The Art of Cryptology: From Ancient Number System to Strange Number System

From the Rosetta stone to cryptography using Strange Number System, the art and science of cryptology has been used to unlock the vivid history of ancient cultures, to turn the tide of warfare, and to thwart potential hackers from attacking computer systems. The paper begins by tracing the development of cryptology from that of an arcane practice used, for example, ancient Egyptian hieroglyphics, to the modern scientific method that is cryptography using Strange Number System. This paper explores the depth and breadth of the ancient cryptology and the modern aspects and applications of cryptography, covering ancient Greece, Roman, Egypt, India, China Mesopotamia Cryptology, cryptology of the early modern Era to Computer age and the cryptography using Strange Number System, which is recently developed. By analyzing these areas, we hope to provide a more complete picture of where the field has been and where it is headed.

[1]  Josef Pieprzyk,et al.  Cryptanalysis of Block Ciphers with Overdefined Systems of Equations , 2002, ASIACRYPT.

[2]  Arto Salomaa,et al.  Public-Key Cryptography , 1991, EATCS Monographs on Theoretical Computer Science.

[3]  D. Kahn Kahn on Codes: Secrets of the New Cryptology , 1983 .

[4]  Jan C. A. van der Lubbe,et al.  Basic Methods of Cryptography , 1998 .

[5]  D. Lateiner Signifying Names and Other Ominous Accidental Utterances in Classical Historiography , 2005 .

[6]  Mousa Farajallah,et al.  Survey Paper: Cryptography Is The Science Of Information Security , 2011 .

[7]  K. Bernstein A Hidden War , 1987 .

[8]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[9]  Albrecht Beutelspacher,et al.  Cryptology : an introduction to the art and science of enciphering, encrypting, concealing, hiding, and safeguarding described without any arcane skullduggery but not without cunning waggery for the delectation and instruction of the general public , 1994 .

[10]  Jennifer Seberry,et al.  Public Key Cryptography , 2000, Lecture Notes in Computer Science.

[11]  Ibrahim A. Al-Kadit Origins of Cryptology: the Arab Contributions , 1992, Cryptologia.

[12]  Donald Davies A brief history of cryptography , 1997, Inf. Secur. Tech. Rep..

[13]  Tony M Damico A Brief History of Cryptography , 2009 .

[14]  Stamatios V. Kartalopoulos,et al.  A primer on cryptography in communications , 2006, IEEE Communications Magazine.

[15]  Scott R. Ellis Chapter 2 – A Cryptography Primer , 2009 .