Select Page

History of Cryptography

CISSP

  1. Hieroglyphics:
    • Definition: Sacred carvings used in ancient Egypt as a form of symbolic communication, sometimes used for encoding messages.
  2. Scytale (Scythe):
    • Definition: An ancient encryption tool that involved wrapping papyrus around a wooden rod. The message could only be read when the papyrus was wound around a rod of the same diameter.
  3. Substitution Ciphers:
    • Example: A mono-alphabetic cipher that shifts characters by a certain number of places (e.g., shifting by 3 characters is known as a Caesar cipher).
  4. Cipher Disks:
    • Description: Consist of two rotating disks with alphabets inscribed around the edges. By rotating the disks, a user can encrypt or decrypt messages.
  5. Jefferson Disks:
    • Description: Comprises 26 rotating disks, each with an alphabet inscribed. By aligning the disks according to a key, a message can be encrypted or decrypted.
  6. Unix ROT13:
    • Definition: A simple substitution cipher used in Unix systems that rotates each letter 13 places in the alphabet.
  7. Hagelin Machine (M-209):
    • Description: A mechanical cryptographic machine used during World War II that encrypted messages using a series of wheels and pins.
  8. Enigma Machine:
    • Description: A complex polyalphabetic substitution cipher machine used by the Germans during World War II to encrypt military communications.

Security Architecture Frameworks

  1. SABSA (Sherwood Applied Business Security Architecture):
    • Purpose: A framework for developing risk-driven enterprise information security and information assurance architectures. It emphasizes a chain of traceability through six layers.
  2. TOGAF (The Open Group Architecture Framework):
    • Purpose: A step-by-step process and framework for developing and managing enterprise architecture. TOGAF provides tools for designing, planning, implementing, and governing an enterprise information architecture.
  3. Zachman Framework:
    • Purpose: Provides a structured way to view and define an enterprise’s architecture. It offers a common context to understand complex architectures, facilitating communication and collaboration across different stakeholders.

These historical encryption methods and modern frameworks illustrate the evolution of cryptography and the structured approaches to enterprise security architecture. Understanding these concepts is essential for both historical context and practical application in modern cybersecurity.

Latest Post:

Pin It on Pinterest