This is a list of cryptographers.
Cryptography
Cryptography, or cryptology (from grc, , translit=kryptós "hidden, secret"; and ''graphein'', "to write", or ''-logia'', "study", respectively), is the practice and study of techniques for secure communication in the presence of adver ...
is the practice and study of techniques for
secure communication
Secure communication is when two entities are communicating and do not want a third party to listen in. For this to be the case, the entities need to communicate in a way that is unsusceptible to eavesdropping or interception. Secure communication ...
in the presence of third parties called
adversaries.
Pre twentieth century
*
Al-Khalil ibn Ahmad al-Farahidi
Abu ‘Abd ar-Raḥmān al-Khalīl ibn Aḥmad ibn ‘Amr ibn Tammām al-Farāhīdī al-Azdī al-Yaḥmadī ( ar, أبو عبدالرحمن الخليل بن أحمد الفراهيدي; 718 – 786 CE), known as Al-Farāhīdī, or Al-Khalīl, ...
: wrote a (now lost) book on cryptography titled the "''Book of Cryptographic Messages''".
*
Al-Kindi
Abū Yūsuf Yaʻqūb ibn ʼIsḥāq aṣ-Ṣabbāḥ al-Kindī (; ar, أبو يوسف يعقوب بن إسحاق الصبّاح الكندي; la, Alkindus; c. 801–873 AD) was an Arab Muslim philosopher, polymath, mathematician, physician ...
, 9th century
Arabic
Arabic (, ' ; , ' or ) is a Semitic languages, Semitic language spoken primarily across the Arab world.Semitic languages: an international handbook / edited by Stefan Weninger; in collaboration with Geoffrey Khan, Michael P. Streck, Janet C ...
polymath and originator of
frequency analysis
In cryptanalysis, frequency analysis (also known as counting letters) is the study of the frequency of letters or groups of letters in a ciphertext. The method is used as an aid to breaking classical ciphers.
Frequency analysis is based on t ...
.
*
Athanasius Kircher
Athanasius Kircher (2 May 1602 – 27 November 1680) was a German Jesuit scholar and polymath who published around 40 major works, most notably in the fields of comparative religion, geology, and medicine. Kircher has been compared to fe ...
, attempts to decipher crypted messages
*
Augustus the Younger, Duke of Brunswick-Lüneburg
Augustus II (10 April 1579 – 17 September 1666), called the Younger (german: August der Jüngere), a member of the House of Welf was Duke of Brunswick-Lüneburg. In the estate division of the House of Welf of 1635, he received the Principa ...
, wrote a standard book on cryptography
*
Ibn Wahshiyya
( ar, ابن وحشية), died , was a Nabataean (Aramaic-speaking, rural Iraqi) agriculturalist, toxicologist, and alchemist born in Qussīn, near Kufa in Iraq. He is the author of the '' Nabataean Agriculture'' (), an influential Arabic work ...
: published several cipher alphabets that were used to encrypt magic formulas.
*
John Dee
John Dee (13 July 1527 – 1608 or 1609) was an English mathematician, astronomer, astrologer, teacher, occultist, and alchemist. He was the court astronomer for, and advisor to, Elizabeth I, and spent much of his time on alchemy, divinatio ...
, wrote an occult book, which in fact was a cover for crypted text
*
Ibn 'Adlan: 13th-century cryptographer who made important contributions on the sample size of the frequency analysis.
*
Duke of Mantua
During its history as independent entity, Mantua had different rulers who governed on the city and the lands of Mantua from the Middle Ages to the early modern period.
From 970 to 1115, the Counts of Mantua were members of the House of Canoss ...
Francesco I Gonzaga
Portrait of Francesco I Gonzaga
Francesco I Gonzaga (1366 – 7 March 1407) was ruler of Mantua from 1382 to 1407. He was also a condottiero.
Succeeding his father Ludovico II Gonzaga in 1382, he led a policy of balance between the nearby ...
is the one who used the earliest example of homophonic
Substitution cipher
In cryptography, a substitution cipher is a method of encrypting in which units of plaintext are replaced with the ciphertext, in a defined manner, with the help of a key; the "units" may be single letters (the most common), pairs of letters, tri ...
in early 1400s.
*
Ibn al-Durayhim ʿAlī ibn Muḥammad Ibn al-Durayhim ( ar, علي بن محمد ابن الدريهم; 1312–1359/62 CE) was an Arab cryptologist who gave detailed descriptions of eight cipher systems that discussed substitution ciphers, leading to the earliest ...
: gave detailed descriptions of eight cipher systems that discussed substitution ciphers, leading to the earliest suggestion of a "tableau" of the kind that two centuries later became known as the "Vigenère table".
*
Ahmad al-Qalqashandi
Shihāb al-Dīn Abū 'l-Abbās Aḥmad ibn ‘Alī ibn Aḥmad ‘Abd Allāh al-Fazārī al-Shāfiʿī better known by the epithet al-Qalqashandī ( ar, شهاب الدين أحمد بن علي بن أحمد القلقشندي; 1355 or 1356 &ndash ...
: Author of ''Subh al-a 'sha'', a fourteen volume encyclopedia in Arabic, which included a section on cryptology. The list of ciphers in this work included both substitution and transposition, and for the first time, a cipher with multiple substitutions for each plaintext letter.
*
Charles Babbage
Charles Babbage (; 26 December 1791 – 18 October 1871) was an English polymath. A mathematician, philosopher, inventor and mechanical engineer, Babbage originated the concept of a digital programmable computer.
Babbage is considered ...
, UK, 19th century mathematician who, about the time of the
Crimean War
The Crimean War, , was fought from October 1853 to February 1856 between Russia and an ultimately victorious alliance of the Ottoman Empire, France, the United Kingdom and Piedmont-Sardinia.
Geopolitical causes of the war included the de ...
, secretly developed an effective attack against
polyalphabetic substitution
A polyalphabetic cipher substitution, using multiple substitution alphabets. The Vigenère cipher is probably the best-known example of a polyalphabetic cipher, though it is a simplified special case. The Enigma machine is more complex but is sti ...
ciphers.
*
Leone Battista Alberti
Leon Battista Alberti (; 14 February 1404 – 25 April 1472) was an Italian Renaissance humanist author, artist, architect, poet, priest, linguist, philosopher, and cryptographer; he epitomised the nature of those identified now as polymaths. He ...
,
polymath
A polymath ( el, πολυμαθής, , "having learned much"; la, homo universalis, "universal human") is an individual whose knowledge spans a substantial number of subjects, known to draw on complex bodies of knowledge to solve specific pro ...
/universal
genius
Genius is a characteristic of original and exceptional insight in the performance of some art or endeavor that surpasses expectations, sets new standards for future works, establishes better methods of operation, or remains outside the capabiliti ...
, inventor of
polyalphabetic substitution
A polyalphabetic cipher substitution, using multiple substitution alphabets. The Vigenère cipher is probably the best-known example of a polyalphabetic cipher, though it is a simplified special case. The Enigma machine is more complex but is sti ...
(more specifically, the
Alberti cipher
The Alberti Cipher, created in 1467 by Italian architect Leon Battista Alberti, was one of the first polyalphabetic ciphers. In the opening pages of his treatise ' he explained how his conversation with the papal secretary Leonardo Dati about a re ...
), and what may have been the first mechanical encryption aid.
*
Giovanni Battista della Porta
Giambattista della Porta (; 1535 – 4 February 1615), also known as Giovanni Battista Della Porta, was an Italian scholar, polymath and playwright who lived in Naples at the time of the Renaissance, Scientific Revolution and Reformation.
Giamb ...
, author of a seminal work on
cryptanalysis
Cryptanalysis (from the Greek ''kryptós'', "hidden", and ''analýein'', "to analyze") refers to the process of analyzing information systems in order to understand hidden aspects of the systems. Cryptanalysis is used to breach cryptographic sec ...
.
*
Étienne Bazeries
Étienne Bazeries (21 August 1846, in Port Vendres – 7 November 1931, in Noyon) was a French military cryptanalyst active between 1890 and the First World War. He is best known for developing the " Bazeries Cylinder", an improved version of T ...
, French, military, considered one of the greatest natural cryptanalysts. Best known for developing the "
Bazeries Cylinder" and his influential 1901 text ''Les Chiffres secrets dévoilés'' ("Secret ciphers unveiled").
*
Giovan Battista Bellaso
Giovan Battista Bellaso (Brescia 1505–...) was an Italian cryptologist.
The Vigenère cipher is named after Blaise de Vigenère, although Giovan Battista Bellaso had invented it before Vigenère described his autokey cipher.
Biography
Bellaso ...
, Italian cryptologist
*
Giovanni Fontana (engineer)
Giovanni Fontana, also known as Johannes de Fontana (ca. 1395 – ca. 1455) was a fifteenth-century Italian physician and engineer. He was born in Venice in the 1390s and attended the University of Padua, where he received his degree in arts in 141 ...
, wrote two encrypted books
*
Hildegard of Bingen
Hildegard of Bingen (german: Hildegard von Bingen; la, Hildegardis Bingensis; 17 September 1179), also known as Saint Hildegard and the Sibyl of the Rhine, was a German Benedictine abbess and polymath active as a writer, composer, philosopher ...
used her own alphabet to write letters.
*
Julius Caesar
Gaius Julius Caesar (; ; 12 July 100 BC – 15 March 44 BC), was a Roman general and statesman. A member of the First Triumvirate, Caesar led the Roman armies in the Gallic Wars before defeating his political rival Pompey in a civil war, and ...
, Roman general/politician, has the
Caesar cipher named after him, and a
lost work on cryptography by Probus (probably Valerius Probus) is claimed to have covered his use of military cryptography in some detail. It is likely that he did not invent the cipher named after him, as other
substitution cipher
In cryptography, a substitution cipher is a method of encrypting in which units of plaintext are replaced with the ciphertext, in a defined manner, with the help of a key; the "units" may be single letters (the most common), pairs of letters, tri ...
s were in use well before his time.
*
Friedrich Kasiski
Major Friedrich Wilhelm Kasiski (29 November 1805 – 22 May 1881) was a German infantry officer, cryptographer and archeologist. Kasiski was born in Schlochau, Kingdom of Prussia (now Człuchów, Poland).
Military service
Kasiski enlisted in ...
, author of the first published attack on the
Vigenère cipher
The Vigenère cipher () is a method of encryption, encrypting alphabetic text by using a series of interwoven Caesar ciphers, based on the letters of a keyword. It employs a form of polyalphabetic cipher, polyalphabetic substitution.
First desc ...
, now known as the
Kasiski test.
*
Auguste Kerckhoffs, known for contributing cipher design principles.
*
Edgar Allan Poe
Edgar Allan Poe (; Edgar Poe; January 19, 1809 – October 7, 1849) was an American writer, poet, editor, and literary critic. Poe is best known for his poetry and short stories, particularly his tales of mystery and the macabre. He is wide ...
, author of the book, ''A Few Words on Secret Writing'', an essay on cryptanalysis, and ''
The Gold Bug'', a short story featuring the use of letter frequencies in the solution of a cryptogram.
*
Johannes Trithemius, mystic and first to describe ''tableaux'' (tables) for use in
polyalphabetic substitution
A polyalphabetic cipher substitution, using multiple substitution alphabets. The Vigenère cipher is probably the best-known example of a polyalphabetic cipher, though it is a simplified special case. The Enigma machine is more complex but is sti ...
. Wrote an early work on
steganography
Steganography ( ) is the practice of representing information within another message or physical object, in such a manner that the presence of the information is not evident to human inspection. In computing/electronic contexts, a computer file, ...
and cryptography generally.
*
Philips van Marnix, lord of Sint-Aldegonde
Philips of Marnix, Lord of Saint-Aldegonde, Lord of West-Souburg (Dutch: Filips van Marnix, heer van Sint-Aldegonde, heer van West-Souburg, French: Philippe de Marnix, seigneur de Sainte-Aldegonde; 7 March/20 July 1540 – 15 December 1598) was a ...
, deciphered Spanish messages for
William the Silent
William the Silent (24 April 153310 July 1584), also known as William the Taciturn (translated from nl, Willem de Zwijger), or, more commonly in the Netherlands, William of Orange ( nl, Willem van Oranje), was the main leader of the Dutch Re ...
during the Dutch revolt against the Spanish.
*
John Wallis
John Wallis (; la, Wallisius; ) was an English clergyman and mathematician who is given partial credit for the development of infinitesimal calculus. Between 1643 and 1689 he served as chief cryptographer for Parliament and, later, the royal ...
codebreaker for Cromwell and Charles II
*
Sir Charles Wheatstone
Sir Charles Wheatstone FRS FRSE DCL LLD (6 February 1802 – 19 October 1875), was an English scientist and inventor of many scientific breakthroughs of the Victorian era, including the English concertina, the stereoscope (a device for dis ...
, inventor of the so-called
Playfair cipher
The Playfair cipher or Playfair square or Wheatstone–Playfair cipher is a manual symmetric encryption technique and was the first literal digram substitution cipher. The scheme was invented in 1854 by Charles Wheatstone, but bears the name of ...
and general polymath.
World War I and World War II wartime cryptographers
*
Arne Beurling
Arne Carl-August Beurling (3 February 1905 – 20 November 1986) was a Swedish mathematician and professor of mathematics at Uppsala University (1937–1954) and later at the Institute for Advanced Study in Princeton, New Jersey. Beurling worked ...
, Swedish mathematician and cryptograph.
*
Lambros D. Callimahos, US,
NSA
The National Security Agency (NSA) is a national-level intelligence agency of the United States Department of Defense, under the authority of the Director of National Intelligence (DNI). The NSA is responsible for global monitoring, collecti ...
, worked with William F. Friedman, taught NSA cryptanalysts.
*
Ann Z. Caracristi, US,
SIS, solved Japanese Army codes in World War II, later became deputy director of
National Security Agency
The National Security Agency (NSA) is a national-level intelligence agency of the United States Department of Defense, under the authority of the Director of National Intelligence (DNI). The NSA is responsible for global monitoring, collecti ...
.
*
Alec Naylor Dakin
Alec Naylor Dakin (3 April 1912 – 14 June 2003) was a Fellow of Oxford College, a cryptologist at Bletchley Park, an Egyptologist and schoolmaster.
Early life and family
Alec Dakin was born in Mytholmroyd in the West Riding of Yorkshire in ...
, UK,
Hut 4
Hut 4 was a wartime section of the Government Code and Cypher School (GC&CS) at Bletchley Park tasked with the translation, interpretation and distribution of '' Kriegsmarine'' (German navy) messages deciphered by Hut 8. The messages were largely ...
,
Bletchley park
Bletchley Park is an English country house and estate in Bletchley, Milton Keynes ( Buckinghamshire) that became the principal centre of Allied code-breaking during the Second World War. The mansion was constructed during the years following ...
during World War II.
*
Ludomir Danilewicz Ludomir Danilewicz (1905–1960) was a Polish engineer and, for some ten years before the outbreak of World War II, one of the four directors of the AVA Radio Company in Warsaw, Poland. AVA designed and built radio equipment for the Polish General ...
,
Poland
Poland, officially the Republic of Poland, is a country in Central Europe. It is divided into 16 administrative provinces called voivodeships, covering an area of . Poland has a population of over 38 million and is the fifth-most populous ...
,
Biuro Szyfrow
The Cipher Bureau, in Polish: ''Biuro Szyfrów'' (), was the interwar Polish General Staff's Second Department's unit charged with SIGINT and both cryptography (the ''use'' of ciphers and codes) and cryptanalysis (the ''study'' of ciphers and ...
, helped to construct the Enigma machine copies to break the ciphers.
*
Alastair Denniston
Commander Alexander "Alastair" Guthrie Denniston (1 December 1881 – 1 January 1961) was a Scottish codebreaker in Room 40, deputy head of the Government Code and Cypher School (GC&CS) and hockey player. Denniston was appointed operational he ...
, UK, director of
GC&CS
Government Communications Headquarters, commonly known as GCHQ, is an intelligence and security organisation responsible for providing signals intelligence (SIGINT) and information assurance (IA) to the government and armed forces of the Un ...
at
Bletchley Park
Bletchley Park is an English country house and estate in Bletchley, Milton Keynes ( Buckinghamshire) that became the principal centre of Allied code-breaking during the Second World War. The mansion was constructed during the years following ...
from 1919 to 1942.
*
Agnes Meyer Driscoll, US, broke several Japanese ciphers.
*
Genevieve Grotjan Feinstein
Genevieve Marie Grotjan Feinstein (April 30, 1913 – August 10, 2006) was an American mathematician and cryptanalyst. She worked for the Signals Intelligence Service throughout World War II, during which time she played an important role in deci ...
, US,
SIS, noticed the pattern that led to breaking
Purple
Purple is any of a variety of colors with hue between red and blue. In the RGB color model used in computer and television screens, purples are produced by mixing red and blue light. In the RYB color model historically used by painters, pu ...
.
*
Elizebeth Smith Friedman, US,
Coast Guard
A coast guard or coastguard is a maritime security organization of a particular country. The term embraces wide range of responsibilities in different countries, from being a heavily armed military force with customs and security duties to ...
and
US Treasury Department
The Department of the Treasury (USDT) is the national treasury and finance department of the federal government of the United States, where it serves as an executive department. The department oversees the Bureau of Engraving and Printing and ...
cryptographer, co-invented modern cryptography.
*
William F. Friedman
William Frederick Friedman (September 24, 1891 – November 12, 1969) was a US Army cryptographer who ran the research division of the Army's Signal Intelligence Service (SIS) in the 1930s, and parts of its follow-on services into the 1950s. ...
, US,
SIS, introduced statistical methods into
cryptography
Cryptography, or cryptology (from grc, , translit=kryptós "hidden, secret"; and ''graphein'', "to write", or ''-logia'', "study", respectively), is the practice and study of techniques for secure communication in the presence of adver ...
.
*
Cecilia Elspeth Giles
Cecilia Elspeth Giles CBE (18 September 1922 – 19 April 2020) was a Scottish university administrator and a Bletchley Park veteran.
Life
Giles was born in Dumfries, Scotland to Dr and Mrs Falconer Giles. Her father was a Reader in Ancient Gre ...
, UK,
Bletchley Park
Bletchley Park is an English country house and estate in Bletchley, Milton Keynes ( Buckinghamshire) that became the principal centre of Allied code-breaking during the Second World War. The mansion was constructed during the years following ...
*
Jack Good UK,
GC&CS
Government Communications Headquarters, commonly known as GCHQ, is an intelligence and security organisation responsible for providing signals intelligence (SIGINT) and information assurance (IA) to the government and armed forces of the Un ...
,
Bletchley Park
Bletchley Park is an English country house and estate in Bletchley, Milton Keynes ( Buckinghamshire) that became the principal centre of Allied code-breaking during the Second World War. The mansion was constructed during the years following ...
worked with
Alan Turing
Alan Mathison Turing (; 23 June 1912 – 7 June 1954) was an English mathematician, computer scientist, logician, cryptanalyst, philosopher, and theoretical biologist. Turing was highly influential in the development of theoretical com ...
on the statistical approach to cryptanalysis.
*
Nigel de Grey
Nigel de Grey (27 March 1886 – 25 May 1951) was a British codebreaker. Son of the rector of Copdock, Suffolk, and grandson of the 5th Lord Walsingham, he was educated at Eton College and became fluent in French and German. In 1907 he ...
, UK,
Room 40
Room 40, also known as 40 O.B. (old building; officially part of NID25), was the cryptanalysis section of the British Admiralty during the First World War.
The group, which was formed in October 1914, began when Rear-Admiral Henry Oliver, the ...
, played an important role in the decryption of the
Zimmermann Telegram during World War I.
*
Dillwyn Knox, UK,
Room 40
Room 40, also known as 40 O.B. (old building; officially part of NID25), was the cryptanalysis section of the British Admiralty during the First World War.
The group, which was formed in October 1914, began when Rear-Admiral Henry Oliver, the ...
and
GC&CS
Government Communications Headquarters, commonly known as GCHQ, is an intelligence and security organisation responsible for providing signals intelligence (SIGINT) and information assurance (IA) to the government and armed forces of the Un ...
, broke commercial
Enigma
Enigma may refer to:
*Riddle, someone or something that is mysterious or puzzling
Biology
*ENIGMA, a class of gene in the LIM domain
Computing and technology
* Enigma (company), a New York-based data-technology startup
* Enigma machine, a family ...
cipher as used by the
Abwehr (German military intelligence).
*
Solomon Kullback
Solomon Kullback (April 3, 1907August 5, 1994) was an American cryptanalyst and mathematician, who was one of the first three employees hired by William F. Friedman at the US Army's Signal Intelligence Service (SIS) in the 1930s, along with Fra ...
US,
SIS, helped break the Japanese
Red cipher, later Chief Scientist at the
National Security Agency
The National Security Agency (NSA) is a national-level intelligence agency of the United States Department of Defense, under the authority of the Director of National Intelligence (DNI). The NSA is responsible for global monitoring, collecti ...
.
*
Frank W. Lewis US, worked with William F. Friedman, puzzle master
*
William Hamilton Martin and Bernon F. Mitchell, U.S.
National Security Agency
The National Security Agency (NSA) is a national-level intelligence agency of the United States Department of Defense, under the authority of the Director of National Intelligence (DNI). The NSA is responsible for global monitoring, collecti ...
cryptologists who defected to the Soviet Union in 1960
*
Leo Marks
Leopold Samuel Marks, (24 September 1920 – 15 January 2001) was an English writer, screenwriter, and cryptographer. During the Second World War he headed the codes office supporting resistance agents in occupied Europe for the secret Special ...
UK,
SOE cryptography director, author and playwright.
*
Donald Michie
Donald Michie (; 11 November 1923 – 7 July 2007) was a British researcher in artificial intelligence. During World War II, Michie worked for the Government Code and Cypher School at Bletchley Park, contributing to the effort to solve " Tunny ...
UK,
GC&CS
Government Communications Headquarters, commonly known as GCHQ, is an intelligence and security organisation responsible for providing signals intelligence (SIGINT) and information assurance (IA) to the government and armed forces of the Un ...
,
Bletchley Park
Bletchley Park is an English country house and estate in Bletchley, Milton Keynes ( Buckinghamshire) that became the principal centre of Allied code-breaking during the Second World War. The mansion was constructed during the years following ...
worked on
Cryptanalysis of the Lorenz cipher
Cryptanalysis of the Lorenz cipher was the process that enabled the British to read high-level German army messages during World War II. The British Government Code and Cypher School (GC&CS) at Bletchley Park decrypted many communications betwee ...
and the
Colossus computer
Colossus was a set of computers developed by British codebreakers in the years 1943–1945 to help in the cryptanalysis of the Lorenz cipher. Colossus used thermionic valves (vacuum tubes) to perform Boolean and counting operations. Colossus ...
.
*
Max Newman
Maxwell Herman Alexander Newman, FRS, (7 February 1897 – 22 February 1984), generally known as Max Newman, was a British mathematician and codebreaker. His work in World War II led to the construction of Colossus, the world's first operatio ...
, UK,
GC&CS
Government Communications Headquarters, commonly known as GCHQ, is an intelligence and security organisation responsible for providing signals intelligence (SIGINT) and information assurance (IA) to the government and armed forces of the Un ...
,
Bletchley Park
Bletchley Park is an English country house and estate in Bletchley, Milton Keynes ( Buckinghamshire) that became the principal centre of Allied code-breaking during the Second World War. The mansion was constructed during the years following ...
headed the section that developed the
Colossus computer
Colossus was a set of computers developed by British codebreakers in the years 1943–1945 to help in the cryptanalysis of the Lorenz cipher. Colossus used thermionic valves (vacuum tubes) to perform Boolean and counting operations. Colossus ...
for
Cryptanalysis of the Lorenz cipher
Cryptanalysis of the Lorenz cipher was the process that enabled the British to read high-level German army messages during World War II. The British Government Code and Cypher School (GC&CS) at Bletchley Park decrypted many communications betwee ...
.
*
Georges Painvin
Georges Jean Painvin (; 28 January 1886 – 21 January 1980) was a French geologist and industrialist, best known as the cryptanalyst who broke the ADFGX/ADFGVX cipher used by the Germans during the First World War.
Early life
Painvin was born ...
French, broke the
ADFGVX cipher
In cryptography, the ADFGVX cipher was a manually applied field cipher used by the Imperial German Army during World War I. It was used to transmit messages secretly using wireless telegraphy. ADFGVX was in fact an extension of an earlier cipher ca ...
during the
First World War
World War I (28 July 1914 11 November 1918), often abbreviated as WWI, was one of the deadliest global conflicts in history. Belligerents included much of Europe, the Russian Empire, the United States, and the Ottoman Empire, with fightin ...
.
*
Marian Rejewski,
Poland
Poland, officially the Republic of Poland, is a country in Central Europe. It is divided into 16 administrative provinces called voivodeships, covering an area of . Poland has a population of over 38 million and is the fifth-most populous ...
,
Biuro Szyfrów, a Polish mathematician and cryptologist who, in 1932, solved the
Enigma machine with plugboard, the main cipher device then in use by Germany.
*
John Joseph Rochefort
Joseph John Rochefort (May 12, 1900 – July 20, 1976) was an American naval officer and cryptanalyst. He was a major figure in the United States Navy's cryptographic and intelligence operations from 1925 to 1946, particularly in the Battle of M ...
US, made major contributions to the break into
JN-25
The vulnerability of Japanese naval codes and ciphers was crucial to the conduct of World War II, and had an important influence on foreign relations between Japan and the west in the years leading up to the war as well. Every Japanese code was e ...
after the
attack on Pearl Harbor
The attack on Pearl HarborAlso known as the Battle of Pearl Harbor was a surprise military strike by the Imperial Japanese Navy Air Service upon the United States against the naval base at Pearl Harbor in Honolulu, Territory of Hawaii, j ...
.
*
Leo Rosen
Leo Rosen was a U.S. cryptanalyst who worked with Frank Rowlett at Signals Intelligence Service (S.I.S.) before the start of World War II on Japanese ciphers. Rowlett found a method to read the messages enciphered on the Japanese PURPLE machine ...
US,
SIS, deduced that the
Japanese Purple machine was built with stepping switches.
*
Frank Rowlett
Frank Byron Rowlett (May 2, 1908 – June 29, 1998) was an American cryptologist.
Life and career
Rowlett was born in Rose Hill, Lee County, Virginia and attended Emory & Henry College in Emory, Virginia. In 1929 he received a bachelor's d ...
US,
SIS, leader of the team that broke
Purple
Purple is any of a variety of colors with hue between red and blue. In the RGB color model used in computer and television screens, purples are produced by mixing red and blue light. In the RYB color model historically used by painters, pu ...
.
*
Jerzy Różycki
Jerzy Witold Różycki (; Vilshana, Ukraine, 24 July 1909 – 9 January 1942, Mediterranean Sea, near the Balearic Islands) was a Polish mathematician and cryptologist who worked at breaking German Enigma-machine ciphers before and during World ...
,
Poland
Poland, officially the Republic of Poland, is a country in Central Europe. It is divided into 16 administrative provinces called voivodeships, covering an area of . Poland has a population of over 38 million and is the fifth-most populous ...
,
Biuro Szyfrów, helped break German
Enigma
Enigma may refer to:
*Riddle, someone or something that is mysterious or puzzling
Biology
*ENIGMA, a class of gene in the LIM domain
Computing and technology
* Enigma (company), a New York-based data-technology startup
* Enigma machine, a family ...
ciphers.
*
Luigi Sacco
Luigi Sacco (1 August 1883 in Alba – 5 December 1970 in Rome) was an Italian general and cryptanalyst
Cryptanalysis (from the Greek ''kryptós'', "hidden", and ''analýein'', "to analyze") refers to the process of analyzing information systems ...
, Italy, Italian General and author of the ''Manual of Cryptography''.
*
Laurance Safford
Captain, U.S.N. Laurance Frye Safford (October 22, 1893 – May 15, 1973) was a U.S. Navy cryptologist. He established the Naval cryptologic organization after World War I, and headed the effort more or less constantly until shortly after the ...
US, chief cryptographer for the US Navy for 2 decades+, including World War II.
*
Abraham Sinkov
Abraham Sinkov (August 22, 1907 – January 19, 1998) was a US cryptanalyst. An early employee of the U.S. Army's Signals Intelligence Service, he held several leadership positions during World War II, transitioning to the new National Security A ...
US,
SIS.
*
John Tiltman
Brigadier John Hessell Tiltman, (25 May 1894 – 10 August 1982) was a British Army officer who worked in intelligence, often at or with the Government Code and Cypher School (GC&CS) starting in the 1920s. His intelligence work was largely conn ...
UK, Brigadier,
Room 40
Room 40, also known as 40 O.B. (old building; officially part of NID25), was the cryptanalysis section of the British Admiralty during the First World War.
The group, which was formed in October 1914, began when Rear-Admiral Henry Oliver, the ...
,
GC&CS
Government Communications Headquarters, commonly known as GCHQ, is an intelligence and security organisation responsible for providing signals intelligence (SIGINT) and information assurance (IA) to the government and armed forces of the Un ...
,
Bletchley Park
Bletchley Park is an English country house and estate in Bletchley, Milton Keynes ( Buckinghamshire) that became the principal centre of Allied code-breaking during the Second World War. The mansion was constructed during the years following ...
,
GCHQ
Government Communications Headquarters, commonly known as GCHQ, is an intelligence and security organisation responsible for providing signals intelligence (SIGINT) and information assurance (IA) to the government and armed forces of the Unit ...
,
NSA
The National Security Agency (NSA) is a national-level intelligence agency of the United States Department of Defense, under the authority of the Director of National Intelligence (DNI). The NSA is responsible for global monitoring, collecti ...
. Extraordinary length and range of cryptographic service
*
Alan Mathison Turing UK,
GC&CS
Government Communications Headquarters, commonly known as GCHQ, is an intelligence and security organisation responsible for providing signals intelligence (SIGINT) and information assurance (IA) to the government and armed forces of the Un ...
,
Bletchley Park
Bletchley Park is an English country house and estate in Bletchley, Milton Keynes ( Buckinghamshire) that became the principal centre of Allied code-breaking during the Second World War. The mansion was constructed during the years following ...
where he was chief cryptographer, inventor of the
Bombe
The bombe () was an electro-mechanical device used by British cryptologists to help decipher German Enigma-machine-encrypted secret messages during World War II. The US Navy and US Army later produced their own machines to the same functiona ...
that was used in decrypting
Enigma
Enigma may refer to:
*Riddle, someone or something that is mysterious or puzzling
Biology
*ENIGMA, a class of gene in the LIM domain
Computing and technology
* Enigma (company), a New York-based data-technology startup
* Enigma machine, a family ...
, mathematician, logician, and renowned pioneer of
Computer Science
Computer science is the study of computation, automation, and information. Computer science spans theoretical disciplines (such as algorithms, theory of computation, information theory, and automation) to Applied science, practical discipli ...
.
*
William Thomas Tutte
William Thomas Tutte OC FRS FRSC (; 14 May 1917 – 2 May 2002) was an English and Canadian codebreaker and mathematician. During the Second World War, he made a brilliant and fundamental advance in cryptanalysis of the Lorenz cipher, a majo ...
UK,
GC&CS
Government Communications Headquarters, commonly known as GCHQ, is an intelligence and security organisation responsible for providing signals intelligence (SIGINT) and information assurance (IA) to the government and armed forces of the Un ...
,
Bletchley Park
Bletchley Park is an English country house and estate in Bletchley, Milton Keynes ( Buckinghamshire) that became the principal centre of Allied code-breaking during the Second World War. The mansion was constructed during the years following ...
, with
John Tiltman
Brigadier John Hessell Tiltman, (25 May 1894 – 10 August 1982) was a British Army officer who worked in intelligence, often at or with the Government Code and Cypher School (GC&CS) starting in the 1920s. His intelligence work was largely conn ...
, broke Lorenz SZ 40/42 encryption machine (codenamed Tunny) leading to the development of the
Colossus computer
Colossus was a set of computers developed by British codebreakers in the years 1943–1945 to help in the cryptanalysis of the Lorenz cipher. Colossus used thermionic valves (vacuum tubes) to perform Boolean and counting operations. Colossus ...
.
*
William Stone Weedon, US,
*
Gordon Welchman
William Gordon Welchman (15 June 1906 – 8 October 1985) was a British mathematician. During World War II, he worked at Britain's secret codebreaking centre, "Station X" at Bletchley Park, where he was one of the most important contributors. ...
UK,
GC&CS
Government Communications Headquarters, commonly known as GCHQ, is an intelligence and security organisation responsible for providing signals intelligence (SIGINT) and information assurance (IA) to the government and armed forces of the Un ...
,
Bletchley Park
Bletchley Park is an English country house and estate in Bletchley, Milton Keynes ( Buckinghamshire) that became the principal centre of Allied code-breaking during the Second World War. The mansion was constructed during the years following ...
where he was head of Hut Six (German Army and Air Force
Enigma
Enigma may refer to:
*Riddle, someone or something that is mysterious or puzzling
Biology
*ENIGMA, a class of gene in the LIM domain
Computing and technology
* Enigma (company), a New York-based data-technology startup
* Enigma machine, a family ...
cipher.
decryption
In cryptography, encryption is the process of encoding information. This process converts the original representation of the information, known as plaintext, into an alternative form known as ciphertext. Ideally, only authorized parties can decip ...
), made an important contribution to the design of the
Bombe
The bombe () was an electro-mechanical device used by British cryptologists to help decipher German Enigma-machine-encrypted secret messages during World War II. The US Navy and US Army later produced their own machines to the same functiona ...
.
*
Herbert Yardley US,
MI8 (US), author "The American Black Chamber", worked in China as a cryptographer and briefly in Canada.
*
Henryk Zygalski
Henryk Zygalski (; 15 July 1908 – 30 August 1978) was a Polish mathematician and cryptologist who worked at breaking German Enigma ciphers before and during World War II.
Life
Zygalski was born on 15 July 1908 in Posen, German Empire (now Pozn ...
,
Poland
Poland, officially the Republic of Poland, is a country in Central Europe. It is divided into 16 administrative provinces called voivodeships, covering an area of . Poland has a population of over 38 million and is the fifth-most populous ...
,
Biuro Szyfrów, helped break German
Enigma
Enigma may refer to:
*Riddle, someone or something that is mysterious or puzzling
Biology
*ENIGMA, a class of gene in the LIM domain
Computing and technology
* Enigma (company), a New York-based data-technology startup
* Enigma machine, a family ...
ciphers.
*
Karl Stein German, Head of the Division IVa (security of own processes) at
Cipher Department of the High Command of the Wehrmacht
The Cipher Department of the High Command of the Wehrmacht (german: Amtsgruppe Wehrmachtnachrichtenverbindungen, Abteilung Chiffrierwesen) (also ''Oberkommando der Wehrmacht Chiffrierabteilung'' or ''Chiffrierabteilung of the High Command of the W ...
. Discoverer of
Stein manifold In mathematics, in the theory of several complex variables and complex manifolds, a Stein manifold is a complex submanifold of the vector space of ''n'' complex dimensions. They were introduced by and named after . A Stein space is similar to a Ste ...
.
*
Gisbert Hasenjaeger
Gisbert F. R. Hasenjaeger (June 1, 1919 – September 2, 2006) was a German mathematical logician. Independently and simultaneously with Leon Henkin in 1949, he developed a new proof of the completeness theorem of Kurt Gödel for predicate logi ...
German, Tester of the Enigma. Discovered new proof of the
completeness theorem
Complete may refer to:
Logic
* Completeness (logic)
* Completeness of a theory, the property of a theory that every formula in the theory's language or its negation is provable
Mathematics
* The completeness of the real numbers, which implies ...
of
Kurt Gödel
Kurt Friedrich Gödel ( , ; April 28, 1906 – January 14, 1978) was a logician, mathematician, and philosopher. Considered along with Aristotle and Gottlob Frege to be one of the most significant logicians in history, Gödel had an imme ...
for
predicate logic
First-order logic—also known as predicate logic, quantificational logic, and first-order predicate calculus—is a collection of formal systems used in mathematics, philosophy, linguistics, and computer science. First-order logic uses quantifie ...
.
*
Heinrich Scholz
Heinrich Scholz (; 17 December 1884 – 30 December 1956) was a German logician, philosopher, and Protestant theologian. He was a peer of Alan Turing who mentioned Scholz when writing with regard to the reception of " On Computable Numbers, w ...
German, Worked in Division IVa at
OKW. Logician and pen friend of Alan Turning.
*
Gottfried Köthe
Gottfried Maria Hugo Köthe (born 25 December 1905 in Graz – died 30 April 1989 in Frankfurt) was an Austrian mathematician working in abstract algebra and functional analysis.
Scientific career
In 1923 Köthe enrolled in the University o ...
German, Cryptanalyst at OKW. Mathematician created theory of
topological vector spaces
In mathematics, a topological vector space (also called a linear topological space and commonly abbreviated TVS or t.v.s.) is one of the basic structures investigated in functional analysis.
A topological vector space is a vector space that is als ...
.
*
Ernst Witt
Ernst Witt (26 June 1911 – 3 July 1991) was a German mathematician, one of the leading algebraists of his time.
Biography
Witt was born on the island of Alsen, then a part of the German Empire. Shortly after his birth, his parents moved the ...
German, Mathematician at OKW.
Mathematical Discoveries Named After Ernst Witt.
*
Helmut Grunsky
Helmut Grunsky (11 July 1904 – 5 June 1986) was a German mathematician who worked in complex analysis and geometric function theory. He introduced Grunsky's theorem and the Grunsky inequalities.
In 1936, he was appointed editor of ''Jahrbuch ...
German, worked in
complex analysis
Complex analysis, traditionally known as the theory of functions of a complex variable, is the branch of mathematical analysis that investigates Function (mathematics), functions of complex numbers. It is helpful in many branches of mathemati ...
and
geometric function theory
Geometric function theory is the study of geometric properties of analytic functions. A fundamental result in the theory is the Riemann mapping theorem.
Topics in geometric function theory
The following are some of the most important topics in ge ...
. He introduced
Grunsky's theorem In mathematics, Grunsky's theorem, due to the German mathematician Helmut Grunsky, is a result in complex analysis concerning Holomorphic function, holomorphic univalent functions defined on the unit disk in the complex numbers. The theorem states ...
and the
Grunsky inequalities.
*
Georg Hamel
Georg Karl Wilhelm Hamel (12 September 1877 – 4 October 1954) was a German mathematician with interests in mechanics, the foundations of mathematics and function theory.
Biography
Hamel was born in Düren, Rhenish Prussia. He studied at A ...
.
*
Oswald Teichmüller
Paul Julius Oswald Teichmüller (; 18 June 1913 – 11 September 1943) was a German mathematician who made contributions to complex analysis. He introduced quasiconformal mappings and differential geometric methods into the study of Riemann surf ...
German, Temporarily employed at OKW as cryptanalyst. Introduced
quasiconformal mapping
In mathematical complex analysis, a quasiconformal mapping, introduced by and named by , is a homeomorphism between plane domains which to first order takes small circles to small ellipses of bounded eccentricity.
Intuitively, let ''f'' : ''D' ...
s and
differential geometric methods into
complex analysis
Complex analysis, traditionally known as the theory of functions of a complex variable, is the branch of mathematical analysis that investigates Function (mathematics), functions of complex numbers. It is helpful in many branches of mathemati ...
. Described by
Friedrich L. Bauer
Friedrich Ludwig "Fritz" Bauer (10 June 1924 – 26 March 2015) was a German pioneer of computer science and professor at the Technical University of Munich.
Life
Bauer earned his Abitur in 1942 and served in the Wehrmacht during World War ...
as an extreme Nazi and a true genius.
*
Hans Rohrbach
Hans Rohrbach (27 February 1903 – 19 December 1993) was a German mathematician. He worked both as an algebraist and a number theorist and later worked as cryptanalyst at Pers Z S, the German Foreign Office cipher bureau, during World War II. ...
German, Mathematician at AA/Pers Z, the German department of state, civilian diplomatic cryptological agency.
*
Wolfgang Franz German, Mathematician who worked at OKW. Later significant discoveries in
Topology
In mathematics, topology (from the Greek language, Greek words , and ) is concerned with the properties of a mathematical object, geometric object that are preserved under Continuous function, continuous Deformation theory, deformations, such ...
.
*
Werner Weber German, Mathematician at OKW.
*
Georg Aumann
Georg Aumann (11 November 1906, Munich, Germany – 4 August 1980), was a German mathematician. He was known for his work in general topology and regulated functions. During World War II, he worked as part of a group of five mathematicians, rec ...
German, Mathematician at OKW. His doctoral student was
Friedrich L. Bauer
Friedrich Ludwig "Fritz" Bauer (10 June 1924 – 26 March 2015) was a German pioneer of computer science and professor at the Technical University of Munich.
Life
Bauer earned his Abitur in 1942 and served in the Wehrmacht during World War ...
.
*
Otto Leiberich
Otto Leiberich (5 December 1927 in Crailsheim - 23 June 2015) was a German cryptologist and mathematician. Leiberich is most notable for establishing the Bundesamt für Sicherheit in der Informationstechnik in 1991.
Life
Leiberich started his ...
German, Mathematician who worked as a linguist at the
Cipher Department of the High Command of the Wehrmacht
The Cipher Department of the High Command of the Wehrmacht (german: Amtsgruppe Wehrmachtnachrichtenverbindungen, Abteilung Chiffrierwesen) (also ''Oberkommando der Wehrmacht Chiffrierabteilung'' or ''Chiffrierabteilung of the High Command of the W ...
.
*
Alexander Aigner
Alexander Aigner (18 May 1909 – 2 September 1988) was number theorist and a full university professor for mathematics at the Karl Franzens University in Graz, Austria. During World War II he was part of a group of five mathematicians, whic ...
German, Mathematician who worked at OKW.
*
Erich Hüttenhain
Erich Hüttenhain (26 January 1905 in Siegen – 1 December 1990 in Brühl (Rhineland), Brühl) was a German academic mathematician and cryptographer (Cryptography) and considered a leading Cryptanalysis, cryptanalyst in the Third Reich. He w ...
German, Chief cryptanalyst of and led Chi IV (section 4) of the
Cipher Department of the High Command of the Wehrmacht
The Cipher Department of the High Command of the Wehrmacht (german: Amtsgruppe Wehrmachtnachrichtenverbindungen, Abteilung Chiffrierwesen) (also ''Oberkommando der Wehrmacht Chiffrierabteilung'' or ''Chiffrierabteilung of the High Command of the W ...
. A German mathematician and cryptanalyst who tested a number of German cipher machines and found them to be breakable.
*
Wilhelm Fenner German, Chief Cryptologist and Director of
Cipher Department of the High Command of the Wehrmacht
The Cipher Department of the High Command of the Wehrmacht (german: Amtsgruppe Wehrmachtnachrichtenverbindungen, Abteilung Chiffrierwesen) (also ''Oberkommando der Wehrmacht Chiffrierabteilung'' or ''Chiffrierabteilung of the High Command of the W ...
.
*
Walther Fricke German, Worked alongside Dr Erich Hüttenhain at
Cipher Department of the High Command of the Wehrmacht
The Cipher Department of the High Command of the Wehrmacht (german: Amtsgruppe Wehrmachtnachrichtenverbindungen, Abteilung Chiffrierwesen) (also ''Oberkommando der Wehrmacht Chiffrierabteilung'' or ''Chiffrierabteilung of the High Command of the W ...
. Mathematician, logician, cryptanalyst and linguist.
*
Fritz Menzer
Ostwin Fritz Menzer (6 April 1908 in Herrndorf near Niederschöna in Saxony between Chemnitz and Dresden – 25 October 2005 in Bad Homburg vor der Höhe) was a German cryptologist, who before and during World War II, worked in the In 7/VI, the ...
German. Inventor of SG39 and SG41.
Other pre-computer
*
Rosario Candela
Rosario Candela (March 7, 1890 – October 3, 1953) was an Italian American architect who achieved renown through his apartment building designs in New York City, primarily during the boom years of the 1920s. He is credited with defining the cit ...
, US, Architect and notable amateur cryptologist who authored books and taught classes on the subject to civilians at
Hunter College
Hunter College is a public university in New York City. It is one of the constituent colleges of the City University of New York and offers studies in more than one hundred undergraduate and postgraduate fields across five schools. It also admi ...
.
*
Claude Elwood Shannon
Claude Elwood Shannon (April 30, 1916 – February 24, 2001) was an American mathematician, electrical engineer, and cryptographer known as a "father of information theory".
As a 21-year-old master's degree student at the Massachusetts Institu ...
, US, founder of
information theory
Information theory is the scientific study of the quantification (science), quantification, computer data storage, storage, and telecommunication, communication of information. The field was originally established by the works of Harry Nyquist a ...
, proved the
one-time pad
In cryptography, the one-time pad (OTP) is an encryption technique that cannot be cracked, but requires the use of a single-use pre-shared key that is not smaller than the message being sent. In this technique, a plaintext is paired with a ran ...
to be unbreakable.
Modern
See also:
Modern cryptographers for a more exhaustive list.
Symmetric-key algorithm inventors
*
Ross Anderson, UK,
University of Cambridge
, mottoeng = Literal: From here, light and sacred draughts.
Non literal: From this place, we gain enlightenment and precious knowledge.
, established =
, other_name = The Chancellor, Masters and Schola ...
, co-inventor of the
Serpent
Serpent or The Serpent may refer to:
* Snake, a carnivorous reptile of the suborder Serpentes
Mythology and religion
* Sea serpent, a monstrous ocean creature
* Serpent (symbolism), the snake in religious rites and mythological contexts
* Serp ...
cipher.
*
Paulo S. L. M. Barreto
Paulo S. L. M. Barreto (born 1965) is a Brazilian cryptographer and one of the designers of the Whirlpool (algorithm), Whirlpool cryptographic hash function, hash function and the block ciphers Anubis (cipher), Anubis and KHAZAD, together with Vin ...
, Brazilian,
University of São Paulo
The University of São Paulo ( pt, Universidade de São Paulo, USP) is a public university in the Brazilian state of São Paulo. It is the largest Brazilian public university and the country's most prestigious educational institution, the bes ...
, co-inventor of the
Whirlpool hash function.
*
George Blakley
George Robert (Bob) Blakley Jr. was an American cryptographer and a professor of mathematics at Texas A&M University, best known for inventing a secret sharing scheme in 1979 (see ).
Biography
Blakley did his undergraduate studies in physics at Ge ...
, US, independent inventor of
secret sharing
Secret sharing (also called secret splitting) refers to methods for distributing a secret among a group, in such a way that no individual holds any intelligible information about the secret, but when a sufficient number of individuals combine th ...
.
*
Eli Biham
Eli Biham ( he, אלי ביהם) is an Israeli cryptographer and cryptanalyst, currently a professor at the Technion - Israel Institute of Technology Computer Science department. Starting from October 2008 and till 2013, Biham was the dean of t ...
, Israel, co-inventor of the
Serpent
Serpent or The Serpent may refer to:
* Snake, a carnivorous reptile of the suborder Serpentes
Mythology and religion
* Sea serpent, a monstrous ocean creature
* Serpent (symbolism), the snake in religious rites and mythological contexts
* Serp ...
cipher.
*
Don Coppersmith
Don Coppersmith (born 1950) is a cryptographer and mathematician. He was involved in the design of the Data Encryption Standard block cipher at IBM, particularly the design of the S-boxes, strengthening them against differential cryptanalysi ...
, co-inventor of
DES
Des is a masculine given name, mostly a short form (hypocorism) of Desmond. People named Des include:
People
* Des Buckingham, English football manager
* Des Corcoran, (1928–2004), Australian politician
* Des Dillon (disambiguation), sever ...
and
MARS
Mars is the fourth planet from the Sun and the second-smallest planet in the Solar System, only being larger than Mercury (planet), Mercury. In the English language, Mars is named for the Mars (mythology), Roman god of war. Mars is a terr ...
ciphers.
*
Joan Daemen
Joan Daemen (; born 1965) is a Belgian cryptographer who co-designed with Vincent Rijmen the Rijndael cipher, which was selected as the Advanced Encryption Standard (AES) in 2001. More recently, he co-designed the Keccak cryptographic hash, w ...
, Belgian, co-developer of
Rijndael which became the
Advanced Encryption Standard
The Advanced Encryption Standard (AES), also known by its original name Rijndael (), is a specification for the encryption of electronic data established by the U.S. National Institute of Standards and Technology (NIST) in 2001.
AES is a variant ...
(AES), and
Keccak
SHA-3 (Secure Hash Algorithm 3) is the latest member of the Secure Hash Algorithm family of standards, released by NIST on August 5, 2015. Although part of the same series of standards, SHA-3 is internally different from the MD5-like stru ...
which became
SHA-3
SHA-3 (Secure Hash Algorithm 3) is the latest member of the Secure Hash Algorithm family of standards, released by NIST on August 5, 2015. Although part of the same series of standards, SHA-3 is internally different from the MD5-like struc ...
.
*
Horst Feistel
Horst Feistel (January 30, 1915 – November 14, 1990) was a German-American cryptographer who worked on the design of ciphers at IBM, initiating research that culminated in the development of the Data Encryption Standard (DES) in the 1970s. The ...
, German,
IBM, namesake of
Feistel network
In cryptography, a Feistel cipher (also known as Luby–Rackoff block cipher) is a symmetric structure used in the construction of block ciphers, named after the German-born physicist and cryptographer Horst Feistel, who did pioneering research w ...
s and
Lucifer
Lucifer is one of various figures in folklore associated with the planet Venus. The entity's name was subsequently absorbed into Christianity as a name for the devil. Modern scholarship generally translates the term in the relevant Bible passage ...
cipher.
*
Lars Knudsen
Lars Ramkilde Knudsen (born 21 February 1962) is a Danish researcher in cryptography, particularly interested in the design and analysis of block ciphers, hash functions and message authentication codes (MACs).
Academic
After some early work ...
,
Denmark
)
, song = ( en, "King Christian stood by the lofty mast")
, song_type = National and royal anthem
, image_map = EU-Denmark.svg
, map_caption =
, subdivision_type = Sovereign state
, subdivision_name = Danish Realm, Kingdom of Denmark
...
, co-inventor of the
Serpent
Serpent or The Serpent may refer to:
* Snake, a carnivorous reptile of the suborder Serpentes
Mythology and religion
* Sea serpent, a monstrous ocean creature
* Serpent (symbolism), the snake in religious rites and mythological contexts
* Serp ...
cipher.
*
Ralph Merkle
Ralph C. Merkle (born February 2, 1952) is a computer scientist and mathematician. He is one of the inventors of public-key cryptography, the inventor of cryptographic hashing, and more recently a researcher and speaker on cryonics.
Contribution ...
, US, inventor of
Merkle tree
In cryptography and computer science, a hash tree or Merkle tree is a tree in which every "leaf" (node) is labelled with the cryptographic hash of a data block, and every node that is not a leaf (called a ''branch'', ''inner node'', or ''inode'') ...
s.
*
Bart Preneel, Belgian, co-inventor of
RIPEMD-160.
*
Vincent Rijmen
Vincent Rijmen (; born 16 October 1970) is a Belgian cryptographer and one of the two designers of the Rijndael, the Advanced Encryption Standard. Rijmen is also the co-designer of the WHIRLPOOL cryptographic hash function, and the block cipher ...
, Belgian, co-developer of
Rijndael which became the
Advanced Encryption Standard
The Advanced Encryption Standard (AES), also known by its original name Rijndael (), is a specification for the encryption of electronic data established by the U.S. National Institute of Standards and Technology (NIST) in 2001.
AES is a variant ...
(AES).
*
Ronald L. Rivest
Ronald Linn Rivest (; born May 6, 1947) is a cryptographer and an Institute Professor at MIT. He is a member of MIT's Department of Electrical Engineering and Computer Science (EECS) and a member of MIT's Computer Science and Artificial Inte ...
, US,
MIT
The Massachusetts Institute of Technology (MIT) is a private land-grant research university in Cambridge, Massachusetts. Established in 1861, MIT has played a key role in the development of modern technology and science, and is one of the m ...
, inventor of
RC cipher series and
MD algorithm series.
*
Bruce Schneier
Bruce Schneier (; born January 15, 1963) is an American cryptographer, computer security professional, privacy specialist, and writer. Schneier is a Lecturer in Public Policy at the Harvard Kennedy School and a Fellow at the Berkman Klein Cente ...
, US, inventor of
Blowfish
Tetraodontidae is a family of primarily marine and estuarine fish of the order Tetraodontiformes. The family includes many familiar species variously called pufferfish, puffers, balloonfish, blowfish, blowies, bubblefish, globefish, swellfis ...
and co-inventor of
Twofish
In cryptography, Twofish is a symmetric key block cipher with a block size of 128 bits and key sizes up to 256 bits. It was one of the five finalists of the Advanced Encryption Standard contest, but it was not selected for standardization. Twof ...
and
Threefish
Threefish is a symmetric-key tweakable block cipher designed as part of the Skein hash function, an entry in the NIST hash function competition. Threefish uses no S-boxes or other table lookups in order to avoid cache timing attacks; The paper ...
.
*
Xuejia Lai
Xuejia Lai () is a cryptographer, currently a professor at Shanghai Jiao Tong University. His notable work includes the design of the block cipher IDEA based on the Lai-Massey scheme, the theory of Markov ciphers, and the cryptanalysis of a num ...
, CH, co-inventor of
International Data Encryption Algorithm
In cryptography, the International Data Encryption Algorithm (IDEA), originally called Improved Proposed Encryption Standard (IPES), is a symmetric-key block cipher designed by James Massey of ETH Zurich and Xuejia Lai and was first described in ...
(IDEA).
*
Adi Shamir
Adi Shamir ( he, עדי שמיר; born July 6, 1952) is an Israeli cryptographer. He is a co-inventor of the Rivest–Shamir–Adleman (RSA) algorithm (along with Ron Rivest and Len Adleman), a co-inventor of the Feige–Fiat–Shamir identifi ...
, Israel,
Weizmann Institute
The Weizmann Institute of Science ( he, מכון ויצמן למדע ''Machon Vaitzman LeMada'') is a public research university in Rehovot, Israel, established in 1934, 14 years before the State of Israel. It differs from other Israeli univ ...
, inventor of
secret sharing
Secret sharing (also called secret splitting) refers to methods for distributing a secret among a group, in such a way that no individual holds any intelligible information about the secret, but when a sufficient number of individuals combine th ...
.
Asymmetric-key algorithm inventors
*
Leonard Adleman
Leonard Adleman (born December 31, 1945) is an American computer scientist. He is one of the creators of the RSA encryption algorithm, for which he received the 2002 Turing Award, often called the Nobel prize of Computer science. He is also kno ...
, US,
USC, the 'A' in
RSA.
*
David Chaum
David Lee Chaum (born 1955) is an American computer scientist, cryptographer, and inventor. He is known as a pioneer in cryptography and privacy-preserving technologies, and widely recognized as the inventor of digital cash. His 1982 dissertatio ...
, US, inventor of
blind signature
In cryptography a blind signature, as introduced by David Chaum, is a form of digital signature in which the content of a message is disguised ( blinded) before it is signed. The resulting blind signature can be publicly verified against the origin ...
s.
*
Clifford Cocks
Clifford Christopher Cocks (born 28 December 1950) is a British mathematician and cryptographer.
In 1973, while working at the United Kingdom Government Communications Headquarters (GCHQ), he invented a public-key cryptography algorithm equiv ...
, UK
GCHQ
Government Communications Headquarters, commonly known as GCHQ, is an intelligence and security organisation responsible for providing signals intelligence (SIGINT) and information assurance (IA) to the government and armed forces of the Unit ...
first inventor of
RSA, a fact that remained secret until 1997 and so was unknown to
Rivest,
Shamir, and
Adleman.
*
Whitfield Diffie
Bailey Whitfield 'Whit' Diffie (born June 5, 1944), ForMemRS, is an American cryptographer and mathematician and one of the pioneers of public-key cryptography along with Martin Hellman and Ralph Merkle. Diffie and Hellman's 1976 paper ''New Dire ...
, US, (public) co-inventor of the
Diffie-Hellman key-exchange protocol.
*
Taher Elgamal
Taher Elgamal (Arabic: طاهر الجمل) (born 18 August 1955) is an Egyptian cryptographer and entrepreneur. He has served as the Chief Technology Officer (CTO) of Security at Salesforce since 2013. Prior to that, he was the founder and CEO ...
, US (born Egyptian), inventor of the
Elgamal discrete log cryptosystem.
*
Shafi Goldwasser
en, Shafrira Goldwasser
, name = Shafi Goldwasser
, image = Shafi Goldwasser.JPG
, caption = Shafi Goldwasser in 2010
, birth_place = New York City, New York, U.S.
, birth_date =
, death_date ...
, US and Israel,
MIT
The Massachusetts Institute of Technology (MIT) is a private land-grant research university in Cambridge, Massachusetts. Established in 1861, MIT has played a key role in the development of modern technology and science, and is one of the m ...
and
Weizmann Institute
The Weizmann Institute of Science ( he, מכון ויצמן למדע ''Machon Vaitzman LeMada'') is a public research university in Rehovot, Israel, established in 1934, 14 years before the State of Israel. It differs from other Israeli univ ...
, co-discoverer of
zero-knowledge proofs
In cryptography, a zero-knowledge proof or zero-knowledge protocol is a method by which one party (the prover) can prove to another party (the verifier) that a given statement is true while the prover avoids conveying any additional information a ...
, and of
Semantic security.
*
Martin Hellman
Martin Edward Hellman (born October 2, 1945) is an American cryptologist and mathematician, best known for his involvement with public key cryptography in cooperation with Whitfield Diffie and Ralph Merkle. Hellman is a longtime contributor to th ...
, US, (public) co-inventor of the
Diffie-Hellman key-exchange protocol.
*
Neal Koblitz
Neal I. Koblitz (born December 24, 1948) is a Professor of Mathematics at the University of Washington. He is also an adjunct professor with the Centre for Applied Cryptographic Research at the University of Waterloo. He is the creator of hyp ...
, independent co-creator of
elliptic curve cryptography
Elliptic-curve cryptography (ECC) is an approach to public-key cryptography based on the algebraic structure of elliptic curves over finite fields. ECC allows smaller keys compared to non-EC cryptography (based on plain Galois fields) to provide e ...
.
*
Alfred Menezes
Alfred Menezes is co-author of several books on cryptography, including the ''Handbook of Applied Cryptography'', and is a professor of mathematics at the University of Waterloo in Canada. , co-inventor of
MQV
MQV (Menezes–Qu–Vanstone) is an authenticated protocol for key agreement based on the Diffie–Hellman scheme. Like other authenticated Diffie–Hellman schemes, MQV provides protection against an active attacker. The protocol can be modifi ...
, an
elliptic curve
In mathematics, an elliptic curve is a smooth, projective, algebraic curve of genus one, on which there is a specified point . An elliptic curve is defined over a field and describes points in , the Cartesian product of with itself. If ...
technique.
*
Silvio Micali
Silvio Micali (born October 13, 1954) is an Italian computer scientist, professor at the Massachusetts Institute of Technology and the founder of Algorand. Micali's research centers on cryptography and information security.
In 2012, he received ...
, US (born Italian),
MIT
The Massachusetts Institute of Technology (MIT) is a private land-grant research university in Cambridge, Massachusetts. Established in 1861, MIT has played a key role in the development of modern technology and science, and is one of the m ...
, co-discoverer of
zero-knowledge proofs
In cryptography, a zero-knowledge proof or zero-knowledge protocol is a method by which one party (the prover) can prove to another party (the verifier) that a given statement is true while the prover avoids conveying any additional information a ...
, and of
Semantic security.
*
Victor Miller, independent co-creator of
elliptic curve cryptography
Elliptic-curve cryptography (ECC) is an approach to public-key cryptography based on the algebraic structure of elliptic curves over finite fields. ECC allows smaller keys compared to non-EC cryptography (based on plain Galois fields) to provide e ...
.
*
David Naccache
David Naccache is a cryptographer, currently a professor at the École normale supérieure and a member of its Computer Laboratory. He was previously a professor at Panthéon-Assas University.
Biography
He received his Ph.D. in 1995 from the ...
, inventor of the
Naccache–Stern cryptosystem
The Naccache–Stern cryptosystem is a homomorphic public-key cryptosystem whose security rests on the higher residuosity problem. The Naccache–Stern cryptosystem was discovered by David Naccache and Jacques Stern in 1998.
Scheme Definition
L ...
and of the
Naccache–Stern knapsack cryptosystem.
*
Moni Naor
Moni Naor ( he, מוני נאור) is an Israeli computer scientist, currently a professor at the Weizmann Institute of Science. Naor received his Ph.D. in 1989 at the University of California, Berkeley. His advisor was Manuel Blum.
He works i ...
, co-inventor the Naor–Yung encryption paradigm for
CCA security.
*
Rafail Ostrovsky
Rafail Ostrovsky is a distinguished professor of computer science and mathematics at UCLA and a well-known researcher in algorithms and cryptography.
Biography
Rafail Ostrovsky received his Ph.D. from MIT in 1992.
He is a member of the editoria ...
, co-inventor of
Oblivious RAM, of single-server
Private Information Retrieval In cryptography, a private information retrieval (PIR) protocol is a protocol that allows a user to retrieve an item from a server in possession of a database without revealing which item is retrieved. PIR is a weaker version of 1-out-of-''n'' obli ...
, and
proactive cryptosystems.
*
Pascal Paillier, inventor of
Paillier encryption.
*
Michael O. Rabin
Michael Oser Rabin ( he, מִיכָאֵל עוזר רַבִּין; born September 1, 1931) is an Israeli mathematician and computer scientist and a recipient of the Turing Award.
Biography Early life and education
Rabin was born in 1931 in ...
, Israel, inventor of
Rabin encryption
The Rabin cryptosystem is a family of public-key encryption schemes
based on a trapdoor function whose security, like that of RSA (algorithm), RSA, is related to the difficulty of integer factorization.
The Rabin trapdoor function has the advanta ...
.
*
Ronald L. Rivest
Ronald Linn Rivest (; born May 6, 1947) is a cryptographer and an Institute Professor at MIT. He is a member of MIT's Department of Electrical Engineering and Computer Science (EECS) and a member of MIT's Computer Science and Artificial Inte ...
, US,
MIT
The Massachusetts Institute of Technology (MIT) is a private land-grant research university in Cambridge, Massachusetts. Established in 1861, MIT has played a key role in the development of modern technology and science, and is one of the m ...
, the 'R' in
RSA.
*
Adi Shamir
Adi Shamir ( he, עדי שמיר; born July 6, 1952) is an Israeli cryptographer. He is a co-inventor of the Rivest–Shamir–Adleman (RSA) algorithm (along with Ron Rivest and Len Adleman), a co-inventor of the Feige–Fiat–Shamir identifi ...
, Israel,
Weizmann Institute
The Weizmann Institute of Science ( he, מכון ויצמן למדע ''Machon Vaitzman LeMada'') is a public research university in Rehovot, Israel, established in 1934, 14 years before the State of Israel. It differs from other Israeli univ ...
, the 'S' in
RSA.
*
Moti Yung
Mordechai M. "Moti" Yung is a cryptographer and computer scientist known for his work on cryptovirology and kleptography.
Career
Yung earned his PhD from Columbia University in 1988 under the supervision of Zvi Galil. In the past, he worked at th ...
, co-inventor of the Naor–Yung encryption paradigm for
CCA security, of
threshold cryptosystem A threshold cryptosystem, the basis for the field of threshold cryptography, is a cryptosystem that protects information by encrypting it and distributing it among a cluster of fault-tolerant computers. The message is encrypted using a public key, ...
s, and
proactive cryptosystems.
Cryptanalysts
*
Joan Clarke
Joan Elisabeth Lowther Murray, MBE (''née'' Clarke; 24 June 1917 – 4 September 1996) was an English cryptanalyst and numismatist best known for her work as a code-breaker at Bletchley Park during the Second World War. Although she did not ...
, English cryptanalyst and numismatist best known for her work as a code-breaker at Bletchley Park during the Second World War.
*
Ross Anderson, UK.
*
Eli Biham
Eli Biham ( he, אלי ביהם) is an Israeli cryptographer and cryptanalyst, currently a professor at the Technion - Israel Institute of Technology Computer Science department. Starting from October 2008 and till 2013, Biham was the dean of t ...
, Israel, co-discoverer of
differential cryptanalysis and
Related-key attack
In cryptography, a related-key attack is any form of cryptanalysis where the attacker can observe the operation of a cipher under several different keys whose values are initially unknown, but where some mathematical relationship connecting the ke ...
.
*
Matt Blaze
Matt may refer to:
*Matt (name), people with the given name ''Matt'' or Matthew, meaning "gift from God", or the surname Matt
*In British English, of a surface: having a non-glossy finish, see gloss (material appearance)
*Matt, Switzerland, a mu ...
, US.
*
Dan Boneh
Dan Boneh (; he, דן בונה) is an Israeli-American professor in applied cryptography and computer security at Stanford University.
In 2016, Boneh was elected a member of the National Academy of Engineering for contributions to the theory an ...
, US,
Stanford University
Stanford University, officially Leland Stanford Junior University, is a private research university in Stanford, California. The campus occupies , among the largest in the United States, and enrolls over 17,000 students. Stanford is consider ...
.
*
Niels Ferguson, Netherlands, co-inventor of Twofish and Fortuna.
*
Ian Goldberg
Ian Avrum Goldberg (born March 31, 1973) is a cryptographer and cypherpunk. He is best known for breaking Netscape's implementation of SSL (with David Wagner),
and for his role as chief scientist of Radialpoint (formerly Zero Knowledge Syste ...
, Canada,
University of Waterloo
The University of Waterloo (UWaterloo, UW, or Waterloo) is a public research university with a main campus in Waterloo, Ontario
Waterloo is a city in the Canadian province of Ontario. It is one of three cities in the Regional Municipality ...
.
*
Lars Knudsen
Lars Ramkilde Knudsen (born 21 February 1962) is a Danish researcher in cryptography, particularly interested in the design and analysis of block ciphers, hash functions and message authentication codes (MACs).
Academic
After some early work ...
, Denmark,
DTU, discovered
integral cryptanalysis
In cryptography, integral cryptanalysis is a cryptanalytic attack that is particularly applicable to block ciphers based on substitution–permutation networks. It was originally designed by Lars Knudsen as a dedicated attack against Square, so ...
.
*
Paul Kocher, US, discovered
differential power analysis
Power analysis is a form of side channel attack in which the attacker studies the power consumption of a cryptographic hardware device. These attacks rely on basic physical properties of the device: semiconductor devices are governed by the l ...
.
*
Mitsuru Matsui
is a Japanese cryptographer and senior researcher for Mitsubishi Electric Company.
Career
While researching error-correcting codes in 1990, Matsui was inspired by Eli Biham and Adi Shamir's differential cryptanalysis, and discovered the techni ...
, Japan, discoverer of
linear cryptanalysis
In cryptography, linear cryptanalysis is a general form of cryptanalysis based on finding affine approximations to the action of a cipher. Attacks have been developed for block ciphers and stream ciphers. Linear cryptanalysis is one of the two mos ...
.
*
David Wagner, US,
UC Berkeley
The University of California, Berkeley (UC Berkeley, Berkeley, Cal, or California) is a public university, public land-grant university, land-grant research university in Berkeley, California. Established in 1868 as the University of Californi ...
, co-discoverer of the
slide
Slide or Slides may refer to:
Places
* Slide, California, former name of Fortuna, California
Arts, entertainment, and media Music Albums
* ''Slide'' (Lisa Germano album), 1998
* ''Slide'' (George Clanton album), 2018
*''Slide'', by Patrick Glees ...
and
boomerang attack
In cryptography, the boomerang attack is a method for the cryptanalysis of block ciphers based on differential cryptanalysis. The attack was published in 1999 by David Wagner, who used it to break the COCONUT98 cipher.
The boomerang attack ...
s.
*
Xiaoyun Wang
Wang Xiaoyun (; born 1966) is a Chinese cryptographer, mathematician, and computer scientist. She is a professor in the Department of Mathematics and System Science of Shandong University and an academician of the Chinese Academy of Sciences.
Ear ...
, the People's Republic of China, known for
MD5 and
SHA-1
In cryptography, SHA-1 (Secure Hash Algorithm 1) is a cryptographically broken but still widely used hash function which takes an input and produces a 160-bit (20- byte) hash value known as a message digest – typically rendered as 40 hexadec ...
hash function
A hash function is any function that can be used to map data of arbitrary size to fixed-size values. The values returned by a hash function are called ''hash values'', ''hash codes'', ''digests'', or simply ''hashes''. The values are usually u ...
attacks.
*
Alex Biryukov,
University of Luxembourg
The University of Luxembourg (French: ''Université du Luxembourg''; German: ''Universität Luxemburg''; Luxembourgish: ''Universitéit Lëtzebuerg'') is a public research university in Luxembourg.
History
The University of Luxembourg was found ...
, known for
impossible differential cryptanalysis
In cryptography, impossible differential cryptanalysis is a form of differential cryptanalysis for block ciphers. While ordinary differential cryptanalysis tracks differences that propagate through the cipher with greater than expected probability, ...
and
slide attack
The slide attack is a form of cryptanalysis designed to deal with the prevailing idea that even weak ciphers can become very strong by increasing the number of rounds, which can ward off a differential attack. The slide attack works in such a way ...
.
*
Moti Yung
Mordechai M. "Moti" Yung is a cryptographer and computer scientist known for his work on cryptovirology and kleptography.
Career
Yung earned his PhD from Columbia University in 1988 under the supervision of Zvi Galil. In the past, he worked at th ...
,
Kleptography
Kleptography is the study of stealing information securely and subliminally. The term was introduced by Adam Young and Moti Yung in the Proceedings of Advances in Cryptology—Crypto '96.A. Young, M. Yung, "The Dark Side of Black-Box Cryptography ...
.
Algorithmic number theorists
*
Daniel J. Bernstein, US, developed several popular algorithms, fought US government restrictions in ''
Bernstein v. United States.''
*
Don Coppersmith
Don Coppersmith (born 1950) is a cryptographer and mathematician. He was involved in the design of the Data Encryption Standard block cipher at IBM, particularly the design of the S-boxes, strengthening them against differential cryptanalysi ...
, US
*
Dorian M. Goldfeld
Dorian Morris Goldfeld (born January 21, 1947) is an American mathematician working in analytic number theory and automorphic forms at Columbia University.
Professional career
Goldfeld received his B.S. degree in 1967 from Columbia University. ...
, US. Along with Michael Anshel and Iris Anshel invented the
Anshel–Anshel–Goldfeld key exchange Anshel–Anshel–Goldfeld protocol, also known as a commutator key exchange, is a key-exchange protocol using nonabelian groups. It was invented by Drs. Michael Anshel, Iris Anshel, and Dorian M. Goldfeld, Dorian Goldfeld. Unlike other group-based ...
and the
Algebraic Eraser. They also helped found
Braid Group Cryptography.
Theoreticians
*
Mihir Bellare
Mihir Bellare is a cryptographer and professor at the University of California San Diego. He has published several seminal papers in the field of cryptography (notably in the area of provable security), many of which were co-written with Phillip R ...
, US,
UCSD
The University of California, San Diego (UC San Diego or colloquially, UCSD) is a public university, public Land-grant university, land-grant research university in San Diego, California. Established in 1960 near the pre-existing Scripps Insti ...
, co-proposer of the
Random oracle
In cryptography, a random oracle is an oracle (a theoretical black box) that responds to every ''unique query'' with a (truly) random response chosen uniformly from its output domain. If a query is repeated, it responds the same way every time th ...
model.
*
Dan Boneh
Dan Boneh (; he, דן בונה) is an Israeli-American professor in applied cryptography and computer security at Stanford University.
In 2016, Boneh was elected a member of the National Academy of Engineering for contributions to the theory an ...
, US,
Stanford
Stanford University, officially Leland Stanford Junior University, is a private research university in Stanford, California. The campus occupies , among the largest in the United States, and enrolls over 17,000 students. Stanford is considere ...
.
*
Gilles Brassard
Gilles Brassard, is a faculty member of the Université de Montréal, where he has been a Full Professor since 1988 and Canada Research Chair since 2001.
Education and early life
Brassard received a Ph.D. in Computer Science from Cornell Unive ...
, Canada,
Université de Montréal
The Université de Montréal (UdeM; ; translates to University of Montreal) is a French-language public research university in Montreal, Quebec, Canada. The university's main campus is located in the Côte-des-Neiges neighborhood of Côte-de ...
. Co-inventor of
quantum cryptography
Quantum cryptography is the science of exploiting quantum mechanical properties to perform cryptographic tasks. The best known example of quantum cryptography is quantum key distribution which offers an information-theoretically secure solution ...
.
*
Claude Crépeau, Canada,
McGill University
McGill University (french: link=no, Université McGill) is an English-language public research university located in Montreal, Quebec, Canada. Founded in 1821 by royal charter granted by King George IV,Frost, Stanley Brice. ''McGill Universit ...
.
*
Oded Goldreich
Oded Goldreich ( he, עודד גולדרייך; b. 1957) is a professor of Computer Science at the Faculty of Mathematics and Computer Science of Weizmann Institute of Science, Israel. His research interests lie within the theory of computation ...
, Israel,
Weizmann Institute
The Weizmann Institute of Science ( he, מכון ויצמן למדע ''Machon Vaitzman LeMada'') is a public research university in Rehovot, Israel, established in 1934, 14 years before the State of Israel. It differs from other Israeli univ ...
, author of
Foundations of Cryptography
Foundation may refer to:
* Foundation (nonprofit), a type of charitable organization
** Foundation (United States law), a type of charitable organization in the U.S.
** Private foundation, a charitable organization that, while serving a good cause ...
.
*
Shafi Goldwasser
en, Shafrira Goldwasser
, name = Shafi Goldwasser
, image = Shafi Goldwasser.JPG
, caption = Shafi Goldwasser in 2010
, birth_place = New York City, New York, U.S.
, birth_date =
, death_date ...
, US and Israel.
*
Silvio Micali
Silvio Micali (born October 13, 1954) is an Italian computer scientist, professor at the Massachusetts Institute of Technology and the founder of Algorand. Micali's research centers on cryptography and information security.
In 2012, he received ...
, US,
MIT
The Massachusetts Institute of Technology (MIT) is a private land-grant research university in Cambridge, Massachusetts. Established in 1861, MIT has played a key role in the development of modern technology and science, and is one of the m ...
.
*
Rafail Ostrovsky
Rafail Ostrovsky is a distinguished professor of computer science and mathematics at UCLA and a well-known researcher in algorithms and cryptography.
Biography
Rafail Ostrovsky received his Ph.D. from MIT in 1992.
He is a member of the editoria ...
, US,
UCLA
The University of California, Los Angeles (UCLA) is a public land-grant research university in Los Angeles, California. UCLA's academic roots were established in 1881 as a teachers college then known as the southern branch of the California St ...
.
*
Charles Rackoff
Charles Weill Rackoff is an American cryptologist. Born and raised in New York City, he attended MIT as both an undergraduate and graduate student, and earned a Ph.D. degree in Computer Science in 1974. He spent a year as a postdoctoral scholar ...
, co-discoverer of
zero-knowledge proof
In cryptography, a zero-knowledge proof or zero-knowledge protocol is a method by which one party (the prover) can prove to another party (the verifier) that a given statement is true while the prover avoids conveying any additional information a ...
s.
*
Oded Regev, inventor of
learning with errors
Learning with errors (LWE) is the computational problem of inferring a linear n-ary function f over a finite ring from given samples y_i = f(\mathbf_i) some of which may be erroneous.
The LWE problem is conjectured to be hard to solve, and thus to ...
.
*
Phillip Rogaway
Phillip Rogaway is a professor of computer science at the University of California, Davis. He graduated from Beverly Hills High School, and later earned a BA in computer science from UC Berkeley and completed his PhD in cryptography at MIT, in t ...
, US,
UC Davis
The University of California, Davis (UC Davis, UCD, or Davis) is a public land-grant research university near Davis, California. Named a Public Ivy, it is the northernmost of the ten campuses of the University of California system. The institut ...
, co-proposer of the
Random oracle
In cryptography, a random oracle is an oracle (a theoretical black box) that responds to every ''unique query'' with a (truly) random response chosen uniformly from its output domain. If a query is repeated, it responds the same way every time th ...
model.
*
Amit Sahai
Amit Sahai (born 1974) is an American computer scientist. He is a professor of computer science at UCLA and the director of the Center for Encrypted Functionalities.
Biography
Amit Sahai was born in 1974 in Thousand Oaks, California, to parents wh ...
, US,
UCLA
The University of California, Los Angeles (UCLA) is a public land-grant research university in Los Angeles, California. UCLA's academic roots were established in 1881 as a teachers college then known as the southern branch of the California St ...
.
*
Gustavus Simmons
Gustavus J. Simmons (born 1930) is a retired cryptographer and former manager of the applied mathematics Department and Senior Fellow at Sandia National Laboratories. He worked primarily with authentication theory, developing cryptographic techni ...
, US,
Sandia,
authentication
Authentication (from ''authentikos'', "real, genuine", from αὐθέντης ''authentes'', "author") is the act of proving an assertion, such as the identity of a computer system user. In contrast with identification, the act of indicati ...
theory.
*
Moti Yung
Mordechai M. "Moti" Yung is a cryptographer and computer scientist known for his work on cryptovirology and kleptography.
Career
Yung earned his PhD from Columbia University in 1988 under the supervision of Zvi Galil. In the past, he worked at th ...
, US, Google.
Government cryptographers
*
Clifford Cocks
Clifford Christopher Cocks (born 28 December 1950) is a British mathematician and cryptographer.
In 1973, while working at the United Kingdom Government Communications Headquarters (GCHQ), he invented a public-key cryptography algorithm equiv ...
, UK,
GCHQ
Government Communications Headquarters, commonly known as GCHQ, is an intelligence and security organisation responsible for providing signals intelligence (SIGINT) and information assurance (IA) to the government and armed forces of the Unit ...
, secret inventor of the algorithm later known as
RSA.
*
James H. Ellis, UK,
GCHQ
Government Communications Headquarters, commonly known as GCHQ, is an intelligence and security organisation responsible for providing signals intelligence (SIGINT) and information assurance (IA) to the government and armed forces of the Unit ...
, secretly proved the possibility of asymmetric encryption.
*
Lowell Frazer Dr. Lowell K. (Jim) Frazer was a mathematician who worked for the National Security Agency (NSA) in the field of cryptography.
"Dr. Lowell K. ("Jim") Frazer founded modern cryptographic evaluation for the US government. As a result of his effort ...
, USA,
National Security Agency
The National Security Agency (NSA) is a national-level intelligence agency of the United States Department of Defense, under the authority of the Director of National Intelligence (DNI). The NSA is responsible for global monitoring, collecti ...
*
Julia Wetzel
Julia Wetzel began her National Security Agency (NSA) career as a Special Research Analyst in the Operations unit. In the late 1970s, Wetzel worked with the House Select Committee on Intelligence. In 1989 she was assigned as the NSA's representat ...
, USA,
National Security Agency
The National Security Agency (NSA) is a national-level intelligence agency of the United States Department of Defense, under the authority of the Director of National Intelligence (DNI). The NSA is responsible for global monitoring, collecti ...
*
Malcolm Williamson
Malcolm Benjamin Graham Christopher Williamson, (21 November 19312 March 2003) was an Australian composer. He was the Master of the Queen's Music from 1975 until his death.
Biography
Williamson was born in Sydney in 1931; his father was an A ...
, UK,
GCHQ
Government Communications Headquarters, commonly known as GCHQ, is an intelligence and security organisation responsible for providing signals intelligence (SIGINT) and information assurance (IA) to the government and armed forces of the Unit ...
, secret inventor of the protocol later known as the
Diffie–Hellman key exchange
Diffie–Hellman key exchangeSynonyms of Diffie–Hellman key exchange include:
* Diffie–Hellman–Merkle key exchange
* Diffie–Hellman key agreement
* Diffie–Hellman key establishment
* Diffie–Hellman key negotiation
* Exponential key exc ...
.
Cryptographer businesspeople
*
Bruce Schneier
Bruce Schneier (; born January 15, 1963) is an American cryptographer, computer security professional, privacy specialist, and writer. Schneier is a Lecturer in Public Policy at the Harvard Kennedy School and a Fellow at the Berkman Klein Cente ...
, US, CTO and founder of
Counterpane Internet Security, Inc. and cryptography author.
*
Scott Vanstone
Scott A. Vanstone was a mathematician and cryptographer in the University of Waterloo Faculty of Mathematics. He was a member of the school's Centre for Applied Cryptographic Research, and was also a founder of the cybersecurity company Certico ...
, Canada, founder of
Certicom
BlackBerry Limited is a Canadian software company specializing in cybersecurity. Founded in 1984, it was originally known as Research In Motion (RIM). As RIM, it developed the BlackBerry brand of interactive pagers, smartphones, and tablets ...
and
elliptic curve cryptography
Elliptic-curve cryptography (ECC) is an approach to public-key cryptography based on the algebraic structure of elliptic curves over finite fields. ECC allows smaller keys compared to non-EC cryptography (based on plain Galois fields) to provide e ...
proponent.
See also
*
Cryptography
Cryptography, or cryptology (from grc, , translit=kryptós "hidden, secret"; and ''graphein'', "to write", or ''-logia'', "study", respectively), is the practice and study of techniques for secure communication in the presence of adver ...
References
External links
List of cryptographers' home pages
{{DEFAULTSORT:Cryptographers
Lists of people by occupation
Cryptography lists and comparisons