Description
Research an encryption method that has been used historically but is no longer used (such as the Enigma cipher of the Germans in World War II). Describe how that encryption method works, paying particular attention to how it contrasts with more modern methods. Be sure to discuss at least one modern method in your comparison.
Explanation & Answer
View attached explanation and answer. Let me know if you have any questions.
OUTLINE
Historical Encryption
1. Introduction
a. History of Enigma cipher
2. How it works
a. The rotor machine
3. Cryptoanalysis
a. Modifying the substitution letter
4. Modern technique
a. Advanced Encryption Standard (AES)
5. Conclusion
Running Head: HISTORICAL ENCRYPTION
Historical Encryption – Enigma Cipher
Name
Institution
Course Code
1
HISTORICAL ENCRYPTION
2
Introduction
The cryptography field can be traced back to the Roman and Greek periods when
straightforward substitution and transposition ciphers were utilized to encrypt sensitive
information. The procedure of enhancing security in ciphers took place gradually until
mechanical gadgets became widespread at the beginning of the twentieth century (Stoler, 2008).
Nevertheless, there had taken place numerous attempts to make ciphers more secure before this
period. Distinguished encryption milestones in the twentieth century include the creation and
utilization of the Enigma machine.
History of the Enigma Cipher
Blaise de Vigenere had published an Autokey cipher’s description that was utilized in the
First World War. When the First World War ended, and the Vigenere Cipher broke down, it was
clear that enhanced security was required. Many countries realized that nobody could encrypt
data faster and more securely than a mechanical device. As a result, Enigma Machine’s
development was considered. This machine was a cipher gadget that was utilized to decrypt and
encrypt private information. The entire Enigma line included a collectio...