Contributor
RickStudent, Philosopher, Writer, Developer
seal of the University of North Carolina Chapel Hill
Photo Credit: By Source, Fair use, https://en.wikipedia.org/w/index.php?curid=28199013
Arthur Scherbius, inventor of the Enigma cipher
Photo Credit: Public Domain, https://commons.wikimedia.org/w/index.php?curid=73550136
Used during the late 1930s and during the war; displayed at Museo scienza e tecnologia Milano, Italy
Military Enigma machine, model "Enigma I" — Used during the late 1930s and during the war; displayed at Museo scienza e tecnologia Milano, Italy
Photo Credit: By Alessandro Nassiri - Museo della Scienza e della Tecnologia "Leonardo da Vinci", CC BY-SA 4.0, https://commons.wikimedia.org/w/index.php?curid=47910919
Military Enigma machine, model "Enigma I" Used during the late 1930s and during the war; displayed at Museo scienza e tecnologia Milano, Italy
Leon Battista Alberti
Photo Credit: Di G. Benaglia - Pubblico dominio, https://commons.wikimedia.org/w/index.php?curid=15884503
The Alberti Cipher disk
Photo Credit: By Augusto Buonafalce - De componendis cifris, CC BY-SA 3.0, https://commons.wikimedia.org/w/index.php?curid=3733873
Modern portrait by Calixte Serrur
Anti-pope Clement VII — Modern portrait by Calixte Serrur
Photo Credit: By Henri Auguste César Serrur - Les papes en Avignon, CC BY-SA 4.0, https://commons.wikimedia.org/w/index.php?curid=17864496
Anti-pope Clement VII Modern portrait by Calixte Serrur
Isḥāq al-Kindī (801-873 CE)
Photo Credit:
The first page of al-Kindi's manuscript <i>On Deciphering Cryptographic Messages</i>, containing the oldest known description of cryptanalysis by frequency analysis.
First page of On Deciphering Cryptographic Messages — The first page of al-Kindi's manuscript On Deciphering Cryptographic Messages, containing the oldest known description of cryptanalysis by frequency analysis.
Photo Credit: Public Domain, https://commons.wikimedia.org/w/index.php?curid=34672454
First page of On Deciphering Cryptographic Messages The first page of al-Kindi's manuscript On Deciphering Cryptographic Messages, containing the oldest known description of cryptanalysis by frequency analysis.
statue of Al-Khalil ibn Ahmad al-Farahidi in Basra
Photo Credit: By احمد محمود خضير - Own work, CC BY-SA 3.0, https://commons.wikimedia.org/w/index.php?curid=27778602
The action of a Caesar cipher is to replace each plaintext letter with a different one a fixed number of places down the alphabet. The cipher illustrated here uses a left shift of three, so that (for example) each occurrence of E in the plaintext becomes B in the ciphertext.
Caesar cipher diagram — The action of a Caesar cipher is to replace each plaintext letter with a different one a fixed number of places down the alphabet. The cipher illustrated here uses a left shift of three, so that (for example) each occurrence of E in the plaintext becomes B in the ciphertext.
Photo Credit: Public Domain, https://commons.wikimedia.org/w/index.php?curid=30693472
Caesar cipher diagram The action of a Caesar cipher is to replace each plaintext letter with a different one a fixed number of places down the alphabet. The cipher illustrated here uses a left shift of three, so that (for example) each occurrence of E in the plaintext becomes B in the ciphertext.
Berlin State Library (Ms. lat. fol. 28, fol. 73v.)
Suetonius, De vita Caesarum — Berlin State Library (Ms. lat. fol. 28, fol. 73v.)
Photo Credit: By Suetonius - 2d copy, Public Domain, https://commons.wikimedia.org/w/index.php?curid=48540156
Suetonius, De vita Caesarum Berlin State Library (Ms. lat. fol. 28, fol. 73v.)