HOME

TheInfoList



OR:

This is a list of cryptographers.
Cryptography Cryptography, or cryptology (from "hidden, secret"; and ''graphein'', "to write", or ''-logy, -logia'', "study", respectively), is the practice and study of techniques for secure communication in the presence of Adversary (cryptography), ...
is the practice and study of techniques for
secure communication Secure communication is when two entities are communicating and do not want a third party to listen in. For this to be the case, the entities need to communicate in a way that is unsusceptible to eavesdropping or interception. Secure communication ...
in the presence of third parties called adversaries.


Pre twentieth century

*
Al-Khalil ibn Ahmad al-Farahidi Abu ‘Abd ar-Raḥmān al-Khalīl ibn Aḥmad ibn ‘Amr ibn Tammām al-Farāhīdī al-Azdī al-Yaḥmadī (; 718 – 786 CE), known as al-Farāhīdī, or al-Khalīl, was an Arab philologist, lexicographer and leading grammarian of Basra in ...
: wrote a (now lost) book on cryptography titled the "''Book of Cryptographic Messages''". *
Al-Kindi Abū Yūsuf Yaʻqūb ibn ʼIsḥāq aṣ-Ṣabbāḥ al-Kindī (; ; ; ) was an Arab Muslim polymath active as a philosopher, mathematician, physician, and music theorist Music theory is the study of theoretical frameworks for understandin ...
, 9th century
Arabic Arabic (, , or , ) is a Central Semitic languages, Central Semitic language of the Afroasiatic languages, Afroasiatic language family spoken primarily in the Arab world. The International Organization for Standardization (ISO) assigns lang ...
polymath and originator of frequency analysis. *
Athanasius Kircher Athanasius Kircher (2 May 1602 – 27 November 1680) was a German Society of Jesus, Jesuit scholar and polymath who published around 40 major works of comparative religion, geology, and medicine. Kircher has been compared to fellow Jes ...
, attempts to decipher crypted messages *
Augustus the Younger, Duke of Brunswick-Lüneburg Augustus II (10 April 1579 – 17 September 1666), called the Younger (), a member of the House of Welf was Duke of Brunswick-Lüneburg. In the estate division of the House of Welf of 1635, he received the Principality of Wolfenbüttel wh ...
, wrote a standard book on cryptography * Ibn Wahshiyya: published several cipher alphabets that were used to encrypt magic formulas. *
John Dee John Dee (13 July 1527 – 1608 or 1609) was an English mathematician, astronomer, teacher, astrologer, occultist, and alchemist. He was the court astronomer for, and advisor to, Elizabeth I, and spent much of his time on alchemy, divination, ...
, wrote an occult book, which in fact was a cover for crypted text * Ibn 'Adlan: 13th-century cryptographer who made important contributions on the sample size of the frequency analysis. *
Duke of Mantua During its Timeline of Mantua, history as independent entity, Mantua had different rulers who governed on the city and the lands of Mantua from the Middle Ages to the early modern period. From 970 to 1115, the Counts of Mantua were members of ...
Francesco I Gonzaga image:Ritratto di Francesco I Gonzaga.jpg, Portrait of Francesco I Gonzaga Francesco I Gonzaga (1366 – 7 March 1407) was List of rulers of Mantua, ruler of Mantua from 1382 to 1407. He was also a condottiero. Diplomatic policies towards Mil ...
is the one who used the earliest example of homophonic
Substitution cipher In cryptography, a substitution cipher is a method of encrypting in which units of plaintext are replaced with the ciphertext, in a defined manner, with the help of a key; the "units" may be single letters (the most common), pairs of letters, t ...
in early 1400s. * Ibn al-Durayhim: gave detailed descriptions of eight cipher systems that discussed substitution ciphers, leading to the earliest suggestion of a "tableau" of the kind that two centuries later became known as the "Vigenère table". * Ahmad al-Qalqashandi: Author of ''Subh al-a 'sha'', a fourteen volume encyclopedia in Arabic, which included a section on cryptology. The list of ciphers in this work included both substitution and transposition, and for the first time, a cipher with multiple substitutions for each plaintext letter. *
Charles Babbage Charles Babbage (; 26 December 1791 – 18 October 1871) was an English polymath. A mathematician, philosopher, inventor and mechanical engineer, Babbage originated the concept of a digital programmable computer. Babbage is considered ...
, UK, 19th century mathematician who, about the time of the
Crimean War The Crimean War was fought between the Russian Empire and an alliance of the Ottoman Empire, the Second French Empire, the United Kingdom of Great Britain and Ireland, and the Kingdom of Sardinia (1720–1861), Kingdom of Sardinia-Piedmont fro ...
, secretly developed an effective attack against polyalphabetic substitution ciphers. *
Leone Battista Alberti Leon Battista Alberti (; 14 February 1404 – 25 April 1472) was an Italian Renaissance humanist author, artist, architect, poet, priest, linguist, philosopher, and cryptographer; he epitomised the nature of those identified now as polymaths. H ...
,
polymath A polymath or polyhistor is an individual whose knowledge spans many different subjects, known to draw on complex bodies of knowledge to solve specific problems. Polymaths often prefer a specific context in which to explain their knowledge, ...
/universal
genius Genius is a characteristic of original and exceptional insight in the performance of some art or endeavor that surpasses expectations, sets new standards for the future, establishes better methods of operation, or remains outside the capabiliti ...
, inventor of polyalphabetic substitution (more specifically, the Alberti cipher), and what may have been the first mechanical encryption aid. * Giovanni Battista della Porta, author of a seminal work on
cryptanalysis Cryptanalysis (from the Greek ''kryptós'', "hidden", and ''analýein'', "to analyze") refers to the process of analyzing information systems in order to understand hidden aspects of the systems. Cryptanalysis is used to breach cryptographic se ...
. * Étienne Bazeries, French, military, considered one of the greatest natural cryptanalysts. Best known for developing the " Bazeries Cylinder" and his influential 1901 text ''Les Chiffres secrets dévoilés'' ("Secret ciphers unveiled"). * Giovan Battista Bellaso, Italian cryptologist * Giovanni Fontana (engineer), wrote two encrypted books *
Hildegard of Bingen Hildegard of Bingen Benedictines, OSB (, ; ; 17 September 1179), also known as the Sibyl of the Rhine, was a German Benedictines, Benedictine abbess and polymath active as a writer, composer, philosopher, Christian mysticism, mystic, visiona ...
used her own alphabet to write letters. *
Julius Caesar Gaius Julius Caesar (12 or 13 July 100 BC – 15 March 44 BC) was a Roman general and statesman. A member of the First Triumvirate, Caesar led the Roman armies in the Gallic Wars before defeating his political rival Pompey in Caesar's civil wa ...
, Roman general/politician, has the Caesar cipher named after him, and a lost work on cryptography by Probus (probably Valerius Probus) is claimed to have covered his use of military cryptography in some detail. It is likely that he did not invent the cipher named after him, as other
substitution cipher In cryptography, a substitution cipher is a method of encrypting in which units of plaintext are replaced with the ciphertext, in a defined manner, with the help of a key; the "units" may be single letters (the most common), pairs of letters, t ...
s were in use well before his time. * Friedrich Kasiski, author of the first published attack on the
Vigenère cipher The Vigenère cipher () is a method of encryption, encrypting alphabetic text where each letter of the plaintext is encoded with a different Caesar cipher, whose increment is determined by the corresponding letter of another text, the key (crypt ...
, now known as the Kasiski test. *
Auguste Kerckhoffs Auguste Kerckhoffs (19 January 1835 – 9 August 1903) was a Dutch linguist and cryptographer in the late 19th century. Biography Kerckhoffs was born in Nuth, the Netherlands, as Jean Guillaume Auguste Victor François Hubert Kerckhoffs, ...
, known for contributing cipher design principles. *
Edgar Allan Poe Edgar Allan Poe (; January 19, 1809 – October 7, 1849) was an American writer, poet, editor, and literary critic who is best known for his poetry and short stories, particularly his tales involving mystery and the macabre. He is widely re ...
, author of the book, ''A Few Words on Secret Writing'', an essay on cryptanalysis, and '' The Gold Bug'', a short story featuring the use of letter frequencies in the solution of a cryptogram. *
Johannes Trithemius Johannes Trithemius (; 1 February 1462 – 13 December 1516), born Johann Heidenberg, was a German Benedictine abbot and a polymath who was active in the German Renaissance as a Lexicography, lexicographer, chronicler, Cryptography, cryptograph ...
, mystic and first to describe ''tableaux'' (tables) for use in polyalphabetic substitution. Wrote an early work on
steganography Steganography ( ) is the practice of representing information within another message or physical object, in such a manner that the presence of the concealed information would not be evident to an unsuspecting person's examination. In computing/ ...
and cryptography generally. * Philips van Marnix, lord of Sint-Aldegonde, deciphered Spanish messages for
William the Silent William the Silent or William the Taciturn (; 24 April 153310 July 1584), more commonly known in the Netherlands as William of Orange (), was the leader of the Dutch revolt against the Spanish Habsburg Netherlands, Habsburgs that set off the ...
during the Dutch revolt against the Spanish. *
John Wallis John Wallis (; ; ) was an English clergyman and mathematician, who is given partial credit for the development of infinitesimal calculus. Between 1643 and 1689 Wallis served as chief cryptographer for Parliament and, later, the royal court. ...
codebreaker for Cromwell and Charles II * Sir Charles Wheatstone, inventor of the so-called Playfair cipher and general polymath.


World War I and World War II wartime cryptographers

* Richard J. Hayes (1902–1976) Irish code breaker in World War II. * Jean Argles (1925–2023), British code breaker in World War II *
Arne Beurling Arne Carl-August Beurling (3 February 1905 – 20 November 1986) was a Sweden, Swedish mathematician and professor of mathematics at Uppsala University (1937–1954) and later at the Institute for Advanced Study in Princeton, New Jersey. Beurling ...
(1905–1986), Swedish mathematician and cryptographer. * Lambros D. Callimahos, US, NSA, worked with William F. Friedman, taught NSA cryptanalysts. * Ann Z. Caracristi, US, SIS, solved Japanese Army codes in World War II, later became deputy director of
National Security Agency The National Security Agency (NSA) is an intelligence agency of the United States Department of Defense, under the authority of the director of national intelligence (DNI). The NSA is responsible for global monitoring, collection, and proces ...
. * Alec Naylor Dakin, UK, Hut 4,
Bletchley Park Bletchley Park is an English country house and Bletchley Park estate, estate in Bletchley, Milton Keynes (Buckinghamshire), that became the principal centre of Allies of World War II, Allied World War II cryptography, code-breaking during the S ...
during World War II. * Ludomir Danilewicz,
Poland Poland, officially the Republic of Poland, is a country in Central Europe. It extends from the Baltic Sea in the north to the Sudetes and Carpathian Mountains in the south, bordered by Lithuania and Russia to the northeast, Belarus and Ukrai ...
, Biuro Szyfrow, helped to construct the Enigma machine copies to break the ciphers. * Patricia Davies (born 1923), British code breaker in World War II *
Alastair Denniston Commander Alexander "Alastair" Guthrie Denniston (1 December 1881 – 1 January 1961) was a Scottish codebreaker, deputy head of the Government Code and Cypher School (GC&CS) and hockey player. Denniston was appointed operational head of GC&CS ...
, UK, director of the
Government Code and Cypher School The Government Code and Cypher School (GC&CS) was a British signals intelligence agency set up in 1919. During the First World War, the British Army and Royal Navy had separate signals intelligence agencies, MI1b and NID25 (initially known as R ...
at
Bletchley Park Bletchley Park is an English country house and Bletchley Park estate, estate in Bletchley, Milton Keynes (Buckinghamshire), that became the principal centre of Allies of World War II, Allied World War II cryptography, code-breaking during the S ...
from 1919 to 1942. * Agnes Meyer Driscoll, US, broke several Japanese ciphers. * Genevieve Grotjan Feinstein, US, SIS, noticed the pattern that led to breaking
Purple Purple is a color similar in appearance to violet light. In the RYB color model historically used in the arts, purple is a secondary color created by combining red and blue pigments. In the CMYK color model used in modern printing, purple is ...
. *
Elizebeth Smith Friedman Elizebeth Smith Friedman (August 26, 1892 – October 31, 1980) was an Americans, American cryptanalyst and author who deciphered enemy codes in both World Wars and helped to solve international smuggling cases during Prohibition in the United S ...
, US,
Coast Guard A coast guard or coastguard is a Maritime Security Regimes, maritime security organization of a particular country. The term embraces wide range of responsibilities in different countries, from being a heavily armed military force with cust ...
and
US Treasury Department The Department of the Treasury (USDT) is the national treasury and finance department of the federal government of the United States. It is one of 15 current U.S. government departments. The department oversees the Bureau of Engraving and ...
cryptographer, co-invented modern cryptography. * William F. Friedman, US, SIS, introduced statistical methods into
cryptography Cryptography, or cryptology (from "hidden, secret"; and ''graphein'', "to write", or ''-logy, -logia'', "study", respectively), is the practice and study of techniques for secure communication in the presence of Adversary (cryptography), ...
. * Cecilia Elspeth Giles, UK,
Bletchley Park Bletchley Park is an English country house and Bletchley Park estate, estate in Bletchley, Milton Keynes (Buckinghamshire), that became the principal centre of Allies of World War II, Allied World War II cryptography, code-breaking during the S ...
* Jack Good UK,
Government Code and Cypher School The Government Code and Cypher School (GC&CS) was a British signals intelligence agency set up in 1919. During the First World War, the British Army and Royal Navy had separate signals intelligence agencies, MI1b and NID25 (initially known as R ...
,
Bletchley Park Bletchley Park is an English country house and Bletchley Park estate, estate in Bletchley, Milton Keynes (Buckinghamshire), that became the principal centre of Allies of World War II, Allied World War II cryptography, code-breaking during the S ...
worked with
Alan Turing Alan Mathison Turing (; 23 June 1912 – 7 June 1954) was an English mathematician, computer scientist, logician, cryptanalyst, philosopher and theoretical biologist. He was highly influential in the development of theoretical computer ...
on the statistical approach to cryptanalysis. * Nigel de Grey, UK,
Room 40 Room 40, also known as 40 O.B. (old building; officially part of NID25), was the cryptanalysis section of the British Admiralty during the First World War. The group, which was formed in October 1914, began when Rear-Admiral Henry Oliver, the ...
, played an important role in the decryption of the Zimmermann Telegram during World War I. * Dillwyn Knox, UK,
Room 40 Room 40, also known as 40 O.B. (old building; officially part of NID25), was the cryptanalysis section of the British Admiralty during the First World War. The group, which was formed in October 1914, began when Rear-Admiral Henry Oliver, the ...
and
Government Code and Cypher School The Government Code and Cypher School (GC&CS) was a British signals intelligence agency set up in 1919. During the First World War, the British Army and Royal Navy had separate signals intelligence agencies, MI1b and NID25 (initially known as R ...
, broke commercial Enigma cipher as used by the
Abwehr The (German language, German for ''resistance'' or ''defence'', though the word usually means ''counterintelligence'' in a military context) ) was the German military intelligence , military-intelligence service for the ''Reichswehr'' and the ...
(German military intelligence). * Solomon Kullback US, SIS, helped break the Japanese Red cipher, later Chief Scientist at the
National Security Agency The National Security Agency (NSA) is an intelligence agency of the United States Department of Defense, under the authority of the director of national intelligence (DNI). The NSA is responsible for global monitoring, collection, and proces ...
. * Frank W. Lewis US, worked with William F. Friedman, puzzle master * William Hamilton Martin and Bernon F. Mitchell, U.S.
National Security Agency The National Security Agency (NSA) is an intelligence agency of the United States Department of Defense, under the authority of the director of national intelligence (DNI). The NSA is responsible for global monitoring, collection, and proces ...
cryptologists who defected to the Soviet Union in 1960 *
Leo Marks Leopold Samuel Marks, (24 September 1920 – 15 January 2001) was an English writer, screenwriter, and cryptographer. During the Second World War he headed the codes office supporting resistance agents in occupied Europe for the secret Special ...
UK,
Special Operations Executive Special Operations Executive (SOE) was a British organisation formed in 1940 to conduct espionage, sabotage and reconnaissance in German-occupied Europe and to aid local Resistance during World War II, resistance movements during World War II. ...
cryptography director, author and playwright. *
Donald Michie Donald Michie (; 11 November 1923 – 7 July 2007) was a British researcher in artificial intelligence. During World War II, Michie worked for the Government Code and Cypher School at Bletchley Park, contributing to the effort to solve " Tunny ...
UK,
Government Code and Cypher School The Government Code and Cypher School (GC&CS) was a British signals intelligence agency set up in 1919. During the First World War, the British Army and Royal Navy had separate signals intelligence agencies, MI1b and NID25 (initially known as R ...
,
Bletchley Park Bletchley Park is an English country house and Bletchley Park estate, estate in Bletchley, Milton Keynes (Buckinghamshire), that became the principal centre of Allies of World War II, Allied World War II cryptography, code-breaking during the S ...
worked on
Cryptanalysis of the Lorenz cipher Cryptanalysis of the Lorenz cipher was the process that enabled the British to read high-level German army messages during World War II. The British Government Code and Cypher School (GC&CS) at Bletchley Park decrypted many communications betwee ...
and the
Colossus computer Colossus was a set of computers developed by British cryptanalysis, codebreakers in the years 1943–1945 to help in the cryptanalysis of the Lorenz cipher. Colossus used vacuum tube, thermionic valves (vacuum tubes) to perform Boolean algebra ...
. * Consuelo Milner, US, crytopgraher for the Naval Applied Science Lab *
Max Newman Maxwell Herman Alexander Newman, FRS (7 February 1897 – 22 February 1984), generally known as Max Newman, was a British mathematician and codebreaker. His work in World War II led to the construction of Colossus, the world's first operatio ...
, UK,
Government Code and Cypher School The Government Code and Cypher School (GC&CS) was a British signals intelligence agency set up in 1919. During the First World War, the British Army and Royal Navy had separate signals intelligence agencies, MI1b and NID25 (initially known as R ...
,
Bletchley Park Bletchley Park is an English country house and Bletchley Park estate, estate in Bletchley, Milton Keynes (Buckinghamshire), that became the principal centre of Allies of World War II, Allied World War II cryptography, code-breaking during the S ...
headed the section that developed the
Colossus computer Colossus was a set of computers developed by British cryptanalysis, codebreakers in the years 1943–1945 to help in the cryptanalysis of the Lorenz cipher. Colossus used vacuum tube, thermionic valves (vacuum tubes) to perform Boolean algebra ...
for
Cryptanalysis of the Lorenz cipher Cryptanalysis of the Lorenz cipher was the process that enabled the British to read high-level German army messages during World War II. The British Government Code and Cypher School (GC&CS) at Bletchley Park decrypted many communications betwee ...
. * Georges Painvin French, broke the ADFGVX cipher during the
First World War World War I or the First World War (28 July 1914 – 11 November 1918), also known as the Great War, was a World war, global conflict between two coalitions: the Allies of World War I, Allies (or Entente) and the Central Powers. Fighting to ...
. *
Marian Rejewski Marian Adam Rejewski (; 16 August 1905 – 13 February 1980) was a Polish people, Polish mathematician and Cryptography, cryptologist who in late 1932 reconstructed the sight-unseen German military Enigma machine, Enigma cipher machine, aided ...
,
Poland Poland, officially the Republic of Poland, is a country in Central Europe. It extends from the Baltic Sea in the north to the Sudetes and Carpathian Mountains in the south, bordered by Lithuania and Russia to the northeast, Belarus and Ukrai ...
,
Biuro Szyfrów The Cipher Bureau ( Polish: ''Biuro Szyfrów'', ) was the interwar Polish General Staff's Second Department's unit charged with SIGINT and both cryptography (the ''use'' of ciphers and codes) and cryptanalysis (the ''study'' of ciphers and cod ...
, a Polish mathematician and cryptologist who, in 1932, solved the
Enigma machine The Enigma machine is a cipher device developed and used in the early- to mid-20th century to protect commercial, diplomatic, and military communication. It was employed extensively by Nazi Germany during World War II, in all branches of the W ...
with plugboard, the main cipher device then in use by Germany. The first to break the cipher in history. * John Joseph Rochefort US, made major contributions to the break into JN-25 after the
attack on Pearl Harbor The attack on Pearl HarborAlso known as the Battle of Pearl Harbor was a surprise military strike by the Empire of Japan on the United States Pacific Fleet at Naval Station Pearl Harbor, its naval base at Pearl Harbor on Oahu, Territory of ...
. * Leo Rosen US, SIS, deduced that the Japanese Purple machine was built with stepping switches. * Frank Rowlett US, SIS, leader of the team that broke
Purple Purple is a color similar in appearance to violet light. In the RYB color model historically used in the arts, purple is a secondary color created by combining red and blue pigments. In the CMYK color model used in modern printing, purple is ...
. * Jerzy Różycki,
Poland Poland, officially the Republic of Poland, is a country in Central Europe. It extends from the Baltic Sea in the north to the Sudetes and Carpathian Mountains in the south, bordered by Lithuania and Russia to the northeast, Belarus and Ukrai ...
,
Biuro Szyfrów The Cipher Bureau ( Polish: ''Biuro Szyfrów'', ) was the interwar Polish General Staff's Second Department's unit charged with SIGINT and both cryptography (the ''use'' of ciphers and codes) and cryptanalysis (the ''study'' of ciphers and cod ...
, helped break German Enigma ciphers. * Luigi Sacco, Italy, Italian General and author of the ''Manual of Cryptography''. * Laurance Safford US, chief cryptographer for the US Navy for 2 decades+, including World War II. * Abraham Sinkov US, SIS. * John Tiltman UK, Brigadier,
Room 40 Room 40, also known as 40 O.B. (old building; officially part of NID25), was the cryptanalysis section of the British Admiralty during the First World War. The group, which was formed in October 1914, began when Rear-Admiral Henry Oliver, the ...
,
Government Code and Cypher School The Government Code and Cypher School (GC&CS) was a British signals intelligence agency set up in 1919. During the First World War, the British Army and Royal Navy had separate signals intelligence agencies, MI1b and NID25 (initially known as R ...
,
Bletchley Park Bletchley Park is an English country house and Bletchley Park estate, estate in Bletchley, Milton Keynes (Buckinghamshire), that became the principal centre of Allies of World War II, Allied World War II cryptography, code-breaking during the S ...
,
GCHQ Government Communications Headquarters (GCHQ) is an intelligence and security organisation responsible for providing signals intelligence (SIGINT) and information assurance (IA) to the government and armed forces of the United Kingdom. Primar ...
, NSA. Extraordinary length and range of cryptographic service * Alan Mathison Turing UK,
Government Code and Cypher School The Government Code and Cypher School (GC&CS) was a British signals intelligence agency set up in 1919. During the First World War, the British Army and Royal Navy had separate signals intelligence agencies, MI1b and NID25 (initially known as R ...
,
Bletchley Park Bletchley Park is an English country house and Bletchley Park estate, estate in Bletchley, Milton Keynes (Buckinghamshire), that became the principal centre of Allies of World War II, Allied World War II cryptography, code-breaking during the S ...
where he was chief cryptographer, inventor of the
Bombe The bombe () was an Electromechanics, electro-mechanical device used by British cryptologists to help decipher German Enigma machine, Enigma-machine-encrypted secret messages during World War II. The United States Navy, US Navy and United Sta ...
that was used in decrypting Enigma, mathematician, logician, and renowned pioneer of
Computer Science Computer science is the study of computation, information, and automation. Computer science spans Theoretical computer science, theoretical disciplines (such as algorithms, theory of computation, and information theory) to Applied science, ...
. * William Thomas Tutte UK,
Government Code and Cypher School The Government Code and Cypher School (GC&CS) was a British signals intelligence agency set up in 1919. During the First World War, the British Army and Royal Navy had separate signals intelligence agencies, MI1b and NID25 (initially known as R ...
,
Bletchley Park Bletchley Park is an English country house and Bletchley Park estate, estate in Bletchley, Milton Keynes (Buckinghamshire), that became the principal centre of Allies of World War II, Allied World War II cryptography, code-breaking during the S ...
, with John Tiltman, broke Lorenz SZ 40/42 encryption machine (codenamed Tunny) leading to the development of the
Colossus computer Colossus was a set of computers developed by British cryptanalysis, codebreakers in the years 1943–1945 to help in the cryptanalysis of the Lorenz cipher. Colossus used vacuum tube, thermionic valves (vacuum tubes) to perform Boolean algebra ...
. * Betty Webb (code breaker), British codebreaker during World War II * William Stone Weedon, US, *
Gordon Welchman William Gordon Welchman OBE (15 June 1906 – 8 October 1985) was an English mathematician. During World War II, he worked at Britain's secret decryption centre at Bletchley Park, where he was one of the most important contributors. In 1948, a ...
UK,
Government Code and Cypher School The Government Code and Cypher School (GC&CS) was a British signals intelligence agency set up in 1919. During the First World War, the British Army and Royal Navy had separate signals intelligence agencies, MI1b and NID25 (initially known as R ...
,
Bletchley Park Bletchley Park is an English country house and Bletchley Park estate, estate in Bletchley, Milton Keynes (Buckinghamshire), that became the principal centre of Allies of World War II, Allied World War II cryptography, code-breaking during the S ...
where he was head of Hut Six (German Army and Air Force Enigma
cipher In cryptography, a cipher (or cypher) is an algorithm for performing encryption or decryption—a series of well-defined steps that can be followed as a procedure. An alternative, less common term is ''encipherment''. To encipher or encode i ...
.
decryption In cryptography, encryption (more specifically, encoding) is the process of transforming information in a way that, ideally, only authorized parties can decode. This process converts the original representation of the information, known as plai ...
), made an important contribution to the design of the
Bombe The bombe () was an Electromechanics, electro-mechanical device used by British cryptologists to help decipher German Enigma machine, Enigma-machine-encrypted secret messages during World War II. The United States Navy, US Navy and United Sta ...
. * Herbert Yardley US, MI8 (US), author "The American Black Chamber", worked in China as a cryptographer and briefly in Canada. * Henryk Zygalski,
Poland Poland, officially the Republic of Poland, is a country in Central Europe. It extends from the Baltic Sea in the north to the Sudetes and Carpathian Mountains in the south, bordered by Lithuania and Russia to the northeast, Belarus and Ukrai ...
,
Biuro Szyfrów The Cipher Bureau ( Polish: ''Biuro Szyfrów'', ) was the interwar Polish General Staff's Second Department's unit charged with SIGINT and both cryptography (the ''use'' of ciphers and codes) and cryptanalysis (the ''study'' of ciphers and cod ...
, inventor of Zygalski sheets, broke German Enigma ciphers pre-1939. * Karl Stein German, Head of the Division IVa (security of own processes) at
Cipher Department of the High Command of the Wehrmacht The Cipher Department of the High Command of the Wehrmacht () (also ''Oberkommando der Wehrmacht Chiffrierabteilung'' or ''Chiffrierabteilung of the High Command of the Wehrmacht'' or ''Chiffrierabteilung of the OKW'' or ''OKW/Chi'' or ''Chi'') ...
. Discoverer of Stein manifold. * Gisbert Hasenjaeger German, Tester of the Enigma. Discovered new proof of the
completeness theorem Complete may refer to: Logic * Completeness (logic) * Completeness of a theory, the property of a theory that every formula in the theory's language or its negation is provable Mathematics * The completeness of the real numbers, which implies ...
of
Kurt Gödel Kurt Friedrich Gödel ( ; ; April 28, 1906 – January 14, 1978) was a logician, mathematician, and philosopher. Considered along with Aristotle and Gottlob Frege to be one of the most significant logicians in history, Gödel profoundly ...
for
predicate logic First-order logic, also called predicate logic, predicate calculus, or quantificational logic, is a collection of formal systems used in mathematics, philosophy, linguistics, and computer science. First-order logic uses quantified variables ove ...
. *
Heinrich Scholz Heinrich Scholz (; 17 December 1884 – 30 December 1956) was a German logician, philosopher, and Protestant theologian. He was a peer of Alan Turing who mentioned Scholz when writing with regard to the reception of "On Computable Numbers, wit ...
German, Worked in Division IVa at OKW. Logician and pen friend of Alan Turning. * Gottfried Köthe German, Cryptanalyst at OKW. Mathematician created theory of
topological vector spaces In mathematics, a topological vector space (also called a linear topological space and commonly abbreviated TVS or t.v.s.) is one of the basic structures investigated in functional analysis. A topological vector space is a vector space that is als ...
. * Ernst Witt German, Mathematician at OKW. Mathematical Discoveries Named After Ernst Witt. * Helmut Grunsky German, worked in
complex analysis Complex analysis, traditionally known as the theory of functions of a complex variable, is the branch of mathematical analysis that investigates functions of complex numbers. It is helpful in many branches of mathematics, including algebraic ...
and geometric function theory. He introduced Grunsky's theorem and the Grunsky inequalities. * Georg Hamel. * Oswald Teichmüller German, temporarily employed at OKW as cryptanalyst. Introduced quasiconformal mappings and differential geometric methods into
complex analysis Complex analysis, traditionally known as the theory of functions of a complex variable, is the branch of mathematical analysis that investigates functions of complex numbers. It is helpful in many branches of mathematics, including algebraic ...
. Described by
Friedrich L. Bauer Friedrich Ludwig "Fritz" Bauer (10 June 1924 – 26 March 2015) was a German pioneer of computer science and professor at the Technical University of Munich. Life Bauer earned his Abitur in 1942 and served in the Wehrmacht during World War ...
as an extreme Nazi and a true genius. *
Hans Rohrbach Hans Rohrbach (27 February 1903 – 19 December 1993) was a German mathematician. He worked both as an algebraist and a Number theory, number theorist and later worked as Cryptanalysis, cryptanalyst at Pers Z S, the German Foreign Office cipher ...
German, Mathematician at AA/Pers Z, the German department of state, civilian diplomatic cryptological agency. * Wolfgang Franz German, Mathematician who worked at OKW. Later significant discoveries in
Topology Topology (from the Greek language, Greek words , and ) is the branch of mathematics concerned with the properties of a Mathematical object, geometric object that are preserved under Continuous function, continuous Deformation theory, deformat ...
. * Werner Weber German, Mathematician at OKW. * Georg Aumann German, Mathematician at OKW. His doctoral student was
Friedrich L. Bauer Friedrich Ludwig "Fritz" Bauer (10 June 1924 – 26 March 2015) was a German pioneer of computer science and professor at the Technical University of Munich. Life Bauer earned his Abitur in 1942 and served in the Wehrmacht during World War ...
. * Otto Leiberich German, Mathematician who worked as a linguist at the
Cipher Department of the High Command of the Wehrmacht The Cipher Department of the High Command of the Wehrmacht () (also ''Oberkommando der Wehrmacht Chiffrierabteilung'' or ''Chiffrierabteilung of the High Command of the Wehrmacht'' or ''Chiffrierabteilung of the OKW'' or ''OKW/Chi'' or ''Chi'') ...
. * Alexander Aigner German, Mathematician who worked at OKW. * Erich Hüttenhain German, Chief cryptanalyst of and led Chi IV (section 4) of the
Cipher Department of the High Command of the Wehrmacht The Cipher Department of the High Command of the Wehrmacht () (also ''Oberkommando der Wehrmacht Chiffrierabteilung'' or ''Chiffrierabteilung of the High Command of the Wehrmacht'' or ''Chiffrierabteilung of the OKW'' or ''OKW/Chi'' or ''Chi'') ...
. A German mathematician and cryptanalyst who tested a number of German cipher machines and found them to be breakable. * Wilhelm Fenner German, Chief Cryptologist and Director of
Cipher Department of the High Command of the Wehrmacht The Cipher Department of the High Command of the Wehrmacht () (also ''Oberkommando der Wehrmacht Chiffrierabteilung'' or ''Chiffrierabteilung of the High Command of the Wehrmacht'' or ''Chiffrierabteilung of the OKW'' or ''OKW/Chi'' or ''Chi'') ...
. * Walther Fricke German, Worked alongside Dr Erich Hüttenhain at
Cipher Department of the High Command of the Wehrmacht The Cipher Department of the High Command of the Wehrmacht () (also ''Oberkommando der Wehrmacht Chiffrierabteilung'' or ''Chiffrierabteilung of the High Command of the Wehrmacht'' or ''Chiffrierabteilung of the OKW'' or ''OKW/Chi'' or ''Chi'') ...
. Mathematician, logician, cryptanalyst and linguist. * Fritz Menzer German. Inventor of SG39 and SG41.


Other pre-computer

* Rosario Candela, US, Architect and notable amateur cryptologist who authored books and taught classes on the subject to civilians at
Hunter College Hunter College is a public university in New York City, United States. It is one of the constituent colleges of the City University of New York and offers studies in more than one hundred undergraduate and postgraduate fields across five schools ...
. *
Claude Elwood Shannon Claude Elwood Shannon (April 30, 1916 – February 24, 2001) was an American mathematician, electrical engineer, computer scientist, cryptographer and inventor known as the "father of information theory" and the man who laid the foundations of th ...
, US, founder of
information theory Information theory is the mathematical study of the quantification (science), quantification, Data storage, storage, and telecommunications, communication of information. The field was established and formalized by Claude Shannon in the 1940s, ...
, proved the
one-time pad The one-time pad (OTP) is an encryption technique that cannot be Cryptanalysis, cracked in cryptography. It requires the use of a single-use pre-shared key that is larger than or equal to the size of the message being sent. In this technique, ...
to be unbreakable.


Modern

See also: Modern cryptographers for a more exhaustive list.


Symmetric-key algorithm inventors

* Ross Anderson, UK,
University of Cambridge The University of Cambridge is a Public university, public collegiate university, collegiate research university in Cambridge, England. Founded in 1209, the University of Cambridge is the List of oldest universities in continuous operation, wo ...
, co-inventor of the Serpent cipher. * Paulo S. L. M. Barreto, Brazilian,
University of São Paulo The Universidade de São Paulo (, USP) is a public research university in the Brazilian state of São Paulo, and the largest public university in Brazil. The university was founded on 25 January 1934, regrouping already existing schools in ...
, co-inventor of the Whirlpool hash function. * George Blakley, US, independent inventor of
secret sharing Secret sharing (also called secret splitting) refers to methods for distributing a secrecy, secret among a group, in such a way that no individual holds any intelligible information about the secret, but when a sufficient number of individuals c ...
. *
Eli Biham Eli Biham () is an Israeli cryptographer and cryptanalyst who is a professor at the Technion - Israel Institute of Technology Computer Science department. From 2008 to 2013, Biham was the dean of the Technion Computer Science department, afte ...
, Israel, co-inventor of the Serpent cipher. * Don Coppersmith, co-inventor of DES and
MARS Mars is the fourth planet from the Sun. It is also known as the "Red Planet", because of its orange-red appearance. Mars is a desert-like rocky planet with a tenuous carbon dioxide () atmosphere. At the average surface level the atmosph ...
ciphers. *
Joan Daemen Joan Daemen (; born 1965) is a Belgians, Belgian cryptographer who is currently professor of digital security (symmetric encryption) at Radboud University. He co-designed with Vincent Rijmen the Rijndael cipher, which was selected as the Advance ...
, Belgian,
Radboud University Radboud University (abbreviated as RU, , formerly ) is a public research university located in Nijmegen, Netherlands. RU has seven faculties and more than 24,000 students. Established in 1923, Radboud University has consistently been included in ...
, co-developer of
Rijndael The Advanced Encryption Standard (AES), also known by its original name Rijndael (), is a specification for the encryption of electronic data established by the U.S. National Institute of Standards and Technology (NIST) in 2001. AES is a variant ...
which became the
Advanced Encryption Standard The Advanced Encryption Standard (AES), also known by its original name Rijndael (), is a specification for the encryption of electronic data established by the U.S. National Institute of Standards and Technology (NIST) in 2001. AES is a variant ...
(AES), and
Keccak SHA-3 (Secure Hash Algorithm 3) is the latest member of the Secure Hash Algorithm family of standards, released by NIST on August 5, 2015. Although part of the same series of standards, SHA-3 is internally different from the MD5-like struct ...
which became
SHA-3 SHA-3 (Secure Hash Algorithm 3) is the latest member of the Secure Hash Algorithm family of standards, released by NIST on August 5, 2015. Although part of the same series of standards, SHA-3 is internally different from the MD5-like stru ...
. * Horst Feistel, German,
IBM International Business Machines Corporation (using the trademark IBM), nicknamed Big Blue, is an American Multinational corporation, multinational technology company headquartered in Armonk, New York, and present in over 175 countries. It is ...
, namesake of Feistel networks and
Lucifer The most common meaning for Lucifer in English is as a name for the Devil in Christian theology. He appeared in the King James Version of the Bible in Isaiah and before that in the Vulgate (the late-4th-century Latin translation of the Bib ...
cipher. *
Lars Knudsen Lars Ramkilde Knudsen (born 21 February 1962) is a Denmark, Danish researcher in cryptography, particularly interested in the design and cryptanalysis, analysis of block ciphers, cryptographic hash function, hash functions and message authentic ...
,
Denmark Denmark is a Nordic countries, Nordic country in Northern Europe. It is the metropole and most populous constituent of the Kingdom of Denmark,, . also known as the Danish Realm, a constitutionally unitary state that includes the Autonomous a ...
, co-inventor of the Serpent cipher. *
Ralph Merkle Ralph C. Merkle (born February 2, 1952) is an American computer scientist and mathematician. He is one of the inventors of public-key cryptography, the inventor of cryptographic hashing, and more recently a researcher and speaker on cryonics. M ...
, US, inventor of Merkle trees. * Bart Preneel, Belgian,
KU Leuven KU Leuven (Katholieke Universiteit Leuven) is a Catholic research university in the city of Leuven, Leuven, Belgium. Founded in 1425, it is the oldest university in Belgium and the oldest university in the Low Countries. In addition to its mai ...
, co-inventor of RIPEMD-160. *
Vincent Rijmen Vincent Rijmen (; born 16 October 1970) is a Belgium, Belgian cryptographer and one of the two designers of the Rijndael, the Advanced Encryption Standard. Rijmen is also the co-designer of the WHIRLPOOL cryptographic hash function, and the block ...
, Belgian,
KU Leuven KU Leuven (Katholieke Universiteit Leuven) is a Catholic research university in the city of Leuven, Leuven, Belgium. Founded in 1425, it is the oldest university in Belgium and the oldest university in the Low Countries. In addition to its mai ...
, co-developer of
Rijndael The Advanced Encryption Standard (AES), also known by its original name Rijndael (), is a specification for the encryption of electronic data established by the U.S. National Institute of Standards and Technology (NIST) in 2001. AES is a variant ...
which became the
Advanced Encryption Standard The Advanced Encryption Standard (AES), also known by its original name Rijndael (), is a specification for the encryption of electronic data established by the U.S. National Institute of Standards and Technology (NIST) in 2001. AES is a variant ...
(AES). * Ronald L. Rivest, US,
MIT The Massachusetts Institute of Technology (MIT) is a private research university in Cambridge, Massachusetts, United States. Established in 1861, MIT has played a significant role in the development of many areas of modern technology and sc ...
, inventor of RC cipher series and MD algorithm series. *
Bruce Schneier Bruce Schneier (; born January 15, 1963) is an American cryptographer, computer security professional, privacy specialist, and writer. Schneier is an Adjunct Lecturer in Public Policy at the Harvard Kennedy School and a Fellow at the Berkman ...
, US, inventor of Blowfish and co-inventor of Twofish and Threefish. * Xuejia Lai, CH, co-inventor of
International Data Encryption Algorithm In cryptography, the International Data Encryption Algorithm (IDEA), originally called Improved Proposed Encryption Standard (IPES), is a Symmetric-key algorithm, symmetric-key block cipher designed by James Massey of ETH Zurich and Xuejia Lai an ...
(IDEA). *
Adi Shamir Adi Shamir (; born July 6, 1952) is an Israeli cryptographer and inventor. He is a co-inventor of the Rivest–Shamir–Adleman (RSA) algorithm (along with Ron Rivest and Len Adleman), a co-inventor of the Feige–Fiat–Shamir identification sc ...
, Israel,
Weizmann Institute The Weizmann Institute of Science ( ''Machon Weizmann LeMada'') is a Public university, public research university in Rehovot, Israel, established in 1934, fourteen years before the State of Israel was founded. Unlike other List of Israeli uni ...
, inventor of
secret sharing Secret sharing (also called secret splitting) refers to methods for distributing a secrecy, secret among a group, in such a way that no individual holds any intelligible information about the secret, but when a sufficient number of individuals c ...
. * Walter Tuchman. US. led the Data Encryption Standard development team at IBM and inventor of
Triple DES In cryptography, Triple DES (3DES or TDES), officially the Triple Data Encryption Algorithm (TDEA or Triple DEA), is a symmetric-key block cipher, which applies the DES cipher algorithm three times to each data block. The 56-bit key of the Dat ...


Asymmetric-key algorithm inventors

*
Leonard Adleman Leonard Adleman (born December 31, 1945) is an American computer scientist. He is one of the creators of the RSA encryption algorithm, for which he received the 2002 Turing Award. He is also known for the creation of the field of DNA computin ...
, US,
USC USC may refer to: Education United States * Universidad del Sagrado Corazón, Santurce, Puerto Rico * University of South Carolina, Columbia, South Carolina ** University of South Carolina System, a state university system of South Carolina * ...
, the 'A' in RSA. *
David Chaum David Lee Chaum (born 1955) is an American computer scientist, List of cryptographers, cryptographer, and inventor. He is known as a pioneer in cryptography and privacy-preserving technologies, and widely recognized as the inventor of Digital cur ...
, US, inventor of blind signatures. *
Clifford Cocks Clifford Christopher Cocks (born 28 December 1950) is a British mathematician and cryptographer. In the early 1970s, while working at the United Kingdom Government Communications Headquarters (GCHQ), he developed an early public-key cryptogra ...
, UK
GCHQ Government Communications Headquarters (GCHQ) is an intelligence and security organisation responsible for providing signals intelligence (SIGINT) and information assurance (IA) to the government and armed forces of the United Kingdom. Primar ...
first inventor of RSA, a fact that remained secret until 1997 and so was unknown to Rivest, Shamir, and Adleman. *
Whitfield Diffie Bailey Whitfield 'Whit' Diffie ForMemRS (born June 5, 1944) is an American cryptographer and mathematician and one of the pioneers of public-key cryptography along with Martin Hellman and Ralph Merkle. Diffie and Hellman's 1976 paper ''New Dire ...
, US, (public) co-inventor of the Diffie-Hellman key-exchange protocol. * Taher Elgamal, US (born Egyptian), inventor of the Elgamal discrete log cryptosystem. *
Shafi Goldwasser Shafrira Goldwasser (; born 1959) is an Israeli-American computer scientist. A winner of the Turing Award in 2012, she is the RSA Professor of Electrical Engineering and Computer Science at the Massachusetts Institute of Technology; a professor o ...
, US and Israel,
MIT The Massachusetts Institute of Technology (MIT) is a private research university in Cambridge, Massachusetts, United States. Established in 1861, MIT has played a significant role in the development of many areas of modern technology and sc ...
and
Weizmann Institute The Weizmann Institute of Science ( ''Machon Weizmann LeMada'') is a Public university, public research university in Rehovot, Israel, established in 1934, fourteen years before the State of Israel was founded. Unlike other List of Israeli uni ...
, co-discoverer of zero-knowledge proofs, and of
Semantic security In cryptography, a semantically secure cryptosystem is one where only negligible information about the plaintext can be feasibly extracted from the ciphertext. Specifically, any probabilistic, polynomial-time algorithm (PPTA) that is given the ci ...
. *
Martin Hellman Martin Edward Hellman (born October 2, 1945) is an American cryptologist and mathematician, best known for his invention of public-key cryptography in cooperation with Whitfield Diffie and Ralph Merkle. Hellman is a longtime contributor to the ...
, US, (public) co-inventor of the Diffie-Hellman key-exchange protocol. *
Neal Koblitz Neal I. Koblitz (born December 24, 1948) is a Professor of Mathematics at the University of Washington. He is also an adjunct professor with the Centre for Applied Cryptographic Research at the University of Waterloo. He is the creator of hype ...
, independent co-creator of
elliptic curve cryptography Elliptic-curve cryptography (ECC) is an approach to public-key cryptography based on the algebraic structure of elliptic curves over finite fields. ECC allows smaller keys to provide equivalent security, compared to cryptosystems based on modula ...
. * Alfred Menezes, co-inventor of MQV, an
elliptic curve In mathematics, an elliptic curve is a smooth, projective, algebraic curve of genus one, on which there is a specified point . An elliptic curve is defined over a field and describes points in , the Cartesian product of with itself. If the ...
technique. *
Silvio Micali Silvio Micali (born October 13, 1954) is an Italian computer scientist, professor at the Massachusetts Institute of Technology and the founder of Algorand, a proof-of-stake blockchain cryptocurrency protocol. Micali's research at the MIT Compu ...
, US (born Italian),
MIT The Massachusetts Institute of Technology (MIT) is a private research university in Cambridge, Massachusetts, United States. Established in 1861, MIT has played a significant role in the development of many areas of modern technology and sc ...
, co-discoverer of zero-knowledge proofs, and of
Semantic security In cryptography, a semantically secure cryptosystem is one where only negligible information about the plaintext can be feasibly extracted from the ciphertext. Specifically, any probabilistic, polynomial-time algorithm (PPTA) that is given the ci ...
. * Victor Miller, independent co-creator of
elliptic curve cryptography Elliptic-curve cryptography (ECC) is an approach to public-key cryptography based on the algebraic structure of elliptic curves over finite fields. ECC allows smaller keys to provide equivalent security, compared to cryptosystems based on modula ...
. * David Naccache, inventor of the Naccache–Stern cryptosystem and of the
Naccache–Stern knapsack cryptosystem The Naccache–Stern Knapsack cryptosystem is an atypical public-key cryptosystem developed by David Naccache and Jacques Stern in 1997. This cryptosystem is deterministic encryption, deterministic, and hence is not semantic security, semantically ...
. *
Moni Naor Moni Naor () is an Israeli computer scientist, currently a professor at the Weizmann Institute of Science. Naor received his Ph.D. in 1989 at the University of California, Berkeley. His advisor was Manuel Blum. He works in various fields of com ...
, co-inventor the Naor–Yung encryption paradigm for CCA security. *
Rafail Ostrovsky Rafail Ostrovsky is a distinguished professor of computer science and mathematics at University of California, Los Angeles, UCLA and a well-known researcher in algorithms and cryptography. Biography Rafail Ostrovsky received his Ph.D. from Massa ...
, co-inventor of
Oblivious RAM An Oblivious RAM (ORAM) simulator is a compiler that transforms an algorithms, algorithm in such a way that the resulting algorithm preserves the Input/output, input-output (computing), output behavior of the original algorithm but the Probability ...
, of single-server
Private Information Retrieval In cryptography, a private information retrieval (PIR) protocol is a protocol that allows a user to retrieve an item from a server in possession of a database without revealing which item is retrieved. PIR is a weaker version of 1-out-of-''n'' obl ...
, and proactive cryptosystems. * Pascal Paillier, inventor of Paillier encryption. * Michael O. Rabin, Israel, inventor of Rabin encryption. * Ronald L. Rivest, US,
MIT The Massachusetts Institute of Technology (MIT) is a private research university in Cambridge, Massachusetts, United States. Established in 1861, MIT has played a significant role in the development of many areas of modern technology and sc ...
, the 'R' in RSA. *
Adi Shamir Adi Shamir (; born July 6, 1952) is an Israeli cryptographer and inventor. He is a co-inventor of the Rivest–Shamir–Adleman (RSA) algorithm (along with Ron Rivest and Len Adleman), a co-inventor of the Feige–Fiat–Shamir identification sc ...
, Israel,
Weizmann Institute The Weizmann Institute of Science ( ''Machon Weizmann LeMada'') is a Public university, public research university in Rehovot, Israel, established in 1934, fourteen years before the State of Israel was founded. Unlike other List of Israeli uni ...
, the 'S' in RSA. * Victor Shoup, US, NYU Courant, co-inventor of the Cramer-Shoup cryptosystem. *
Moti Yung Mordechai M. "Moti" Yung is a cryptographer and computer scientist known for his work on cryptovirology and kleptography. Career Yung earned his PhD from Columbia University in 1988 under the supervision of Zvi Galil. In the past, he worked a ...
, co-inventor of the Naor–Yung encryption paradigm for CCA security, of
threshold cryptosystem A threshold cryptosystem, the basis for the field of threshold cryptography, is a cryptosystem that protects information by encrypting it and distributing it among a cluster of fault-tolerant computers. The message is encrypted using a public key, ...
s, and proactive cryptosystems.


Cryptanalysts

* Joan Clarke, English cryptanalyst and numismatist best known for her work as a code-breaker at Bletchley Park during the Second World War. * Ross Anderson, UK. *
Eli Biham Eli Biham () is an Israeli cryptographer and cryptanalyst who is a professor at the Technion - Israel Institute of Technology Computer Science department. From 2008 to 2013, Biham was the dean of the Technion Computer Science department, afte ...
, Israel, co-discoverer of
differential cryptanalysis Differential cryptanalysis is a general form of cryptanalysis applicable primarily to block ciphers, but also to stream ciphers and cryptographic hash functions. In the broadest sense, it is the study of how differences in information input can a ...
and
Related-key attack In cryptography, a related-key attack is any form of cryptanalysis where the attacker can observe the operation of a cipher under several different keys whose values are initially unknown, but where some mathematical relationship connecting the ...
. *
Matt Blaze Matt Blaze is an American researcher who focuses on the areas of secure systems, cryptography, and trust management. He is currently the McDevitt Chair of Computer Science and Law at Georgetown University, and is on the board of directors of the ...
, US. * Dan Boneh, US,
Stanford University Leland Stanford Junior University, commonly referred to as Stanford University, is a Private university, private research university in Stanford, California, United States. It was founded in 1885 by railroad magnate Leland Stanford (the eighth ...
. * Niels Ferguson, Netherlands, co-inventor of Twofish and Fortuna. * Ian Goldberg, Canada,
University of Waterloo The University of Waterloo (UWaterloo, UW, or Waterloo) is a Public university, public research university located in Waterloo, Ontario, Canada. The main campus is on of land adjacent to uptown Waterloo and Waterloo Park. The university also op ...
. *
Lars Knudsen Lars Ramkilde Knudsen (born 21 February 1962) is a Denmark, Danish researcher in cryptography, particularly interested in the design and cryptanalysis, analysis of block ciphers, cryptographic hash function, hash functions and message authentic ...
, Denmark, DTU, discovered integral cryptanalysis. * Paul Kocher, US, discovered
differential power analysis Power analysis is a form of side channel attack in which the attacker studies the power consumption of a cryptographic hardware device. These attacks rely on basic physical properties of the device: semiconductor devices are governed by the l ...
. * Mitsuru Matsui, Japan, discoverer of
linear cryptanalysis In cryptography, linear cryptanalysis is a general form of cryptanalysis based on finding affine Affine may describe any of various topics concerned with connections or affinities. It may refer to: * Affine, a Affinity_(law)#Terminology, relat ...
. *
Kenny Paterson Kenneth G. "Kenny" Paterson (born 2 March 1969) is a professor in the Institute of Information Security at ETH Zurich, where he leads the Applied Cryptography Group. Before joining ETH Zurich in April 2019, he was a professor in the Information Se ...
, UK, previously Royal Holloway, now
ETH Zurich ETH Zurich (; ) is a public university in Zurich, Switzerland. Founded in 1854 with the stated mission to educate engineers and scientists, the university focuses primarily on science, technology, engineering, and mathematics. ETH Zurich ran ...
, known for several attacks on cryptosystems. * David Wagner, US,
UC Berkeley The University of California, Berkeley (UC Berkeley, Berkeley, Cal, or California), is a public land-grant research university in Berkeley, California, United States. Founded in 1868 and named after the Anglo-Irish philosopher George Berkele ...
, co-discoverer of the slide and boomerang attacks. * Xiaoyun Wang, the People's Republic of China, known for
MD5 The MD5 message-digest algorithm is a widely used hash function producing a 128-bit hash value. MD5 was designed by Ronald Rivest in 1991 to replace an earlier hash function MD4, and was specified in 1992 as Request for Comments, RFC 1321. MD5 ...
and
SHA-1 In cryptography, SHA-1 (Secure Hash Algorithm 1) is a hash function which takes an input and produces a 160-bit (20-byte) hash value known as a message digest – typically rendered as 40 hexadecimal digits. It was designed by the United States ...
hash function A hash function is any Function (mathematics), function that can be used to map data (computing), data of arbitrary size to fixed-size values, though there are some hash functions that support variable-length output. The values returned by a ...
attacks. * Alex Biryukov,
University of Luxembourg The University of Luxembourg (French language, French: ''Université du Luxembourg''; German language, German: ''Universität Luxemburg''; Luxembourgish language, Luxembourgish: ''Universitéit Lëtzebuerg'') is a Public university, public researc ...
, known for impossible differential cryptanalysis and slide attack. *
Moti Yung Mordechai M. "Moti" Yung is a cryptographer and computer scientist known for his work on cryptovirology and kleptography. Career Yung earned his PhD from Columbia University in 1988 under the supervision of Zvi Galil. In the past, he worked a ...
,
Kleptography Kleptography is the study of stealing information securely and subliminally. The term was introduced by Adam Young and Moti Yung in the Proceedings of Advances in Cryptology – Crypto '96. Kleptography is a subfield of cryptovirology and is a natu ...
. * Bill Buchanan, creator of ASecuritySite - one of the most comprehensive cryptography website in the World.


Algorithmic number theorists

* Daniel J. Bernstein, US, developed several popular algorithms, fought US government restrictions in ''
Bernstein v. United States ''Bernstein v. United States'' was a series of court cases filed by Daniel J. Bernstein, then a mathematics Ph.D. student at the University of California, Berkeley, challenging U.S. government restrictions on the export of cryptographic sof ...
.'' * Don Coppersmith, US * Dorian M. Goldfeld, US, Along with Michael Anshel and Iris Anshel invented the Anshel–Anshel–Goldfeld key exchange and the Algebraic Eraser. They also helped found Braid Group Cryptography. * Victor Shoup, US, NYU Courant.


Theoreticians

* Mihir Bellare, US,
UCSD The University of California, San Diego (UC San Diego in communications material, formerly and colloquially UCSD) is a public land-grant research university in San Diego, California, United States. Established in 1960 near the pre-existing ...
, co-proposer of the
Random oracle In cryptography, a random oracle is an oracle (a theoretical black box) that responds to every ''unique query'' with a (truly) random response chosen uniformly from its output domain. If a query is repeated, it responds the same way every tim ...
model. * Dan Boneh, US,
Stanford Leland Stanford Junior University, commonly referred to as Stanford University, is a private research university in Stanford, California, United States. It was founded in 1885 by railroad magnate Leland Stanford (the eighth governor of and th ...
. *
Gilles Brassard Gilles Brassard is a faculty member of the Université de Montréal, where he has been a Full Professor since 1988 and Canada Research Chair since 2001. Education and early life Brassard received a Ph.D. in Computer Science from Cornell Univers ...
, Canada,
Université de Montréal The Université de Montréal (; UdeM; ) is a French-language public research university in Montreal, Quebec, Canada. The university's main campus is located in the Côte-des-Neiges neighborhood of Côte-des-Neiges–Notre-Dame-de-Grâce on M ...
. Co-inventor of
quantum cryptography Quantum cryptography is the science of exploiting quantum mechanical properties to perform cryptographic tasks. The best known example of quantum cryptography is quantum key distribution, which offers an information-theoretically secure soluti ...
. * Claude Crépeau, Canada,
McGill University McGill University (French: Université McGill) is an English-language public research university in Montreal, Quebec, Canada. Founded in 1821 by royal charter,Frost, Stanley Brice. ''McGill University, Vol. I. For the Advancement of Learning, ...
. *
Oded Goldreich Oded Goldreich (; born 1957) is a professor of computer science at the faculty of mathematics and computer science of the Weizmann Institute of Science, Israel. His research interests lie within the theory of computation and are, specifically, ...
, Israel,
Weizmann Institute The Weizmann Institute of Science ( ''Machon Weizmann LeMada'') is a Public university, public research university in Rehovot, Israel, established in 1934, fourteen years before the State of Israel was founded. Unlike other List of Israeli uni ...
, author of Foundations of Cryptography. *
Shafi Goldwasser Shafrira Goldwasser (; born 1959) is an Israeli-American computer scientist. A winner of the Turing Award in 2012, she is the RSA Professor of Electrical Engineering and Computer Science at the Massachusetts Institute of Technology; a professor o ...
, US and Israel. *
Silvio Micali Silvio Micali (born October 13, 1954) is an Italian computer scientist, professor at the Massachusetts Institute of Technology and the founder of Algorand, a proof-of-stake blockchain cryptocurrency protocol. Micali's research at the MIT Compu ...
, US,
MIT The Massachusetts Institute of Technology (MIT) is a private research university in Cambridge, Massachusetts, United States. Established in 1861, MIT has played a significant role in the development of many areas of modern technology and sc ...
. *
Rafail Ostrovsky Rafail Ostrovsky is a distinguished professor of computer science and mathematics at University of California, Los Angeles, UCLA and a well-known researcher in algorithms and cryptography. Biography Rafail Ostrovsky received his Ph.D. from Massa ...
, US,
UCLA The University of California, Los Angeles (UCLA) is a public land-grant research university in Los Angeles, California, United States. Its academic roots were established in 1881 as a normal school then known as the southern branch of the C ...
. * Charles Rackoff, co-discoverer of
zero-knowledge proof In cryptography, a zero-knowledge proof (also known as a ZK proof or ZKP) is a protocol in which one party (the prover) can convince another party (the verifier) that some given statement is true, without conveying to the verifier any information ...
s. * Oded Regev, inventor of
learning with errors In cryptography, learning with errors (LWE) is a mathematical problem that is widely used to create secure encryption algorithms. It is based on the idea of representing secret information as a set of equations with errors. In other words, LWE is ...
. *
Phillip Rogaway Phillip Rogaway (also referred to as Phil Rogaway) is an American cryptographer and former professor of computer science at the University of California, Davis. He graduated from Beverly Hills High School, and later earned a BA in computer scie ...
, US,
UC Davis The University of California, Davis (UC Davis, UCD, or Davis) is a Public university, public Land-grant university, land-grant research university in Davis, California, United States. It is the northernmost of the ten campuses of the University ...
, co-proposer of the
Random oracle In cryptography, a random oracle is an oracle (a theoretical black box) that responds to every ''unique query'' with a (truly) random response chosen uniformly from its output domain. If a query is repeated, it responds the same way every tim ...
model. * Amit Sahai, US,
UCLA The University of California, Los Angeles (UCLA) is a public land-grant research university in Los Angeles, California, United States. Its academic roots were established in 1881 as a normal school then known as the southern branch of the C ...
. * Victor Shoup, US, NYU Courant. *
Gustavus Simmons Gustavus J. Simmons (born 1930) is a retired cryptographer and former manager of the applied mathematics Department and Senior Fellow at Sandia National Laboratories. He worked primarily with authentication theory, developing cryptographic techn ...
, US, Sandia,
authentication Authentication (from ''authentikos'', "real, genuine", from αὐθέντης ''authentes'', "author") is the act of proving an Logical assertion, assertion, such as the Digital identity, identity of a computer system user. In contrast with iden ...
theory. *
Moti Yung Mordechai M. "Moti" Yung is a cryptographer and computer scientist known for his work on cryptovirology and kleptography. Career Yung earned his PhD from Columbia University in 1988 under the supervision of Zvi Galil. In the past, he worked a ...
, US, Google.


Government cryptographers

*
Clifford Cocks Clifford Christopher Cocks (born 28 December 1950) is a British mathematician and cryptographer. In the early 1970s, while working at the United Kingdom Government Communications Headquarters (GCHQ), he developed an early public-key cryptogra ...
, UK,
GCHQ Government Communications Headquarters (GCHQ) is an intelligence and security organisation responsible for providing signals intelligence (SIGINT) and information assurance (IA) to the government and armed forces of the United Kingdom. Primar ...
, secret inventor of the algorithm later known as RSA. * James H. Ellis, UK,
GCHQ Government Communications Headquarters (GCHQ) is an intelligence and security organisation responsible for providing signals intelligence (SIGINT) and information assurance (IA) to the government and armed forces of the United Kingdom. Primar ...
, secretly proved the possibility of asymmetric encryption. * Lowell Frazer, US,
National Security Agency The National Security Agency (NSA) is an intelligence agency of the United States Department of Defense, under the authority of the director of national intelligence (DNI). The NSA is responsible for global monitoring, collection, and proces ...
* Laura Holmes, US,
National Security Agency The National Security Agency (NSA) is an intelligence agency of the United States Department of Defense, under the authority of the director of national intelligence (DNI). The NSA is responsible for global monitoring, collection, and proces ...
*
Julia Wetzel Julia Wetzel began her National Security Agency (NSA) career as a Special Research Analyst in the Operations unit. In the late 1970s, Wetzel worked with the House Select Committee on Intelligence. In 1989 she was assigned as the NSA's representa ...
, US,
National Security Agency The National Security Agency (NSA) is an intelligence agency of the United States Department of Defense, under the authority of the director of national intelligence (DNI). The NSA is responsible for global monitoring, collection, and proces ...
* Malcolm Williamson, UK,
GCHQ Government Communications Headquarters (GCHQ) is an intelligence and security organisation responsible for providing signals intelligence (SIGINT) and information assurance (IA) to the government and armed forces of the United Kingdom. Primar ...
, secret inventor of the protocol later known as the
Diffie–Hellman key exchange Diffie–Hellman (DH) key exchangeSynonyms of Diffie–Hellman key exchange include: * Diffie–Hellman–Merkle key exchange * Diffie–Hellman key agreement * Diffie–Hellman key establishment * Diffie–Hellman key negotiation * Exponential ke ...
.


Cryptographer businesspeople

*
Bruce Schneier Bruce Schneier (; born January 15, 1963) is an American cryptographer, computer security professional, privacy specialist, and writer. Schneier is an Adjunct Lecturer in Public Policy at the Harvard Kennedy School and a Fellow at the Berkman ...
, US, CTO and founder of Counterpane Internet Security, Inc. and cryptography author. * Scott Vanstone, Canada, founder of Certicom and
elliptic curve cryptography Elliptic-curve cryptography (ECC) is an approach to public-key cryptography based on the algebraic structure of elliptic curves over finite fields. ECC allows smaller keys to provide equivalent security, compared to cryptosystems based on modula ...
proponent.


See also

*
Cryptography Cryptography, or cryptology (from "hidden, secret"; and ''graphein'', "to write", or ''-logy, -logia'', "study", respectively), is the practice and study of techniques for secure communication in the presence of Adversary (cryptography), ...


References


External links


List of cryptographers' home pages
{{DEFAULTSORT:Cryptographers Lists of people by occupation Cryptography lists and comparisons