Cryptologist
   HOME

TheInfoList



OR:

This is a list of cryptographers.
Cryptography Cryptography, or cryptology (from grc, , translit=kryptós "hidden, secret"; and ''graphein'', "to write", or '' -logia'', "study", respectively), is the practice and study of techniques for secure communication in the presence of adv ...
is the practice and study of techniques for secure communication in the presence of third parties called adversaries.


Pre twentieth century

* Al-Khalil ibn Ahmad al-Farahidi: wrote a (now lost) book on cryptography titled the "''Book of Cryptographic Messages''". * Al-Kindi, 9th century
Arabic Arabic (, ' ; , ' or ) is a Semitic language spoken primarily across the Arab world.Semitic languages: an international handbook / edited by Stefan Weninger; in collaboration with Geoffrey Khan, Michael P. Streck, Janet C. E.Watson; Walter ...
polymath and originator of
frequency analysis In cryptanalysis, frequency analysis (also known as counting letters) is the study of the frequency of letters or groups of letters in a ciphertext. The method is used as an aid to breaking classical ciphers. Frequency analysis is based on ...
. * Athanasius Kircher, attempts to decipher crypted messages * Augustus the Younger, Duke of Brunswick-Lüneburg, wrote a standard book on cryptography * Ibn Wahshiyya: published several cipher alphabets that were used to encrypt magic formulas. *
John Dee John Dee (13 July 1527 – 1608 or 1609) was an English mathematician, astronomer, astrologer, teacher, occultist, and alchemist. He was the court astronomer for, and advisor to, Elizabeth I, and spent much of his time on alchemy, divination, a ...
, wrote an occult book, which in fact was a cover for crypted text * Ibn 'Adlan: 13th-century cryptographer who made important contributions on the sample size of the frequency analysis. *
Duke of Mantua During its history as independent entity, Mantua had different rulers who governed on the city and the lands of Mantua from the Middle Ages to the early modern period. From 970 to 1115, the Counts of Mantua were members of the House of Canos ...
Francesco I Gonzaga is the one who used the earliest example of homophonic Substitution cipher in early 1400s. * Ibn al-Durayhim: gave detailed descriptions of eight cipher systems that discussed substitution ciphers, leading to the earliest suggestion of a "tableau" of the kind that two centuries later became known as the "Vigenère table". * Ahmad al-Qalqashandi: Author of ''Subh al-a 'sha'', a fourteen volume encyclopedia in Arabic, which included a section on cryptology. The list of ciphers in this work included both substitution and transposition, and for the first time, a cipher with multiple substitutions for each plaintext letter. *
Charles Babbage Charles Babbage (; 26 December 1791 â€“ 18 October 1871) was an English polymath. A mathematician, philosopher, inventor and mechanical engineer, Babbage originated the concept of a digital programmable computer. Babbage is considered ...
, UK, 19th century mathematician who, about the time of the
Crimean War The Crimean War, , was fought from October 1853 to February 1856 between Russia and an ultimately victorious alliance of the Ottoman Empire, France, the United Kingdom and Piedmont-Sardinia. Geopolitical causes of the war included the ...
, secretly developed an effective attack against polyalphabetic substitution ciphers. *
Leone Battista Alberti Leon Battista Alberti (; 14 February 1404 – 25 April 1472) was an Italian Renaissance humanist author, artist, architect, poet, priest, linguist, philosopher, and cryptographer; he epitomised the nature of those identified now as polymaths. H ...
,
polymath A polymath ( el, πολυμαθής, , "having learned much"; la, homo universalis, "universal human") is an individual whose knowledge spans a substantial number of subjects, known to draw on complex bodies of knowledge to solve specific pro ...
/universal genius, inventor of polyalphabetic substitution (more specifically, the
Alberti cipher The Alberti Cipher, created in 1467 by Italian architect Leon Battista Alberti, was one of the first polyalphabetic ciphers. In the opening pages of his treatise ' he explained how his conversation with the papal secretary Leonardo Dati about a ...
), and what may have been the first mechanical encryption aid. * Giovanni Battista della Porta, author of a seminal work on
cryptanalysis Cryptanalysis (from the Greek ''kryptós'', "hidden", and ''analýein'', "to analyze") refers to the process of analyzing information systems in order to understand hidden aspects of the systems. Cryptanalysis is used to breach cryptographic s ...
. * Étienne Bazeries, French, military, considered one of the greatest natural cryptanalysts. Best known for developing the " Bazeries Cylinder" and his influential 1901 text ''Les Chiffres secrets dévoilés'' ("Secret ciphers unveiled"). * Giovan Battista Bellaso, Italian cryptologist * Giovanni Fontana (engineer), wrote two encrypted books * Hildegard of Bingen used her own alphabet to write letters. *
Julius Caesar Gaius Julius Caesar (; ; 12 July 100 BC – 15 March 44 BC), was a Roman general and statesman. A member of the First Triumvirate, Caesar led the Roman armies in the Gallic Wars before defeating his political rival Pompey in a civil war, an ...
, Roman general/politician, has the Caesar cipher named after him, and a
lost work A lost work is a document, literary work, or piece of multimedia produced some time in the past, of which no surviving copies are known to exist. It can only be known through reference. This term most commonly applies to works from the classical ...
on cryptography by Probus (probably Valerius Probus) is claimed to have covered his use of military cryptography in some detail. It is likely that he did not invent the cipher named after him, as other substitution ciphers were in use well before his time. * Friedrich Kasiski, author of the first published attack on the Vigenère cipher, now known as the Kasiski test. *
Auguste Kerckhoffs Auguste Kerckhoffs (19 January 1835 â€“ 9 August 1903) was a Dutch linguist and cryptographer in the late 19th century. Biography Kerckhoffs was born in Nuth, the Netherlands, as Jean Guillaume Auguste Victor François Hubert Kerckhoff ...
, known for contributing cipher design principles. *
Edgar Allan Poe Edgar Allan Poe (; Edgar Poe; January 19, 1809 – October 7, 1849) was an American writer, poet, editor, and literary critic. Poe is best known for his poetry and short stories, particularly his tales of mystery and the macabre. He is wid ...
, author of the book, ''A Few Words on Secret Writing'', an essay on cryptanalysis, and ''
The Gold Bug "The Gold-Bug" is a short story by American writer Edgar Allan Poe published in 1843. The plot follows William Legrand, who was bitten by a gold-colored bug. His servant Jupiter fears that Legrand is going insane and goes to Legrand's friend, an ...
'', a short story featuring the use of letter frequencies in the solution of a cryptogram. *
Johannes Trithemius Johannes Trithemius (; 1 February 1462 – 13 December 1516), born Johann Heidenberg, was a German Benedictine abbot and a polymath who was active in the German Renaissance as a lexicographer, chronicler, cryptographer, and occultist. He is co ...
, mystic and first to describe ''tableaux'' (tables) for use in polyalphabetic substitution. Wrote an early work on
steganography Steganography ( ) is the practice of representing information within another message or physical object, in such a manner that the presence of the information is not evident to human inspection. In computing/electronic contexts, a computer file, ...
and cryptography generally. * Philips van Marnix, lord of Sint-Aldegonde, deciphered Spanish messages for
William the Silent William the Silent (24 April 153310 July 1584), also known as William the Taciturn (translated from nl, Willem de Zwijger), or, more commonly in the Netherlands, William of Orange ( nl, Willem van Oranje), was the main leader of the Dutch Re ...
during the Dutch revolt against the Spanish. *
John Wallis John Wallis (; la, Wallisius; ) was an English clergyman and mathematician who is given partial credit for the development of infinitesimal calculus. Between 1643 and 1689 he served as chief cryptographer for Parliament and, later, the royal ...
codebreaker for Cromwell and Charles II * Sir Charles Wheatstone, inventor of the so-called Playfair cipher and general polymath.


World War I and World War II wartime cryptographers

*
Arne Beurling Arne Carl-August Beurling (3 February 1905 – 20 November 1986) was a Swedish mathematician and professor of mathematics at Uppsala University (1937–1954) and later at the Institute for Advanced Study in Princeton, New Jersey. Beurling worked ...
, Swedish mathematician and cryptograph. * Lambros D. Callimahos, US,
NSA The National Security Agency (NSA) is a national-level intelligence agency of the United States Department of Defense, under the authority of the Director of National Intelligence (DNI). The NSA is responsible for global monitoring, collec ...
, worked with William F. Friedman, taught NSA cryptanalysts. *
Ann Z. Caracristi Ann Zeilinger Caracristi (February 1, 1921 – January 10, 2016) was an American cryptanalyst, former Deputy Director of the National Security Agency, where she served at various positions over a 40-year career. She served as a member of the Se ...
, US, SIS, solved Japanese Army codes in World War II, later became deputy director of
National Security Agency The National Security Agency (NSA) is a national-level intelligence agency of the United States Department of Defense, under the authority of the Director of National Intelligence (DNI). The NSA is responsible for global monitoring, collecti ...
. *
Alec Naylor Dakin Alec Naylor Dakin (3 April 1912 – 14 June 2003) was a Fellow of Oxford College, a cryptologist at Bletchley Park, an Egyptologist and schoolmaster. Early life and family Alec Dakin was born in Mytholmroyd in the West Riding of Yorkshire in ...
, UK,
Hut 4 Hut 4 was a wartime section of the Government Code and Cypher School (GC&CS) at Bletchley Park tasked with the translation, interpretation and distribution of ''Kriegsmarine'' (German navy) messages deciphered by Hut 8. The messages were largely ...
,
Bletchley park Bletchley Park is an English country house and estate in Bletchley, Milton Keynes (Buckinghamshire) that became the principal centre of Allied code-breaking during the Second World War. The mansion was constructed during the years following ...
during World War II. *
Ludomir Danilewicz Ludomir Danilewicz (1905–1960) was a Polish engineer and, for some ten years before the outbreak of World War II, one of the four directors of the AVA Radio Company in Warsaw, Poland. AVA designed and built radio equipment for the Polish General ...
,
Poland Poland, officially the Republic of Poland, is a country in Central Europe. It is divided into 16 administrative provinces called voivodeships, covering an area of . Poland has a population of over 38 million and is the fifth-most populou ...
, Biuro Szyfrow, helped to construct the Enigma machine copies to break the ciphers. * Alastair Denniston, UK, director of
GC&CS Government Communications Headquarters, commonly known as GCHQ, is an intelligence and security organisation responsible for providing signals intelligence (SIGINT) and information assurance (IA) to the government and armed forces of the Unit ...
at
Bletchley Park Bletchley Park is an English country house and estate in Bletchley, Milton Keynes (Buckinghamshire) that became the principal centre of Allied code-breaking during the Second World War. The mansion was constructed during the years following ...
from 1919 to 1942. *
Agnes Meyer Driscoll Agnes Meyer Driscoll (July 24, 1889 – September 16, 1971), known as "Miss Aggie" or "Madame X'", was an American cryptanalyst during both World War I and World War II and was known as “the first lady of naval cryptology." Early years Born ...
, US, broke several Japanese ciphers. *
Genevieve Grotjan Feinstein Genevieve Marie Grotjan Feinstein (April 30, 1913 – August 10, 2006) was an American mathematician and cryptanalyst. She worked for the Signals Intelligence Service throughout World War II, during which time she played an important role in deci ...
, US, SIS, noticed the pattern that led to breaking
Purple Purple is any of a variety of colors with hue between red and blue. In the RGB color model used in computer and television screens, purples are produced by mixing red and blue light. In the RYB color model historically used by painters ...
. *
Elizebeth Smith Friedman Elizebeth Smith Friedman (August 26, 1892 – October 31, 1980) was an American cryptanalyst and author who deciphered enemy codes in both World Wars and helped to solve international smuggling cases during Prohibition. Over the course of her ...
, US,
Coast Guard A coast guard or coastguard is a maritime security organization of a particular country. The term embraces wide range of responsibilities in different countries, from being a heavily armed military force with customs and security duties to ...
and US Treasury Department cryptographer, co-invented modern cryptography. * William F. Friedman, US, SIS, introduced statistical methods into
cryptography Cryptography, or cryptology (from grc, , translit=kryptós "hidden, secret"; and ''graphein'', "to write", or '' -logia'', "study", respectively), is the practice and study of techniques for secure communication in the presence of adv ...
. * Cecilia Elspeth Giles, UK,
Bletchley Park Bletchley Park is an English country house and estate in Bletchley, Milton Keynes (Buckinghamshire) that became the principal centre of Allied code-breaking during the Second World War. The mansion was constructed during the years following ...
* Jack Good UK,
GC&CS Government Communications Headquarters, commonly known as GCHQ, is an intelligence and security organisation responsible for providing signals intelligence (SIGINT) and information assurance (IA) to the government and armed forces of the Unit ...
,
Bletchley Park Bletchley Park is an English country house and estate in Bletchley, Milton Keynes (Buckinghamshire) that became the principal centre of Allied code-breaking during the Second World War. The mansion was constructed during the years following ...
worked with
Alan Turing Alan Mathison Turing (; 23 June 1912 â€“ 7 June 1954) was an English mathematician, computer scientist, logician, cryptanalyst, philosopher, and theoretical biologist. Turing was highly influential in the development of theoretical ...
on the statistical approach to cryptanalysis. * Nigel de Grey, UK, Room 40, played an important role in the decryption of the Zimmermann Telegram during World War I. * Dillwyn Knox, UK, Room 40 and
GC&CS Government Communications Headquarters, commonly known as GCHQ, is an intelligence and security organisation responsible for providing signals intelligence (SIGINT) and information assurance (IA) to the government and armed forces of the Unit ...
, broke commercial Enigma cipher as used by the
Abwehr The ''Abwehr'' ( German for ''resistance'' or ''defence'', but the word usually means ''counterintelligence'' in a military context; ) was the German military-intelligence service for the ''Reichswehr'' and the '' Wehrmacht'' from 1920 to 1944. ...
(German military intelligence). * Solomon Kullback US, SIS, helped break the Japanese Red cipher, later Chief Scientist at the
National Security Agency The National Security Agency (NSA) is a national-level intelligence agency of the United States Department of Defense, under the authority of the Director of National Intelligence (DNI). The NSA is responsible for global monitoring, collecti ...
. * Frank W. Lewis US, worked with William F. Friedman, puzzle master * William Hamilton Martin and Bernon F. Mitchell, U.S.
National Security Agency The National Security Agency (NSA) is a national-level intelligence agency of the United States Department of Defense, under the authority of the Director of National Intelligence (DNI). The NSA is responsible for global monitoring, collecti ...
cryptologists who defected to the Soviet Union in 1960 *
Leo Marks Leopold Samuel Marks, (24 September 1920 – 15 January 2001) was an English writer, screenwriter, and cryptographer. During the Second World War he headed the codes office supporting resistance agents in occupied Europe for the secret Special ...
UK, SOE cryptography director, author and playwright. *
Donald Michie Donald Michie (; 11 November 1923 – 7 July 2007) was a British researcher in artificial intelligence. During World War II, Michie worked for the Government Code and Cypher School at Bletchley Park, contributing to the effort to solve " Tunny ...
UK,
GC&CS Government Communications Headquarters, commonly known as GCHQ, is an intelligence and security organisation responsible for providing signals intelligence (SIGINT) and information assurance (IA) to the government and armed forces of the Unit ...
,
Bletchley Park Bletchley Park is an English country house and estate in Bletchley, Milton Keynes (Buckinghamshire) that became the principal centre of Allied code-breaking during the Second World War. The mansion was constructed during the years following ...
worked on
Cryptanalysis of the Lorenz cipher Cryptanalysis of the Lorenz cipher was the process that enabled the British to read high-level German army messages during World War II. The British Government Code and Cypher School (GC&CS) at Bletchley Park decrypted many communications betwe ...
and the Colossus computer. * Max Newman, UK,
GC&CS Government Communications Headquarters, commonly known as GCHQ, is an intelligence and security organisation responsible for providing signals intelligence (SIGINT) and information assurance (IA) to the government and armed forces of the Unit ...
,
Bletchley Park Bletchley Park is an English country house and estate in Bletchley, Milton Keynes (Buckinghamshire) that became the principal centre of Allied code-breaking during the Second World War. The mansion was constructed during the years following ...
headed the section that developed the Colossus computer for
Cryptanalysis of the Lorenz cipher Cryptanalysis of the Lorenz cipher was the process that enabled the British to read high-level German army messages during World War II. The British Government Code and Cypher School (GC&CS) at Bletchley Park decrypted many communications betwe ...
. * Georges Painvin French, broke the ADFGVX cipher during the
First World War World War I (28 July 1914 11 November 1918), often abbreviated as WWI, was List of wars and anthropogenic disasters by death toll, one of the deadliest global conflicts in history. Belligerents included much of Europe, the Russian Empire, ...
. *
Marian Rejewski Marian Adam Rejewski (; 16 August 1905 – 13 February 1980) was a Polish mathematician and cryptologist who in late 1932 reconstructed the sight-unseen German military Enigma cipher machine, aided by limited documents obtained by French mil ...
,
Poland Poland, officially the Republic of Poland, is a country in Central Europe. It is divided into 16 administrative provinces called voivodeships, covering an area of . Poland has a population of over 38 million and is the fifth-most populou ...
,
Biuro Szyfrów The Cipher Bureau, in Polish: ''Biuro Szyfrów'' (), was the interwar Polish General Staff's Second Department's unit charged with SIGINT and both cryptography (the ''use'' of ciphers and codes) and cryptanalysis (the ''study'' of ciphers and co ...
, a Polish mathematician and cryptologist who, in 1932, solved the Enigma machine with plugboard, the main cipher device then in use by Germany. * John Joseph Rochefort US, made major contributions to the break into JN-25 after the
attack on Pearl Harbor The attack on Pearl HarborAlso known as the Battle of Pearl Harbor was a surprise military strike by the Imperial Japanese Navy Air Service upon the United States against the naval base at Pearl Harbor in Honolulu, Territory of Hawaii ...
. *
Leo Rosen Leo Rosen was a U.S. cryptanalyst who worked with Frank Rowlett at Signals Intelligence Service (S.I.S.) before the start of World War II on Japanese ciphers. Rowlett found a method to read the messages enciphered on the Japanese PURPLE machine. ...
US, SIS, deduced that the Japanese Purple machine was built with stepping switches. *
Frank Rowlett Frank Byron Rowlett (May 2, 1908 – June 29, 1998) was an American cryptologist. Life and career Rowlett was born in Rose Hill, Lee County, Virginia and attended Emory & Henry College in Emory, Virginia. In 1929 he received a bachelor's deg ...
US, SIS, leader of the team that broke
Purple Purple is any of a variety of colors with hue between red and blue. In the RGB color model used in computer and television screens, purples are produced by mixing red and blue light. In the RYB color model historically used by painters ...
. * Jerzy Różycki,
Poland Poland, officially the Republic of Poland, is a country in Central Europe. It is divided into 16 administrative provinces called voivodeships, covering an area of . Poland has a population of over 38 million and is the fifth-most populou ...
,
Biuro Szyfrów The Cipher Bureau, in Polish: ''Biuro Szyfrów'' (), was the interwar Polish General Staff's Second Department's unit charged with SIGINT and both cryptography (the ''use'' of ciphers and codes) and cryptanalysis (the ''study'' of ciphers and co ...
, helped break German Enigma ciphers. * Luigi Sacco, Italy, Italian General and author of the ''Manual of Cryptography''. * Laurance Safford US, chief cryptographer for the US Navy for 2 decades+, including World War II. *
Abraham Sinkov Abraham Sinkov (August 22, 1907 – January 19, 1998) was a US cryptanalyst. An early employee of the U.S. Army's Signals Intelligence Service, he held several leadership positions during World War II, transitioning to the new National Security A ...
US, SIS. *
John Tiltman Brigadier John Hessell Tiltman, (25 May 1894 – 10 August 1982) was a British Army officer who worked in intelligence, often at or with the Government Code and Cypher School (GC&CS) starting in the 1920s. His intelligence work was largely conn ...
UK, Brigadier, Room 40,
GC&CS Government Communications Headquarters, commonly known as GCHQ, is an intelligence and security organisation responsible for providing signals intelligence (SIGINT) and information assurance (IA) to the government and armed forces of the Unit ...
,
Bletchley Park Bletchley Park is an English country house and estate in Bletchley, Milton Keynes (Buckinghamshire) that became the principal centre of Allied code-breaking during the Second World War. The mansion was constructed during the years following ...
, GCHQ,
NSA The National Security Agency (NSA) is a national-level intelligence agency of the United States Department of Defense, under the authority of the Director of National Intelligence (DNI). The NSA is responsible for global monitoring, collec ...
. Extraordinary length and range of cryptographic service * Alan Mathison Turing UK,
GC&CS Government Communications Headquarters, commonly known as GCHQ, is an intelligence and security organisation responsible for providing signals intelligence (SIGINT) and information assurance (IA) to the government and armed forces of the Unit ...
,
Bletchley Park Bletchley Park is an English country house and estate in Bletchley, Milton Keynes (Buckinghamshire) that became the principal centre of Allied code-breaking during the Second World War. The mansion was constructed during the years following ...
where he was chief cryptographer, inventor of the Bombe that was used in decrypting Enigma, mathematician, logician, and renowned pioneer of
Computer Science Computer science is the study of computation, automation, and information. Computer science spans theoretical disciplines (such as algorithms, theory of computation, information theory, and automation) to Applied science, practical discipli ...
. * William Thomas Tutte UK,
GC&CS Government Communications Headquarters, commonly known as GCHQ, is an intelligence and security organisation responsible for providing signals intelligence (SIGINT) and information assurance (IA) to the government and armed forces of the Unit ...
,
Bletchley Park Bletchley Park is an English country house and estate in Bletchley, Milton Keynes (Buckinghamshire) that became the principal centre of Allied code-breaking during the Second World War. The mansion was constructed during the years following ...
, with
John Tiltman Brigadier John Hessell Tiltman, (25 May 1894 – 10 August 1982) was a British Army officer who worked in intelligence, often at or with the Government Code and Cypher School (GC&CS) starting in the 1920s. His intelligence work was largely conn ...
, broke Lorenz SZ 40/42 encryption machine (codenamed Tunny) leading to the development of the Colossus computer. *
William Stone Weedon William Stone Weedon (July 5, 1908 – May 13, 1984), was a scholar, university professor (philosophy, mathematics, logic, linguistic analysis), and U.S. Navy Officer. Early life and education Weedon was born in 1908 in Wilmington, Delaware, the ...
, US, * Gordon Welchman UK,
GC&CS Government Communications Headquarters, commonly known as GCHQ, is an intelligence and security organisation responsible for providing signals intelligence (SIGINT) and information assurance (IA) to the government and armed forces of the Unit ...
,
Bletchley Park Bletchley Park is an English country house and estate in Bletchley, Milton Keynes (Buckinghamshire) that became the principal centre of Allied code-breaking during the Second World War. The mansion was constructed during the years following ...
where he was head of Hut Six (German Army and Air Force Enigma
cipher In cryptography, a cipher (or cypher) is an algorithm for performing encryption or decryption—a series of well-defined steps that can be followed as a procedure. An alternative, less common term is ''encipherment''. To encipher or encode ...
. decryption), made an important contribution to the design of the Bombe. *
Herbert Yardley Herbert Osborn Yardley (April 13, 1889 – August 7, 1958) was an American cryptologist. He founded and led the cryptographic organization the Black Chamber. Under Yardley, the cryptanalysts of The American Black Chamber broke Japanese diplomat ...
US, MI8 (US), author "The American Black Chamber", worked in China as a cryptographer and briefly in Canada. * Henryk Zygalski,
Poland Poland, officially the Republic of Poland, is a country in Central Europe. It is divided into 16 administrative provinces called voivodeships, covering an area of . Poland has a population of over 38 million and is the fifth-most populou ...
,
Biuro Szyfrów The Cipher Bureau, in Polish: ''Biuro Szyfrów'' (), was the interwar Polish General Staff's Second Department's unit charged with SIGINT and both cryptography (the ''use'' of ciphers and codes) and cryptanalysis (the ''study'' of ciphers and co ...
, helped break German Enigma ciphers. * Karl Stein German, Head of the Division IVa (security of own processes) at Cipher Department of the High Command of the Wehrmacht. Discoverer of Stein manifold. * Gisbert Hasenjaeger German, Tester of the Enigma. Discovered new proof of the completeness theorem of
Kurt Gödel Kurt Friedrich Gödel ( , ; April 28, 1906 â€“ January 14, 1978) was a logician, mathematician, and philosopher. Considered along with Aristotle and Gottlob Frege to be one of the most significant logicians in history, Gödel had an imm ...
for predicate logic. *
Heinrich Scholz Heinrich Scholz (; 17 December 1884 – 30 December 1956) was a German logician, philosopher, and Protestant theologian. He was a peer of Alan Turing who mentioned Scholz when writing with regard to the reception of "On Computable Numbers, wi ...
German, Worked in Division IVa at OKW. Logician and pen friend of Alan Turning. *
Gottfried Köthe Gottfried Maria Hugo Köthe (born 25 December 1905 in Graz – died 30 April 1989 in Frankfurt) was an Austrian mathematician working in abstract algebra and functional analysis. Scientific career In 1923 Köthe enrolled in the University o ...
German, Cryptanalyst at OKW. Mathematician created theory of topological vector spaces. * Ernst Witt German, Mathematician at OKW. Mathematical Discoveries Named After Ernst Witt. * Helmut Grunsky German, worked in
complex analysis Complex analysis, traditionally known as the theory of functions of a complex variable, is the branch of mathematical analysis that investigates Function (mathematics), functions of complex numbers. It is helpful in many branches of mathemati ...
and geometric function theory. He introduced Grunsky's theorem and the Grunsky inequalities. * Georg Hamel. *
Oswald Teichmüller Paul Julius Oswald Teichmüller (; 18 June 1913 – 11 September 1943) was a German mathematician who made contributions to complex analysis. He introduced quasiconformal mappings and differential geometric methods into the study of Riemann sur ...
German, Temporarily employed at OKW as cryptanalyst. Introduced
quasiconformal mapping In mathematical complex analysis, a quasiconformal mapping, introduced by and named by , is a homeomorphism between plane domains which to first order takes small circles to small ellipses of bounded eccentricity. Intuitively, let ''f'' : ''D' ...
s and differential geometric methods into
complex analysis Complex analysis, traditionally known as the theory of functions of a complex variable, is the branch of mathematical analysis that investigates Function (mathematics), functions of complex numbers. It is helpful in many branches of mathemati ...
. Described by
Friedrich L. Bauer Friedrich Ludwig "Fritz" Bauer (10 June 1924 – 26 March 2015) was a German pioneer of computer science and professor at the Technical University of Munich. Life Bauer earned his Abitur in 1942 and served in the Wehrmacht during World Wa ...
as an extreme Nazi and a true genius. * Hans Rohrbach German, Mathematician at AA/Pers Z, the German department of state, civilian diplomatic cryptological agency. * Wolfgang Franz German, Mathematician who worked at OKW. Later significant discoveries in
Topology In mathematics, topology (from the Greek words , and ) is concerned with the properties of a geometric object that are preserved under continuous deformations, such as stretching, twisting, crumpling, and bending; that is, without closing ...
. * Werner Weber German, Mathematician at OKW. *
Georg Aumann Georg Aumann (11 November 1906, Munich, Germany – 4 August 1980), was a German mathematician. He was known for his work in general topology and regulated functions. During World War II, he worked as part of a group of five mathematicians, ...
German, Mathematician at OKW. His doctoral student was
Friedrich L. Bauer Friedrich Ludwig "Fritz" Bauer (10 June 1924 – 26 March 2015) was a German pioneer of computer science and professor at the Technical University of Munich. Life Bauer earned his Abitur in 1942 and served in the Wehrmacht during World Wa ...
. * Otto Leiberich German, Mathematician who worked as a linguist at the Cipher Department of the High Command of the Wehrmacht. * Alexander Aigner German, Mathematician who worked at OKW. * Erich Hüttenhain German, Chief cryptanalyst of and led Chi IV (section 4) of the Cipher Department of the High Command of the Wehrmacht. A German mathematician and cryptanalyst who tested a number of German cipher machines and found them to be breakable. *
Wilhelm Fenner Wilhelm Fenner (* 14 April 1891 in Saint Petersburg † after 1946) was a German cryptanalyst, before and during the time of World War II in the OKW/Chi, the Cipher Department of the High Command of the Wehrmacht, working within the main cryp ...
German, Chief Cryptologist and Director of Cipher Department of the High Command of the Wehrmacht. * Walther Fricke German, Worked alongside Dr Erich Hüttenhain at Cipher Department of the High Command of the Wehrmacht. Mathematician, logician, cryptanalyst and linguist. * Fritz Menzer German. Inventor of SG39 and SG41.


Other pre-computer

*
Rosario Candela Rosario Candela (March 7, 1890 – October 3, 1953) was an Italian American architect who achieved renown through his apartment building designs in New York City, primarily during the boom years of the 1920s. He is credited with defining the cit ...
, US, Architect and notable amateur cryptologist who authored books and taught classes on the subject to civilians at
Hunter College Hunter College is a public university in New York City. It is one of the constituent colleges of the City University of New York and offers studies in more than one hundred undergraduate and postgraduate fields across five schools. It also admin ...
. * Claude Elwood Shannon, US, founder of
information theory Information theory is the scientific study of the quantification, storage, and communication of information. The field was originally established by the works of Harry Nyquist and Ralph Hartley, in the 1920s, and Claude Shannon in the 1940s. ...
, proved the
one-time pad In cryptography, the one-time pad (OTP) is an encryption technique that cannot be cracked, but requires the use of a single-use pre-shared key that is not smaller than the message being sent. In this technique, a plaintext is paired with a ra ...
to be unbreakable.


Modern

See also: Modern cryptographers for a more exhaustive list.


Symmetric-key algorithm inventors

* Ross Anderson, UK,
University of Cambridge , mottoeng = Literal: From here, light and sacred draughts. Non literal: From this place, we gain enlightenment and precious knowledge. , established = , other_name = The Chancellor, Masters and Schola ...
, co-inventor of the
Serpent Serpent or The Serpent may refer to: * Snake, a carnivorous reptile of the suborder Serpentes Mythology and religion * Sea serpent, a monstrous ocean creature * Serpent (symbolism), the snake in religious rites and mythological contexts * Serp ...
cipher. * Paulo S. L. M. Barreto, Brazilian,
University of São Paulo The University of São Paulo ( pt, Universidade de São Paulo, USP) is a public university in the Brazilian state of São Paulo. It is the largest Brazilian public university and the country's most prestigious educational institution, the bes ...
, co-inventor of the Whirlpool hash function. * George Blakley, US, independent inventor of secret sharing. * Eli Biham, Israel, co-inventor of the
Serpent Serpent or The Serpent may refer to: * Snake, a carnivorous reptile of the suborder Serpentes Mythology and religion * Sea serpent, a monstrous ocean creature * Serpent (symbolism), the snake in religious rites and mythological contexts * Serp ...
cipher. *
Don Coppersmith Don Coppersmith (born 1950) is a cryptographer and mathematician. He was involved in the design of the Data Encryption Standard block cipher at IBM, particularly the design of the S-boxes, strengthening them against differential cryptanalysis. ...
, co-inventor of
DES Des is a masculine given name, mostly a short form (hypocorism) of Desmond. People named Des include: People * Des Buckingham, English football manager * Des Corcoran, (1928–2004), Australian politician * Des Dillon (disambiguation), sever ...
and
MARS Mars is the fourth planet from the Sun and the second-smallest planet in the Solar System, only being larger than Mercury. In the English language, Mars is named for the Roman god of war. Mars is a terrestrial planet with a thin at ...
ciphers. * Joan Daemen, Belgian, co-developer of Rijndael which became the
Advanced Encryption Standard The Advanced Encryption Standard (AES), also known by its original name Rijndael (), is a specification for the encryption of electronic data established by the U.S. National Institute of Standards and Technology (NIST) in 2001. AES is a variant ...
(AES), and
Keccak SHA-3 (Secure Hash Algorithm 3) is the latest member of the Secure Hash Algorithm family of standards, released by NIST on August 5, 2015. Although part of the same series of standards, SHA-3 is internally different from the MD5-like stru ...
which became SHA-3. * Horst Feistel, German, IBM, namesake of Feistel networks and Lucifer cipher. *
Lars Knudsen Lars Ramkilde Knudsen (born 21 February 1962) is a Danish researcher in cryptography, particularly interested in the design and analysis of block ciphers, hash functions and message authentication codes (MACs). Academic After some early work in ...
,
Denmark ) , song = ( en, "King Christian stood by the lofty mast") , song_type = National and royal anthem , image_map = EU-Denmark.svg , map_caption = , subdivision_type = Sovereign state , subdivision_name = Kingdom of Denmark , establish ...
, co-inventor of the
Serpent Serpent or The Serpent may refer to: * Snake, a carnivorous reptile of the suborder Serpentes Mythology and religion * Sea serpent, a monstrous ocean creature * Serpent (symbolism), the snake in religious rites and mythological contexts * Serp ...
cipher. * Ralph Merkle, US, inventor of Merkle trees. *
Bart Preneel Bart Preneel (born 15 October 1963 in Leuven, Belgium) is a Flemish cryptographer and cryptanalyst. He is a professor at Katholieke Universiteit Leuven, in the COSIC group. He was the president of the International Association for Cryptologic R ...
, Belgian, co-inventor of
RIPEMD-160 RIPEMD (RIPE Message Digest) is a family of cryptographic hash functions developed in 1992 (the original RIPEMD) and 1996 (other variants). There are five functions in the family: RIPEMD, RIPEMD-128, RIPEMD-160, RIPEMD-256, and RIPEMD-320, of w ...
. *
Vincent Rijmen Vincent Rijmen (; born 16 October 1970) is a Belgian cryptographer and one of the two designers of the Rijndael, the Advanced Encryption Standard. Rijmen is also the co-designer of the WHIRLPOOL cryptographic hash function, and the block cipher ...
, Belgian, co-developer of Rijndael which became the
Advanced Encryption Standard The Advanced Encryption Standard (AES), also known by its original name Rijndael (), is a specification for the encryption of electronic data established by the U.S. National Institute of Standards and Technology (NIST) in 2001. AES is a variant ...
(AES). * Ronald L. Rivest, US, MIT, inventor of RC cipher series and MD algorithm series. * Bruce Schneier, US, inventor of Blowfish and co-inventor of
Twofish In cryptography, Twofish is a symmetric key block cipher with a block size of 128 bits and key sizes up to 256 bits. It was one of the five finalists of the Advanced Encryption Standard contest, but it was not selected for standardization. T ...
and
Threefish Threefish is a symmetric-key tweakable block cipher designed as part of the Skein hash function, an entry in the NIST hash function competition. Threefish uses no S-boxes or other table lookups in order to avoid cache timing attacks; The pape ...
. * Xuejia Lai, CH, co-inventor of International Data Encryption Algorithm (IDEA). * Adi Shamir, Israel,
Weizmann Institute The Weizmann Institute of Science ( he, מכון ויצמן למדע ''Machon Vaitzman LeMada'') is a public research university in Rehovot, Israel, established in 1934, 14 years before the State of Israel. It differs from other Israeli u ...
, inventor of secret sharing.


Asymmetric-key algorithm inventors

* Leonard Adleman, US,
USC USC most often refers to: * University of South Carolina, a public research university ** University of South Carolina System, the main university and its satellite campuses ** South Carolina Gamecocks, the school athletic program * University of ...
, the 'A' in RSA. *
David Chaum David Lee Chaum (born 1955) is an American computer scientist, cryptographer, and inventor. He is known as a pioneer in cryptography and privacy-preserving technologies, and widely recognized as the inventor of digital cash. His 1982 dissertati ...
, US, inventor of blind signatures. *
Clifford Cocks Clifford Christopher Cocks (born 28 December 1950) is a British mathematician and cryptographer. In 1973, while working at the United Kingdom Government Communications Headquarters (GCHQ), he invented a public-key cryptography algorithm equiv ...
, UK GCHQ first inventor of RSA, a fact that remained secret until 1997 and so was unknown to
Rivest Ronald Linn Rivest (; born May 6, 1947) is a cryptographer and an Institute Professor at MIT. He is a member of MIT's Department of Electrical Engineering and Computer Science (EECS) and a member of MIT's Computer Science and Artificial Intel ...
, Shamir, and Adleman. * Whitfield Diffie, US, (public) co-inventor of the Diffie-Hellman key-exchange protocol. *
Taher Elgamal Taher Elgamal (Arabic: طاهر الجمل) (born 18 August 1955) is an Egyptian cryptographer and entrepreneur. He has served as the Chief Technology Officer (CTO) of Security at Salesforce since 2013. Prior to that, he was the founder and CEO ...
, US (born Egyptian), inventor of the
Elgamal discrete log cryptosystem In cryptography, the ElGamal encryption system is an asymmetric key encryption algorithm for public-key cryptography which is based on the Diffie–Hellman key exchange. It was described by Taher Elgamal in 1985. ElGamal encryption is used in th ...
. * Shafi Goldwasser, US and Israel, MIT and
Weizmann Institute The Weizmann Institute of Science ( he, מכון ויצמן למדע ''Machon Vaitzman LeMada'') is a public research university in Rehovot, Israel, established in 1934, 14 years before the State of Israel. It differs from other Israeli u ...
, co-discoverer of zero-knowledge proofs, and of
Semantic security In cryptography, a semantically secure cryptosystem is one where only negligible information about the plaintext can be feasibly extracted from the ciphertext. Specifically, any probabilistic, polynomial-time algorithm (PPTA) that is given the cip ...
. * Martin Hellman, US, (public) co-inventor of the Diffie-Hellman key-exchange protocol. * Neal Koblitz, independent co-creator of
elliptic curve cryptography Elliptic-curve cryptography (ECC) is an approach to public-key cryptography based on the algebraic structure of elliptic curves over finite fields. ECC allows smaller keys compared to non-EC cryptography (based on plain Galois fields) to provid ...
. * Alfred Menezes, co-inventor of
MQV MQV (Menezes–Qu–Vanstone) is an authenticated protocol for key agreement based on the Diffie–Hellman scheme. Like other authenticated Diffie–Hellman schemes, MQV provides protection against an active attacker. The protocol can be modified ...
, an
elliptic curve In mathematics, an elliptic curve is a smooth, projective, algebraic curve of genus one, on which there is a specified point . An elliptic curve is defined over a field and describes points in , the Cartesian product of with itself. I ...
technique. * Silvio Micali, US (born Italian), MIT, co-discoverer of zero-knowledge proofs, and of
Semantic security In cryptography, a semantically secure cryptosystem is one where only negligible information about the plaintext can be feasibly extracted from the ciphertext. Specifically, any probabilistic, polynomial-time algorithm (PPTA) that is given the cip ...
. * Victor Miller, independent co-creator of
elliptic curve cryptography Elliptic-curve cryptography (ECC) is an approach to public-key cryptography based on the algebraic structure of elliptic curves over finite fields. ECC allows smaller keys compared to non-EC cryptography (based on plain Galois fields) to provid ...
. *
David Naccache David Naccache is a cryptographer, currently a professor at the École normale supérieure and a member of its Computer Laboratory. He was previously a professor at Panthéon-Assas University. Biography He received his Ph.D. in 1995 from the à ...
, inventor of the Naccache–Stern cryptosystem and of the Naccache–Stern knapsack cryptosystem. * Moni Naor, co-inventor the Naor–Yung encryption paradigm for CCA security. * Rafail Ostrovsky, co-inventor of Oblivious RAM, of single-server Private Information Retrieval, and proactive cryptosystems. *
Pascal Paillier The Paillier cryptosystem, invented by and named after Pascal Paillier in 1999, is a probabilistic asymmetric algorithm for public key cryptography. The problem of computing ''n''-th residue classes is believed to be computationally difficult. The ...
, inventor of Paillier encryption. * Michael O. Rabin, Israel, inventor of Rabin encryption. * Ronald L. Rivest, US, MIT, the 'R' in RSA. * Adi Shamir, Israel,
Weizmann Institute The Weizmann Institute of Science ( he, מכון ויצמן למדע ''Machon Vaitzman LeMada'') is a public research university in Rehovot, Israel, established in 1934, 14 years before the State of Israel. It differs from other Israeli u ...
, the 'S' in RSA. * Moti Yung, co-inventor of the Naor–Yung encryption paradigm for CCA security, of
threshold cryptosystem A threshold cryptosystem, the basis for the field of threshold cryptography, is a cryptosystem that protects information by encrypting it and distributing it among a cluster of fault-tolerant computers. The message is encrypted using a public key, ...
s, and proactive cryptosystems.


Cryptanalysts

*
Joan Clarke Joan Elisabeth Lowther Murray, MBE (''née'' Clarke; 24 June 1917 – 4 September 1996) was an English cryptanalyst and numismatist best known for her work as a code-breaker at Bletchley Park during the Second World War. Although she did no ...
, English cryptanalyst and numismatist best known for her work as a code-breaker at Bletchley Park during the Second World War. * Ross Anderson, UK. * Eli Biham, Israel, co-discoverer of
differential cryptanalysis Differential cryptanalysis is a general form of cryptanalysis applicable primarily to block ciphers, but also to stream ciphers and cryptographic hash functions. In the broadest sense, it is the study of how differences in information input can aff ...
and Related-key attack. *
Matt Blaze Matt may refer to: * Matt (name), people with the given name ''Matt'' or Matthew, meaning "gift from God", or the surname Matt *In British English, of a surface: having a non-glossy finish, see gloss (material appearance) * Matt, Switzerland, a ...
, US. * Dan Boneh, US,
Stanford University Stanford University, officially Leland Stanford Junior University, is a private research university in Stanford, California. The campus occupies , among the largest in the United States, and enrolls over 17,000 students. Stanford is conside ...
. *
Niels Ferguson Niels T. Ferguson (born 10 December 1965, Eindhoven) is a Dutch cryptographer and consultant who currently works for Microsoft. He has worked with others, including Bruce Schneier, designing cryptographic algorithms, testing algorithms and prot ...
, Netherlands, co-inventor of Twofish and Fortuna. *
Ian Goldberg Ian Avrum Goldberg (born March 31, 1973) is a cryptographer and cypherpunk. He is best known for breaking Netscape's implementation of SSL (with David Wagner), and for his role as chief scientist of Radialpoint (formerly Zero Knowledge Syst ...
, Canada, University of Waterloo. *
Lars Knudsen Lars Ramkilde Knudsen (born 21 February 1962) is a Danish researcher in cryptography, particularly interested in the design and analysis of block ciphers, hash functions and message authentication codes (MACs). Academic After some early work in ...
, Denmark, DTU, discovered integral cryptanalysis. * Paul Kocher, US, discovered differential power analysis. *
Mitsuru Matsui is a Japanese cryptographer and senior researcher for Mitsubishi Electric Company. Career While researching error-correcting codes in 1990, Matsui was inspired by Eli Biham and Adi Shamir's differential cryptanalysis, and discovered the techni ...
, Japan, discoverer of linear cryptanalysis. * David Wagner, US,
UC Berkeley The University of California, Berkeley (UC Berkeley, Berkeley, Cal, or California) is a public land-grant research university in Berkeley, California. Established in 1868 as the University of California, it is the state's first land-grant uni ...
, co-discoverer of the slide and
boomerang attack In cryptography, the boomerang attack is a method for the cryptanalysis of block ciphers based on differential cryptanalysis. The attack was published in 1999 by David Wagner, who used it to break the COCONUT98 cipher. The boomerang attack has ...
s. *
Xiaoyun Wang Wang Xiaoyun (; born 1966) is a Chinese cryptographer, mathematician, and computer scientist. She is a professor in the Department of Mathematics and System Science of Shandong University and an academician of the Chinese Academy of Sciences. Ear ...
, the People's Republic of China, known for MD5 and
SHA-1 In cryptography, SHA-1 (Secure Hash Algorithm 1) is a cryptographically broken but still widely used hash function which takes an input and produces a 160- bit (20- byte) hash value known as a message digest – typically rendered as 40 hexa ...
hash function attacks. *
Alex Biryukov Alex Biryukov is a cryptographer, currently a full professor at the University of Luxembourg. His notable work includes the design of the stream cipher LEX, as well as the cryptanalysis of numerous cryptographic primitives. In 1998, he develop ...
, University of Luxembourg, known for impossible differential cryptanalysis and slide attack. * Moti Yung, Kleptography.


Algorithmic number theorists

* Daniel J. Bernstein, US, developed several popular algorithms, fought US government restrictions in ''
Bernstein v. United States ''Bernstein v. United States'' is a set of court cases brought by Daniel J. Bernstein challenging restrictions on the export of cryptography from the United States. History The case was first brought in 1995, when Bernstein was a student at U ...
.'' *
Don Coppersmith Don Coppersmith (born 1950) is a cryptographer and mathematician. He was involved in the design of the Data Encryption Standard block cipher at IBM, particularly the design of the S-boxes, strengthening them against differential cryptanalysis. ...
, US * Dorian M. Goldfeld, US. Along with Michael Anshel and Iris Anshel invented the Anshel–Anshel–Goldfeld key exchange and the
Algebraic Eraser Algebraic Eraser (AE)Also referred to as the colored Burau key agreement protocol (CBKAP), Anshel–Anshel–Goldfeld–Lemieux key agreement protocol, Algebraic Eraser key agreement protocol (AEKAP), and Algebraic Eraser Diffie–He ...
. They also helped found Braid Group Cryptography.


Theoreticians

* Mihir Bellare, US,
UCSD The University of California, San Diego (UC San Diego or colloquially, UCSD) is a public land-grant research university in San Diego, California. Established in 1960 near the pre-existing Scripps Institution of Oceanography, UC San Diego is t ...
, co-proposer of the
Random oracle In cryptography, a random oracle is an oracle (a theoretical black box) that responds to every ''unique query'' with a (truly) random response chosen uniformly from its output domain. If a query is repeated, it responds the same way every time t ...
model. * Dan Boneh, US,
Stanford Stanford University, officially Leland Stanford Junior University, is a Private university, private research university in Stanford, California. The campus occupies , among the largest in the United States, and enrolls over 17,000 students. S ...
. *
Gilles Brassard Gilles Brassard, is a faculty member of the Université de Montréal, where he has been a Full Professor since 1988 and Canada Research Chair since 2001. Education and early life Brassard received a Ph.D. in Computer Science from Cornell Uni ...
, Canada,
Université de Montréal The Université de Montréal (UdeM; ; translates to University of Montreal) is a French-language public research university in Montreal, Quebec, Canada. The university's main campus is located in the Côte-des-Neiges neighborhood of Côte- ...
. Co-inventor of quantum cryptography. *
Claude Crépeau Claude Crépeau is a professor in the School of Computer Science at McGill University. Ηe was born in Montreal, Quebec, Canada, in 1962. He received a master's degree from the Université de Montréal in 1986, and obtained his Ph.D. in Computer ...
, Canada,
McGill University McGill University (french: link=no, Université McGill) is an English-language public research university located in Montreal, Quebec, Canada. Founded in 1821 by royal charter granted by King George IV,Frost, Stanley Brice. ''McGill Univer ...
. * Oded Goldreich, Israel,
Weizmann Institute The Weizmann Institute of Science ( he, מכון ויצמן למדע ''Machon Vaitzman LeMada'') is a public research university in Rehovot, Israel, established in 1934, 14 years before the State of Israel. It differs from other Israeli u ...
, author of Foundations of Cryptography. * Shafi Goldwasser, US and Israel. * Silvio Micali, US, MIT. * Rafail Ostrovsky, US,
UCLA The University of California, Los Angeles (UCLA) is a public land-grant research university in Los Angeles, California. UCLA's academic roots were established in 1881 as a teachers college then known as the southern branch of the California ...
. * Charles Rackoff, co-discoverer of zero-knowledge proofs. * Oded Regev, inventor of learning with errors. * Phillip Rogaway, US,
UC Davis The University of California, Davis (UC Davis, UCD, or Davis) is a public land-grant research university near Davis, California. Named a Public Ivy, it is the northernmost of the ten campuses of the University of California system. The institu ...
, co-proposer of the
Random oracle In cryptography, a random oracle is an oracle (a theoretical black box) that responds to every ''unique query'' with a (truly) random response chosen uniformly from its output domain. If a query is repeated, it responds the same way every time t ...
model. *
Amit Sahai Amit Sahai (born 1974) is an American computer scientist. He is a professor of computer science at UCLA and the director of the Center for Encrypted Functionalities. Biography Amit Sahai was born in 1974 in Thousand Oaks, California, to parents w ...
, US,
UCLA The University of California, Los Angeles (UCLA) is a public land-grant research university in Los Angeles, California. UCLA's academic roots were established in 1881 as a teachers college then known as the southern branch of the California ...
. * Gustavus Simmons, US, Sandia, authentication theory. * Moti Yung, US, Google.


Government cryptographers

*
Clifford Cocks Clifford Christopher Cocks (born 28 December 1950) is a British mathematician and cryptographer. In 1973, while working at the United Kingdom Government Communications Headquarters (GCHQ), he invented a public-key cryptography algorithm equiv ...
, UK, GCHQ, secret inventor of the algorithm later known as RSA. * James H. Ellis, UK, GCHQ, secretly proved the possibility of asymmetric encryption. * Lowell Frazer, USA,
National Security Agency The National Security Agency (NSA) is a national-level intelligence agency of the United States Department of Defense, under the authority of the Director of National Intelligence (DNI). The NSA is responsible for global monitoring, collecti ...
* Julia Wetzel, USA,
National Security Agency The National Security Agency (NSA) is a national-level intelligence agency of the United States Department of Defense, under the authority of the Director of National Intelligence (DNI). The NSA is responsible for global monitoring, collecti ...
* Malcolm Williamson, UK, GCHQ, secret inventor of the protocol later known as the
Diffie–Hellman key exchange Diffie–Hellman key exchangeSynonyms of Diffie–Hellman key exchange include: * Diffie–Hellman–Merkle key exchange * Diffie–Hellman key agreement * Diffie–Hellman key establishment * Diffie–Hellman key negotiation * Exponential key exc ...
.


Cryptographer businesspeople

* Bruce Schneier, US, CTO and founder of Counterpane Internet Security, Inc. and cryptography author. * Scott Vanstone, Canada, founder of
Certicom BlackBerry Limited is a Canadian software company specializing in cybersecurity. Founded in 1984, it was originally known as Research In Motion (RIM). As RIM, it developed the BlackBerry brand of interactive pagers, smartphones, and tablet ...
and
elliptic curve cryptography Elliptic-curve cryptography (ECC) is an approach to public-key cryptography based on the algebraic structure of elliptic curves over finite fields. ECC allows smaller keys compared to non-EC cryptography (based on plain Galois fields) to provid ...
proponent.


See also

*
Cryptography Cryptography, or cryptology (from grc, , translit=kryptós "hidden, secret"; and ''graphein'', "to write", or '' -logia'', "study", respectively), is the practice and study of techniques for secure communication in the presence of adv ...


References


External links


List of cryptographers' home pages
{{DEFAULTSORT:Cryptographers Lists of people by occupation Cryptography lists and comparisons