List of cryptographers

This is a list of cryptographers. Cryptography is the practice and study of techniques for secure communication in the presence of third parties called adversaries.

Pre twentieth century

  • Al-Khalil ibn Ahmad al-Farahidi: wrote a (now lost) book on cryptography titled the "Book of Cryptographic Messages".
  • Al-Kindi, 9th century Arabic polymath and originator of frequency analysis.
  • Athanasius Kircher, attempts to decipher crypted messages
  • Augustus the Younger, Duke of Brunswick-Lüneburg, wrote a standard book on cryptography
  • Ibn Wahshiyya: published several cipher alphabets that were used to encrypt magic formulas.[1]
  • John Dee, wrote an occult book, which in fact was a cover for crypted text
  • Ibn 'Adlan: 13th-century cryptographer who made important contributions on the sample size of the frequency analysis.
  • Duke of Mantua Francesco I Gonzaga is the one who used the earliest example of homophonic Substitution cipher in early 1400s.[2][3]
  • Ibn al-Durayhim: gave detailed descriptions of eight cipher systems that discussed substitution ciphers, leading to the earliest suggestion of a "tableau" of the kind that two centuries later became known as the "Vigenère table".
  • Ahmad al-Qalqashandi: Author of Subh al-a 'sha, a fourteen volume encyclopedia in Arabic, which included a section on cryptology. The list of ciphers in this work included both substitution and transposition, and for the first time, a cipher with multiple substitutions for each plaintext letter.
  • Charles Babbage, UK, 19th century mathematician who, about the time of the Crimean War, secretly developed an effective attack against polyalphabetic substitution ciphers.
  • Leone Battista Alberti, polymath/universal genius, inventor of polyalphabetic substitution (more specifically, the Alberti cipher), and what may have been the first mechanical encryption aid.
  • Giovanni Battista della Porta, author of a seminal work on cryptanalysis.
  • Étienne Bazeries, French, military, considered one of the greatest natural cryptanalysts. Best known for developing the "Bazeries Cylinder" and his influential 1901 text Les Chiffres secrets dévoilés ("Secret ciphers unveiled").
  • Giovan Battista Bellaso, Italian cryptologist
  • Giovanni Fontana (engineer), wrote two encrypted books
  • Hildegard of Bingen used her own alphabet to write letters.
  • Julius Caesar, Roman general/politician, has the Caesar cipher named after him, and a lost work on cryptography by Probus (probably Valerius Probus) is claimed to have covered his use of military cryptography in some detail. It is likely that he did not invent the cipher named after him, as other substitution ciphers were in use well before his time.
  • Friedrich Kasiski, author of the first published attack on the Vigenère cipher, now known as the Kasiski test.
  • Auguste Kerckhoffs, known for contributing cipher design principles.
  • Johannes Trithemius, mystic and first to describe tableaux (tables) for use in polyalphabetic substitution. Wrote an early work on steganography and cryptography generally.
  • Philips van Marnix, lord of Sint-Aldegonde, deciphered Spanish messages for William the Silent during the Dutch revolt against the Spanish.
  • John Wallis codebreaker for Cromwell and Charles II
  • Sir Charles Wheatstone, inventor of the so-called Playfair cipher and general polymath.

World War I and World War II wartime cryptographers

Other pre-computer

Modern

See also: Category:Modern cryptographers for a more exhaustive list.

Symmetric-key algorithm inventors

Asymmetric-key algorithm inventors

Cryptanalysts

Algorithmic number theorists

Theoreticians

Government cryptographers

Cryptographer businesspeople

  • Bruce Schneier, US, CTO and founder of Counterpane Internet Security, Inc. and cryptography author.
  • Scott Vanstone, Canada, founder of Certicom and elliptic curve cryptography proponent.
gollark: --choice 16 lyricly gollark
gollark: hmm yes random
gollark: ++magic sql select random()
gollark: ++remind 3d POTAT O GOOD <@160279332454006795> <@160279332454006795>
gollark: It allows arbitrary code execution, so you peasants must use ++exec.

See also

References

  1. Mattord, Michael E. Whitman, Herbert J. (2010). Principles of Information Security (4th ed.). Course Technology. p. 351. ISBN 1111138214.
  2. David Salomon. Coding for Data and Computer Communications. Springer, 2005.
  3. Fred A. Stahl. "A homophonic cipher for computational cryptography" Proceedings of the national computer conference and exposition (AFIPS '73), pp. 123–126, New York City, 1973.
  4. Worrall, Simon (7 October 2017). "This Woman Saved the Americas From the Nazis". National Geographic. Retrieved 1 April 2018.
This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.