Engineering and Vulnerability Management
A (Very) Brief History of Pre-Computer Cryptography, Part 2
Author(s):
Adam Firestone, Editor-in-Chief , United States Cybersecurity Magazine
This is the second part of a two-part article exploring the history of pre-computer cryptography. Part 1 focused on the period from the birth of cryptography some 4,000 years ago to the development of early transposition and substitution ciphers. Part 2 looks at the emergence of cryptanalysis under the Abbasid Caliphate and goes through the … Read more