  • 2014 – The Password Hashing Competition accepts 24 entries.
  • 2015 – Year by which NIST suggests that 80-bit keys be phased out.

See also

References

  1. ^ Sumner Lemon (2 May 2007). "Digg bends to users' will on AACS encryption key". InfoWorld. Retrieved 13 November 2016.

External links

  • v
  • t
  • e
Timelines of computing
ComputingComputer scienceSoftwareInternetNotable people