This is a list of cryptographers.
Cryptography
Cryptography, or cryptology (from "hidden, secret"; and ''graphein'', "to write", or ''-logy, -logia'', "study", respectively), is the practice and study of techniques for secure communication in the presence of Adversary (cryptography), ...
is the practice and study of techniques for
secure communication
Secure communication is when two entities are communicating and do not want a third party to listen in. For this to be the case, the entities need to communicate in a way that is unsusceptible to eavesdropping or interception. Secure communication ...
in the presence of third parties called
adversaries.
Pre twentieth century
*
Al-Khalil ibn Ahmad al-Farahidi
Abu ‘Abd ar-Raḥmān al-Khalīl ibn Aḥmad ibn ‘Amr ibn Tammām al-Farāhīdī al-Azdī al-Yaḥmadī (; 718 – 786 CE), known as al-Farāhīdī, or al-Khalīl, was an Arab philologist, lexicographer and leading grammarian of Basra in ...
: wrote a (now lost) book on cryptography titled the "''Book of Cryptographic Messages''".
*
Al-Kindi
Abū Yūsuf Yaʻqūb ibn ʼIsḥāq aṣ-Ṣabbāḥ al-Kindī (; ; ; ) was an Arab Muslim polymath active as a philosopher, mathematician, physician, and music theorist
Music theory is the study of theoretical frameworks for understandin ...
, 9th century
Arabic
Arabic (, , or , ) is a Central Semitic languages, Central Semitic language of the Afroasiatic languages, Afroasiatic language family spoken primarily in the Arab world. The International Organization for Standardization (ISO) assigns lang ...
polymath and originator of
frequency analysis.
*
Athanasius Kircher
Athanasius Kircher (2 May 1602 – 27 November 1680) was a German Society of Jesus, Jesuit scholar and polymath who published around 40 major works of comparative religion, geology, and medicine. Kircher has been compared to fellow Jes ...
, attempts to decipher crypted messages
*
Augustus the Younger, Duke of Brunswick-Lüneburg
Augustus II (10 April 1579 – 17 September 1666), called the Younger (), a member of the House of Welf was Duke of Brunswick-Lüneburg. In the estate division of the House of Welf of 1635, he received the Principality of Wolfenbüttel wh ...
, wrote a standard book on cryptography
*
Ibn Wahshiyya: published several cipher alphabets that were used to encrypt magic formulas.
*
John Dee
John Dee (13 July 1527 – 1608 or 1609) was an English mathematician, astronomer, teacher, astrologer, occultist, and alchemist. He was the court astronomer for, and advisor to, Elizabeth I, and spent much of his time on alchemy, divination, ...
, wrote an occult book, which in fact was a cover for crypted text
*
Ibn 'Adlan: 13th-century cryptographer who made important contributions on the sample size of the frequency analysis.
*
Duke of Mantua
During its Timeline of Mantua, history as independent entity, Mantua had different rulers who governed on the city and the lands of Mantua from the Middle Ages to the early modern period.
From 970 to 1115, the Counts of Mantua were members of ...
Francesco I Gonzaga
image:Ritratto di Francesco I Gonzaga.jpg, Portrait of Francesco I Gonzaga
Francesco I Gonzaga (1366 – 7 March 1407) was List of rulers of Mantua, ruler of Mantua from 1382 to 1407. He was also a condottiero. Diplomatic policies towards Mil ...
is the one who used the earliest example of homophonic
Substitution cipher
In cryptography, a substitution cipher is a method of encrypting in which units of plaintext are replaced with the ciphertext, in a defined manner, with the help of a key; the "units" may be single letters (the most common), pairs of letters, t ...
in early 1400s.
*
Ibn al-Durayhim: gave detailed descriptions of eight cipher systems that discussed substitution ciphers, leading to the earliest suggestion of a "tableau" of the kind that two centuries later became known as the "Vigenère table".
*
Ahmad al-Qalqashandi: Author of ''Subh al-a 'sha'', a fourteen volume encyclopedia in Arabic, which included a section on cryptology. The list of ciphers in this work included both substitution and transposition, and for the first time, a cipher with multiple substitutions for each plaintext letter.
*
Charles Babbage
Charles Babbage (; 26 December 1791 – 18 October 1871) was an English polymath. A mathematician, philosopher, inventor and mechanical engineer, Babbage originated the concept of a digital programmable computer.
Babbage is considered ...
, UK, 19th century mathematician who, about the time of the
Crimean War
The Crimean War was fought between the Russian Empire and an alliance of the Ottoman Empire, the Second French Empire, the United Kingdom of Great Britain and Ireland, and the Kingdom of Sardinia (1720–1861), Kingdom of Sardinia-Piedmont fro ...
, secretly developed an effective attack against
polyalphabetic substitution ciphers.
*
Leone Battista Alberti
Leon Battista Alberti (; 14 February 1404 – 25 April 1472) was an Italian Renaissance humanist author, artist, architect, poet, priest, linguist, philosopher, and cryptographer; he epitomised the nature of those identified now as polymaths. H ...
,
polymath
A polymath or polyhistor is an individual whose knowledge spans many different subjects, known to draw on complex bodies of knowledge to solve specific problems. Polymaths often prefer a specific context in which to explain their knowledge, ...
/universal
genius
Genius is a characteristic of original and exceptional insight in the performance of some art or endeavor that surpasses expectations, sets new standards for the future, establishes better methods of operation, or remains outside the capabiliti ...
, inventor of
polyalphabetic substitution (more specifically, the
Alberti cipher), and what may have been the first mechanical encryption aid.
*
Giovanni Battista della Porta, author of a seminal work on
cryptanalysis
Cryptanalysis (from the Greek ''kryptós'', "hidden", and ''analýein'', "to analyze") refers to the process of analyzing information systems in order to understand hidden aspects of the systems. Cryptanalysis is used to breach cryptographic se ...
.
*
Étienne Bazeries, French, military, considered one of the greatest natural cryptanalysts. Best known for developing the "
Bazeries Cylinder" and his influential 1901 text ''Les Chiffres secrets dévoilés'' ("Secret ciphers unveiled").
*
Giovan Battista Bellaso, Italian cryptologist
*
Giovanni Fontana (engineer), wrote two encrypted books
*
Hildegard of Bingen
Hildegard of Bingen Benedictines, OSB (, ; ; 17 September 1179), also known as the Sibyl of the Rhine, was a German Benedictines, Benedictine abbess and polymath active as a writer, composer, philosopher, Christian mysticism, mystic, visiona ...
used her own alphabet to write letters.
*
Julius Caesar
Gaius Julius Caesar (12 or 13 July 100 BC – 15 March 44 BC) was a Roman general and statesman. A member of the First Triumvirate, Caesar led the Roman armies in the Gallic Wars before defeating his political rival Pompey in Caesar's civil wa ...
, Roman general/politician, has the
Caesar cipher named after him, and a
lost work on cryptography by Probus (probably Valerius Probus) is claimed to have covered his use of military cryptography in some detail. It is likely that he did not invent the cipher named after him, as other
substitution cipher
In cryptography, a substitution cipher is a method of encrypting in which units of plaintext are replaced with the ciphertext, in a defined manner, with the help of a key; the "units" may be single letters (the most common), pairs of letters, t ...
s were in use well before his time.
*
Friedrich Kasiski, author of the first published attack on the
Vigenère cipher
The Vigenère cipher () is a method of encryption, encrypting alphabetic text where each letter of the plaintext is encoded with a different Caesar cipher, whose increment is determined by the corresponding letter of another text, the key (crypt ...
, now known as the
Kasiski test.
*
Auguste Kerckhoffs
Auguste Kerckhoffs (19 January 1835 – 9 August 1903) was a Dutch linguist and cryptographer in the late 19th century.
Biography
Kerckhoffs was born in Nuth, the Netherlands, as Jean Guillaume Auguste Victor François Hubert Kerckhoffs, ...
, known for contributing cipher design principles.
*
Edgar Allan Poe
Edgar Allan Poe (; January 19, 1809 – October 7, 1849) was an American writer, poet, editor, and literary critic who is best known for his poetry and short stories, particularly his tales involving mystery and the macabre. He is widely re ...
, author of the book, ''A Few Words on Secret Writing'', an essay on cryptanalysis, and ''
The Gold Bug'', a short story featuring the use of letter frequencies in the solution of a cryptogram.
*
Johannes Trithemius
Johannes Trithemius (; 1 February 1462 – 13 December 1516), born Johann Heidenberg, was a German Benedictine abbot and a polymath who was active in the German Renaissance as a Lexicography, lexicographer, chronicler, Cryptography, cryptograph ...
, mystic and first to describe ''tableaux'' (tables) for use in
polyalphabetic substitution. Wrote an early work on
steganography
Steganography ( ) is the practice of representing information within another message or physical object, in such a manner that the presence of the concealed information would not be evident to an unsuspecting person's examination. In computing/ ...
and cryptography generally.
*
Philips van Marnix, lord of Sint-Aldegonde, deciphered Spanish messages for
William the Silent
William the Silent or William the Taciturn (; 24 April 153310 July 1584), more commonly known in the Netherlands as William of Orange (), was the leader of the Dutch revolt against the Spanish Habsburg Netherlands, Habsburgs that set off the ...
during the Dutch revolt against the Spanish.
*
John Wallis
John Wallis (; ; ) was an English clergyman and mathematician, who is given partial credit for the development of infinitesimal calculus.
Between 1643 and 1689 Wallis served as chief cryptographer for Parliament and, later, the royal court. ...
codebreaker for Cromwell and Charles II
*
Sir Charles Wheatstone, inventor of the so-called
Playfair cipher and general polymath.
World War I and World War II wartime cryptographers
*
Richard J. Hayes (1902–1976) Irish code breaker in World War II.
*
Jean Argles (1925–2023), British code breaker in World War II
*
Arne Beurling
Arne Carl-August Beurling (3 February 1905 – 20 November 1986) was a Sweden, Swedish mathematician and professor of mathematics at Uppsala University (1937–1954) and later at the Institute for Advanced Study in Princeton, New Jersey. Beurling ...
(1905–1986), Swedish mathematician and cryptographer.
*
Lambros D. Callimahos, US,
NSA, worked with William F. Friedman, taught NSA cryptanalysts.
*
Ann Z. Caracristi, US,
SIS, solved Japanese Army codes in World War II, later became deputy director of
National Security Agency
The National Security Agency (NSA) is an intelligence agency of the United States Department of Defense, under the authority of the director of national intelligence (DNI). The NSA is responsible for global monitoring, collection, and proces ...
.
*
Alec Naylor Dakin, UK,
Hut 4,
Bletchley Park
Bletchley Park is an English country house and Bletchley Park estate, estate in Bletchley, Milton Keynes (Buckinghamshire), that became the principal centre of Allies of World War II, Allied World War II cryptography, code-breaking during the S ...
during World War II.
*
Ludomir Danilewicz,
Poland
Poland, officially the Republic of Poland, is a country in Central Europe. It extends from the Baltic Sea in the north to the Sudetes and Carpathian Mountains in the south, bordered by Lithuania and Russia to the northeast, Belarus and Ukrai ...
,
Biuro Szyfrow, helped to construct the Enigma machine copies to break the ciphers.
*
Patricia Davies (born 1923), British code breaker in World War II
*
Alastair Denniston
Commander Alexander "Alastair" Guthrie Denniston (1 December 1881 – 1 January 1961) was a Scottish codebreaker, deputy head of the Government Code and Cypher School (GC&CS) and hockey player. Denniston was appointed operational head of GC&CS ...
, UK, director of the
Government Code and Cypher School
The Government Code and Cypher School (GC&CS) was a British signals intelligence agency set up in 1919. During the First World War, the British Army and Royal Navy had separate signals intelligence agencies, MI1b and NID25 (initially known as R ...
at
Bletchley Park
Bletchley Park is an English country house and Bletchley Park estate, estate in Bletchley, Milton Keynes (Buckinghamshire), that became the principal centre of Allies of World War II, Allied World War II cryptography, code-breaking during the S ...
from 1919 to 1942.
*
Agnes Meyer Driscoll, US, broke several Japanese ciphers.
*
Genevieve Grotjan Feinstein, US,
SIS, noticed the pattern that led to breaking
Purple
Purple is a color similar in appearance to violet light. In the RYB color model historically used in the arts, purple is a secondary color created by combining red and blue pigments. In the CMYK color model used in modern printing, purple is ...
.
*
Elizebeth Smith Friedman
Elizebeth Smith Friedman (August 26, 1892 – October 31, 1980) was an Americans, American cryptanalyst and author who deciphered enemy codes in both World Wars and helped to solve international smuggling cases during Prohibition in the United S ...
, US,
Coast Guard
A coast guard or coastguard is a Maritime Security Regimes, maritime security organization of a particular country. The term embraces wide range of responsibilities in different countries, from being a heavily armed military force with cust ...
and
US Treasury Department
The Department of the Treasury (USDT) is the national treasury and finance department of the federal government of the United States. It is one of 15 current U.S. government departments.
The department oversees the Bureau of Engraving and ...
cryptographer, co-invented modern cryptography.
*
William F. Friedman, US,
SIS, introduced statistical methods into
cryptography
Cryptography, or cryptology (from "hidden, secret"; and ''graphein'', "to write", or ''-logy, -logia'', "study", respectively), is the practice and study of techniques for secure communication in the presence of Adversary (cryptography), ...
.
*
Cecilia Elspeth Giles, UK,
Bletchley Park
Bletchley Park is an English country house and Bletchley Park estate, estate in Bletchley, Milton Keynes (Buckinghamshire), that became the principal centre of Allies of World War II, Allied World War II cryptography, code-breaking during the S ...
*
Jack Good UK,
Government Code and Cypher School
The Government Code and Cypher School (GC&CS) was a British signals intelligence agency set up in 1919. During the First World War, the British Army and Royal Navy had separate signals intelligence agencies, MI1b and NID25 (initially known as R ...
,
Bletchley Park
Bletchley Park is an English country house and Bletchley Park estate, estate in Bletchley, Milton Keynes (Buckinghamshire), that became the principal centre of Allies of World War II, Allied World War II cryptography, code-breaking during the S ...
worked with
Alan Turing
Alan Mathison Turing (; 23 June 1912 – 7 June 1954) was an English mathematician, computer scientist, logician, cryptanalyst, philosopher and theoretical biologist. He was highly influential in the development of theoretical computer ...
on the statistical approach to cryptanalysis.
*
Nigel de Grey, UK,
Room 40
Room 40, also known as 40 O.B. (old building; officially part of NID25), was the cryptanalysis section of the British Admiralty during the First World War.
The group, which was formed in October 1914, began when Rear-Admiral Henry Oliver, the ...
, played an important role in the decryption of the
Zimmermann Telegram during World War I.
*
Dillwyn Knox, UK,
Room 40
Room 40, also known as 40 O.B. (old building; officially part of NID25), was the cryptanalysis section of the British Admiralty during the First World War.
The group, which was formed in October 1914, began when Rear-Admiral Henry Oliver, the ...
and
Government Code and Cypher School
The Government Code and Cypher School (GC&CS) was a British signals intelligence agency set up in 1919. During the First World War, the British Army and Royal Navy had separate signals intelligence agencies, MI1b and NID25 (initially known as R ...
, broke commercial
Enigma cipher as used by the
Abwehr
The (German language, German for ''resistance'' or ''defence'', though the word usually means ''counterintelligence'' in a military context) ) was the German military intelligence , military-intelligence service for the ''Reichswehr'' and the ...
(German military intelligence).
*
Solomon Kullback US,
SIS, helped break the Japanese
Red cipher, later Chief Scientist at the
National Security Agency
The National Security Agency (NSA) is an intelligence agency of the United States Department of Defense, under the authority of the director of national intelligence (DNI). The NSA is responsible for global monitoring, collection, and proces ...
.
*
Frank W. Lewis US, worked with William F. Friedman, puzzle master
*
William Hamilton Martin and Bernon F. Mitchell, U.S.
National Security Agency
The National Security Agency (NSA) is an intelligence agency of the United States Department of Defense, under the authority of the director of national intelligence (DNI). The NSA is responsible for global monitoring, collection, and proces ...
cryptologists who defected to the Soviet Union in 1960
*
Leo Marks
Leopold Samuel Marks, (24 September 1920 – 15 January 2001) was an English writer, screenwriter, and cryptographer. During the Second World War he headed the codes office supporting resistance agents in occupied Europe for the secret Special ...
UK,
Special Operations Executive
Special Operations Executive (SOE) was a British organisation formed in 1940 to conduct espionage, sabotage and reconnaissance in German-occupied Europe and to aid local Resistance during World War II, resistance movements during World War II. ...
cryptography director, author and playwright.
*
Donald Michie
Donald Michie (; 11 November 1923 – 7 July 2007) was a British researcher in artificial intelligence. During World War II, Michie worked for the Government Code and Cypher School at Bletchley Park, contributing to the effort to solve " Tunny ...
UK,
Government Code and Cypher School
The Government Code and Cypher School (GC&CS) was a British signals intelligence agency set up in 1919. During the First World War, the British Army and Royal Navy had separate signals intelligence agencies, MI1b and NID25 (initially known as R ...
,
Bletchley Park
Bletchley Park is an English country house and Bletchley Park estate, estate in Bletchley, Milton Keynes (Buckinghamshire), that became the principal centre of Allies of World War II, Allied World War II cryptography, code-breaking during the S ...
worked on
Cryptanalysis of the Lorenz cipher
Cryptanalysis of the Lorenz cipher was the process that enabled the British to read high-level German army messages during World War II. The British Government Code and Cypher School (GC&CS) at Bletchley Park decrypted many communications betwee ...
and the
Colossus computer
Colossus was a set of computers developed by British cryptanalysis, codebreakers in the years 1943–1945 to help in the cryptanalysis of the Lorenz cipher. Colossus used vacuum tube, thermionic valves (vacuum tubes) to perform Boolean algebra ...
.
*
Consuelo Milner, US, crytopgraher for the
Naval Applied Science Lab
*
Max Newman
Maxwell Herman Alexander Newman, FRS (7 February 1897 – 22 February 1984), generally known as Max Newman, was a British mathematician and codebreaker. His work in World War II led to the construction of Colossus, the world's first operatio ...
, UK,
Government Code and Cypher School
The Government Code and Cypher School (GC&CS) was a British signals intelligence agency set up in 1919. During the First World War, the British Army and Royal Navy had separate signals intelligence agencies, MI1b and NID25 (initially known as R ...
,
Bletchley Park
Bletchley Park is an English country house and Bletchley Park estate, estate in Bletchley, Milton Keynes (Buckinghamshire), that became the principal centre of Allies of World War II, Allied World War II cryptography, code-breaking during the S ...
headed the section that developed the
Colossus computer
Colossus was a set of computers developed by British cryptanalysis, codebreakers in the years 1943–1945 to help in the cryptanalysis of the Lorenz cipher. Colossus used vacuum tube, thermionic valves (vacuum tubes) to perform Boolean algebra ...
for
Cryptanalysis of the Lorenz cipher
Cryptanalysis of the Lorenz cipher was the process that enabled the British to read high-level German army messages during World War II. The British Government Code and Cypher School (GC&CS) at Bletchley Park decrypted many communications betwee ...
.
*
Georges Painvin French, broke the
ADFGVX cipher during the
First World War
World War I or the First World War (28 July 1914 – 11 November 1918), also known as the Great War, was a World war, global conflict between two coalitions: the Allies of World War I, Allies (or Entente) and the Central Powers. Fighting to ...
.
*
Marian Rejewski
Marian Adam Rejewski (; 16 August 1905 – 13 February 1980) was a Polish people, Polish mathematician and Cryptography, cryptologist who in late 1932 reconstructed the sight-unseen German military Enigma machine, Enigma cipher machine, aided ...
,
Poland
Poland, officially the Republic of Poland, is a country in Central Europe. It extends from the Baltic Sea in the north to the Sudetes and Carpathian Mountains in the south, bordered by Lithuania and Russia to the northeast, Belarus and Ukrai ...
,
Biuro Szyfrów
The Cipher Bureau ( Polish: ''Biuro Szyfrów'', ) was the interwar Polish General Staff's Second Department's unit charged with SIGINT and both cryptography (the ''use'' of ciphers and codes) and cryptanalysis (the ''study'' of ciphers and cod ...
, a Polish mathematician and cryptologist who, in 1932, solved the
Enigma machine
The Enigma machine is a cipher device developed and used in the early- to mid-20th century to protect commercial, diplomatic, and military communication. It was employed extensively by Nazi Germany during World War II, in all branches of the W ...
with plugboard, the main cipher device then in use by Germany. The first to break the cipher in history.
*
John Joseph Rochefort US, made major contributions to the break into
JN-25 after the
attack on Pearl Harbor
The attack on Pearl HarborAlso known as the Battle of Pearl Harbor was a surprise military strike by the Empire of Japan on the United States Pacific Fleet at Naval Station Pearl Harbor, its naval base at Pearl Harbor on Oahu, Territory of ...
.
*
Leo Rosen US,
SIS, deduced that the
Japanese Purple machine was built with stepping switches.
*
Frank Rowlett US,
SIS, leader of the team that broke
Purple
Purple is a color similar in appearance to violet light. In the RYB color model historically used in the arts, purple is a secondary color created by combining red and blue pigments. In the CMYK color model used in modern printing, purple is ...
.
*
Jerzy Różycki,
Poland
Poland, officially the Republic of Poland, is a country in Central Europe. It extends from the Baltic Sea in the north to the Sudetes and Carpathian Mountains in the south, bordered by Lithuania and Russia to the northeast, Belarus and Ukrai ...
,
Biuro Szyfrów
The Cipher Bureau ( Polish: ''Biuro Szyfrów'', ) was the interwar Polish General Staff's Second Department's unit charged with SIGINT and both cryptography (the ''use'' of ciphers and codes) and cryptanalysis (the ''study'' of ciphers and cod ...
, helped break German
Enigma ciphers.
*
Luigi Sacco, Italy, Italian General and author of the ''Manual of Cryptography''.
*
Laurance Safford US, chief cryptographer for the US Navy for 2 decades+, including World War II.
*
Abraham Sinkov US,
SIS.
*
John Tiltman UK, Brigadier,
Room 40
Room 40, also known as 40 O.B. (old building; officially part of NID25), was the cryptanalysis section of the British Admiralty during the First World War.
The group, which was formed in October 1914, began when Rear-Admiral Henry Oliver, the ...
,
Government Code and Cypher School
The Government Code and Cypher School (GC&CS) was a British signals intelligence agency set up in 1919. During the First World War, the British Army and Royal Navy had separate signals intelligence agencies, MI1b and NID25 (initially known as R ...
,
Bletchley Park
Bletchley Park is an English country house and Bletchley Park estate, estate in Bletchley, Milton Keynes (Buckinghamshire), that became the principal centre of Allies of World War II, Allied World War II cryptography, code-breaking during the S ...
,
GCHQ
Government Communications Headquarters (GCHQ) is an intelligence and security organisation responsible for providing signals intelligence (SIGINT) and information assurance (IA) to the government and armed forces of the United Kingdom. Primar ...
,
NSA. Extraordinary length and range of cryptographic service
*
Alan Mathison Turing UK,
Government Code and Cypher School
The Government Code and Cypher School (GC&CS) was a British signals intelligence agency set up in 1919. During the First World War, the British Army and Royal Navy had separate signals intelligence agencies, MI1b and NID25 (initially known as R ...
,
Bletchley Park
Bletchley Park is an English country house and Bletchley Park estate, estate in Bletchley, Milton Keynes (Buckinghamshire), that became the principal centre of Allies of World War II, Allied World War II cryptography, code-breaking during the S ...
where he was chief cryptographer, inventor of the
Bombe
The bombe () was an Electromechanics, electro-mechanical device used by British cryptologists to help decipher German Enigma machine, Enigma-machine-encrypted secret messages during World War II. The United States Navy, US Navy and United Sta ...
that was used in decrypting
Enigma, mathematician, logician, and renowned pioneer of
Computer Science
Computer science is the study of computation, information, and automation. Computer science spans Theoretical computer science, theoretical disciplines (such as algorithms, theory of computation, and information theory) to Applied science, ...
.
*
William Thomas Tutte UK,
Government Code and Cypher School
The Government Code and Cypher School (GC&CS) was a British signals intelligence agency set up in 1919. During the First World War, the British Army and Royal Navy had separate signals intelligence agencies, MI1b and NID25 (initially known as R ...
,
Bletchley Park
Bletchley Park is an English country house and Bletchley Park estate, estate in Bletchley, Milton Keynes (Buckinghamshire), that became the principal centre of Allies of World War II, Allied World War II cryptography, code-breaking during the S ...
, with
John Tiltman, broke Lorenz SZ 40/42 encryption machine (codenamed Tunny) leading to the development of the
Colossus computer
Colossus was a set of computers developed by British cryptanalysis, codebreakers in the years 1943–1945 to help in the cryptanalysis of the Lorenz cipher. Colossus used vacuum tube, thermionic valves (vacuum tubes) to perform Boolean algebra ...
.
*
Betty Webb (code breaker), British codebreaker during World War II
*
William Stone Weedon, US,
*
Gordon Welchman
William Gordon Welchman OBE (15 June 1906 – 8 October 1985) was an English mathematician. During World War II, he worked at Britain's secret decryption centre at Bletchley Park, where he was one of the most important contributors. In 1948, a ...
UK,
Government Code and Cypher School
The Government Code and Cypher School (GC&CS) was a British signals intelligence agency set up in 1919. During the First World War, the British Army and Royal Navy had separate signals intelligence agencies, MI1b and NID25 (initially known as R ...
,
Bletchley Park
Bletchley Park is an English country house and Bletchley Park estate, estate in Bletchley, Milton Keynes (Buckinghamshire), that became the principal centre of Allies of World War II, Allied World War II cryptography, code-breaking during the S ...
where he was head of Hut Six (German Army and Air Force
Enigma cipher
In cryptography, a cipher (or cypher) is an algorithm for performing encryption or decryption—a series of well-defined steps that can be followed as a procedure. An alternative, less common term is ''encipherment''. To encipher or encode i ...
.
decryption
In cryptography, encryption (more specifically, encoding) is the process of transforming information in a way that, ideally, only authorized parties can decode. This process converts the original representation of the information, known as plai ...
), made an important contribution to the design of the
Bombe
The bombe () was an Electromechanics, electro-mechanical device used by British cryptologists to help decipher German Enigma machine, Enigma-machine-encrypted secret messages during World War II. The United States Navy, US Navy and United Sta ...
.
*
Herbert Yardley US,
MI8 (US), author "The American Black Chamber", worked in China as a cryptographer and briefly in Canada.
*
Henryk Zygalski,
Poland
Poland, officially the Republic of Poland, is a country in Central Europe. It extends from the Baltic Sea in the north to the Sudetes and Carpathian Mountains in the south, bordered by Lithuania and Russia to the northeast, Belarus and Ukrai ...
,
Biuro Szyfrów
The Cipher Bureau ( Polish: ''Biuro Szyfrów'', ) was the interwar Polish General Staff's Second Department's unit charged with SIGINT and both cryptography (the ''use'' of ciphers and codes) and cryptanalysis (the ''study'' of ciphers and cod ...
, inventor of Zygalski sheets, broke German
Enigma ciphers pre-1939.
*
Karl Stein German, Head of the Division IVa (security of own processes) at
Cipher Department of the High Command of the Wehrmacht
The Cipher Department of the High Command of the Wehrmacht () (also ''Oberkommando der Wehrmacht Chiffrierabteilung'' or ''Chiffrierabteilung of the High Command of the Wehrmacht'' or ''Chiffrierabteilung of the OKW'' or ''OKW/Chi'' or ''Chi'') ...
. Discoverer of
Stein manifold.
*
Gisbert Hasenjaeger German, Tester of the Enigma. Discovered new proof of the
completeness theorem
Complete may refer to:
Logic
* Completeness (logic)
* Completeness of a theory, the property of a theory that every formula in the theory's language or its negation is provable
Mathematics
* The completeness of the real numbers, which implies ...
of
Kurt Gödel
Kurt Friedrich Gödel ( ; ; April 28, 1906 – January 14, 1978) was a logician, mathematician, and philosopher. Considered along with Aristotle and Gottlob Frege to be one of the most significant logicians in history, Gödel profoundly ...
for
predicate logic
First-order logic, also called predicate logic, predicate calculus, or quantificational logic, is a collection of formal systems used in mathematics, philosophy, linguistics, and computer science. First-order logic uses quantified variables ove ...
.
*
Heinrich Scholz
Heinrich Scholz (; 17 December 1884 – 30 December 1956) was a German logician, philosopher, and Protestant theologian. He was a peer of Alan Turing who mentioned Scholz when writing with regard to the reception of "On Computable Numbers, wit ...
German, Worked in Division IVa at
OKW. Logician and pen friend of Alan Turning.
*
Gottfried Köthe German, Cryptanalyst at OKW. Mathematician created theory of
topological vector spaces
In mathematics, a topological vector space (also called a linear topological space and commonly abbreviated TVS or t.v.s.) is one of the basic structures investigated in functional analysis.
A topological vector space is a vector space that is als ...
.
*
Ernst Witt German, Mathematician at OKW.
Mathematical Discoveries Named After Ernst Witt.
*
Helmut Grunsky German, worked in
complex analysis
Complex analysis, traditionally known as the theory of functions of a complex variable, is the branch of mathematical analysis that investigates functions of complex numbers. It is helpful in many branches of mathematics, including algebraic ...
and
geometric function theory. He introduced
Grunsky's theorem and the
Grunsky inequalities.
*
Georg Hamel.
*
Oswald Teichmüller German, temporarily employed at OKW as cryptanalyst. Introduced
quasiconformal mappings and
differential geometric methods into
complex analysis
Complex analysis, traditionally known as the theory of functions of a complex variable, is the branch of mathematical analysis that investigates functions of complex numbers. It is helpful in many branches of mathematics, including algebraic ...
. Described by
Friedrich L. Bauer
Friedrich Ludwig "Fritz" Bauer (10 June 1924 – 26 March 2015) was a German pioneer of computer science and professor at the Technical University of Munich.
Life
Bauer earned his Abitur in 1942 and served in the Wehrmacht during World War ...
as an extreme Nazi and a true genius.
*
Hans Rohrbach
Hans Rohrbach (27 February 1903 – 19 December 1993) was a German mathematician. He worked both as an algebraist and a Number theory, number theorist and later worked as Cryptanalysis, cryptanalyst at Pers Z S, the German Foreign Office cipher ...
German, Mathematician at AA/Pers Z, the German department of state, civilian diplomatic cryptological agency.
*
Wolfgang Franz German, Mathematician who worked at OKW. Later significant discoveries in
Topology
Topology (from the Greek language, Greek words , and ) is the branch of mathematics concerned with the properties of a Mathematical object, geometric object that are preserved under Continuous function, continuous Deformation theory, deformat ...
.
*
Werner Weber German, Mathematician at OKW.
*
Georg Aumann German, Mathematician at OKW. His doctoral student was
Friedrich L. Bauer
Friedrich Ludwig "Fritz" Bauer (10 June 1924 – 26 March 2015) was a German pioneer of computer science and professor at the Technical University of Munich.
Life
Bauer earned his Abitur in 1942 and served in the Wehrmacht during World War ...
.
*
Otto Leiberich German, Mathematician who worked as a linguist at the
Cipher Department of the High Command of the Wehrmacht
The Cipher Department of the High Command of the Wehrmacht () (also ''Oberkommando der Wehrmacht Chiffrierabteilung'' or ''Chiffrierabteilung of the High Command of the Wehrmacht'' or ''Chiffrierabteilung of the OKW'' or ''OKW/Chi'' or ''Chi'') ...
.
*
Alexander Aigner German, Mathematician who worked at OKW.
*
Erich Hüttenhain German, Chief cryptanalyst of and led Chi IV (section 4) of the
Cipher Department of the High Command of the Wehrmacht
The Cipher Department of the High Command of the Wehrmacht () (also ''Oberkommando der Wehrmacht Chiffrierabteilung'' or ''Chiffrierabteilung of the High Command of the Wehrmacht'' or ''Chiffrierabteilung of the OKW'' or ''OKW/Chi'' or ''Chi'') ...
. A German mathematician and cryptanalyst who tested a number of German cipher machines and found them to be breakable.
*
Wilhelm Fenner German, Chief Cryptologist and Director of
Cipher Department of the High Command of the Wehrmacht
The Cipher Department of the High Command of the Wehrmacht () (also ''Oberkommando der Wehrmacht Chiffrierabteilung'' or ''Chiffrierabteilung of the High Command of the Wehrmacht'' or ''Chiffrierabteilung of the OKW'' or ''OKW/Chi'' or ''Chi'') ...
.
*
Walther Fricke German, Worked alongside Dr Erich Hüttenhain at
Cipher Department of the High Command of the Wehrmacht
The Cipher Department of the High Command of the Wehrmacht () (also ''Oberkommando der Wehrmacht Chiffrierabteilung'' or ''Chiffrierabteilung of the High Command of the Wehrmacht'' or ''Chiffrierabteilung of the OKW'' or ''OKW/Chi'' or ''Chi'') ...
. Mathematician, logician, cryptanalyst and linguist.
*
Fritz Menzer German. Inventor of SG39 and SG41.
Other pre-computer
*
Rosario Candela, US, Architect and notable amateur cryptologist who authored books and taught classes on the subject to civilians at
Hunter College
Hunter College is a public university in New York City, United States. It is one of the constituent colleges of the City University of New York and offers studies in more than one hundred undergraduate and postgraduate fields across five schools ...
.
*
Claude Elwood Shannon
Claude Elwood Shannon (April 30, 1916 – February 24, 2001) was an American mathematician, electrical engineer, computer scientist, cryptographer and inventor known as the "father of information theory" and the man who laid the foundations of th ...
, US, founder of
information theory
Information theory is the mathematical study of the quantification (science), quantification, Data storage, storage, and telecommunications, communication of information. The field was established and formalized by Claude Shannon in the 1940s, ...
, proved the
one-time pad
The one-time pad (OTP) is an encryption technique that cannot be Cryptanalysis, cracked in cryptography. It requires the use of a single-use pre-shared key that is larger than or equal to the size of the message being sent. In this technique, ...
to be unbreakable.
Modern
See also:
Modern cryptographers for a more exhaustive list.
Symmetric-key algorithm inventors
*
Ross Anderson, UK,
University of Cambridge
The University of Cambridge is a Public university, public collegiate university, collegiate research university in Cambridge, England. Founded in 1209, the University of Cambridge is the List of oldest universities in continuous operation, wo ...
, co-inventor of the
Serpent cipher.
*
Paulo S. L. M. Barreto, Brazilian,
University of São Paulo
The Universidade de São Paulo (, USP) is a public research university in the Brazilian state of São Paulo, and the largest public university in Brazil.
The university was founded on 25 January 1934, regrouping already existing schools in ...
, co-inventor of the
Whirlpool hash function.
*
George Blakley, US, independent inventor of
secret sharing
Secret sharing (also called secret splitting) refers to methods for distributing a secrecy, secret among a group, in such a way that no individual holds any intelligible information about the secret, but when a sufficient number of individuals c ...
.
*
Eli Biham
Eli Biham () is an Israeli cryptographer and cryptanalyst who is a professor at the Technion - Israel Institute of Technology Computer Science department. From 2008 to 2013, Biham was the dean of the Technion Computer Science department, afte ...
, Israel, co-inventor of the
Serpent cipher.
*
Don Coppersmith, co-inventor of
DES and
MARS
Mars is the fourth planet from the Sun. It is also known as the "Red Planet", because of its orange-red appearance. Mars is a desert-like rocky planet with a tenuous carbon dioxide () atmosphere. At the average surface level the atmosph ...
ciphers.
*
Joan Daemen
Joan Daemen (; born 1965) is a Belgians, Belgian cryptographer who is currently professor of digital security (symmetric encryption) at Radboud University. He co-designed with Vincent Rijmen the Rijndael cipher, which was selected as the Advance ...
, Belgian,
Radboud University
Radboud University (abbreviated as RU, , formerly ) is a public research university located in Nijmegen, Netherlands. RU has seven faculties and more than 24,000 students.
Established in 1923, Radboud University has consistently been included in ...
, co-developer of
Rijndael
The Advanced Encryption Standard (AES), also known by its original name Rijndael (), is a specification for the encryption of electronic data established by the U.S. National Institute of Standards and Technology (NIST) in 2001.
AES is a variant ...
which became the
Advanced Encryption Standard
The Advanced Encryption Standard (AES), also known by its original name Rijndael (), is a specification for the encryption of electronic data established by the U.S. National Institute of Standards and Technology (NIST) in 2001.
AES is a variant ...
(AES), and
Keccak
SHA-3 (Secure Hash Algorithm 3) is the latest member of the Secure Hash Algorithm family of standards, released by NIST on August 5, 2015. Although part of the same series of standards, SHA-3 is internally different from the MD5-like struct ...
which became
SHA-3
SHA-3 (Secure Hash Algorithm 3) is the latest member of the Secure Hash Algorithm family of standards, released by NIST on August 5, 2015. Although part of the same series of standards, SHA-3 is internally different from the MD5-like stru ...
.
*
Horst Feistel, German,
IBM
International Business Machines Corporation (using the trademark IBM), nicknamed Big Blue, is an American Multinational corporation, multinational technology company headquartered in Armonk, New York, and present in over 175 countries. It is ...
, namesake of
Feistel networks and
Lucifer
The most common meaning for Lucifer in English is as a name for the Devil in Christian theology.
He appeared in the King James Version of the Bible in Isaiah and before that in the Vulgate (the late-4th-century Latin translation of the Bib ...
cipher.
*
Lars Knudsen
Lars Ramkilde Knudsen (born 21 February 1962) is a Denmark, Danish researcher in cryptography, particularly interested in the design and cryptanalysis, analysis of block ciphers, cryptographic hash function, hash functions and message authentic ...
,
Denmark
Denmark is a Nordic countries, Nordic country in Northern Europe. It is the metropole and most populous constituent of the Kingdom of Denmark,, . also known as the Danish Realm, a constitutionally unitary state that includes the Autonomous a ...
, co-inventor of the
Serpent cipher.
*
Ralph Merkle
Ralph C. Merkle (born February 2, 1952) is an American computer scientist and mathematician. He is one of the inventors of public-key cryptography, the inventor of cryptographic hashing, and more recently a researcher and speaker on cryonics.
M ...
, US, inventor of
Merkle trees.
*
Bart Preneel, Belgian,
KU Leuven
KU Leuven (Katholieke Universiteit Leuven) is a Catholic research university in the city of Leuven, Leuven, Belgium. Founded in 1425, it is the oldest university in Belgium and the oldest university in the Low Countries.
In addition to its mai ...
, co-inventor of
RIPEMD-160.
*
Vincent Rijmen
Vincent Rijmen (; born 16 October 1970) is a Belgium, Belgian cryptographer and one of the two designers of the Rijndael, the Advanced Encryption Standard. Rijmen is also the co-designer of the WHIRLPOOL cryptographic hash function, and the block ...
, Belgian,
KU Leuven
KU Leuven (Katholieke Universiteit Leuven) is a Catholic research university in the city of Leuven, Leuven, Belgium. Founded in 1425, it is the oldest university in Belgium and the oldest university in the Low Countries.
In addition to its mai ...
, co-developer of
Rijndael
The Advanced Encryption Standard (AES), also known by its original name Rijndael (), is a specification for the encryption of electronic data established by the U.S. National Institute of Standards and Technology (NIST) in 2001.
AES is a variant ...
which became the
Advanced Encryption Standard
The Advanced Encryption Standard (AES), also known by its original name Rijndael (), is a specification for the encryption of electronic data established by the U.S. National Institute of Standards and Technology (NIST) in 2001.
AES is a variant ...
(AES).
*
Ronald L. Rivest, US,
MIT
The Massachusetts Institute of Technology (MIT) is a private research university in Cambridge, Massachusetts, United States. Established in 1861, MIT has played a significant role in the development of many areas of modern technology and sc ...
, inventor of
RC cipher series and
MD algorithm series.
*
Bruce Schneier
Bruce Schneier (; born January 15, 1963) is an American cryptographer, computer security professional, privacy specialist, and writer. Schneier is an Adjunct Lecturer in Public Policy at the Harvard Kennedy School and a Fellow at the Berkman ...
, US, inventor of
Blowfish and co-inventor of
Twofish and
Threefish.
*
Xuejia Lai, CH, co-inventor of
International Data Encryption Algorithm
In cryptography, the International Data Encryption Algorithm (IDEA), originally called Improved Proposed Encryption Standard (IPES), is a Symmetric-key algorithm, symmetric-key block cipher designed by James Massey of ETH Zurich and Xuejia Lai an ...
(IDEA).
*
Adi Shamir
Adi Shamir (; born July 6, 1952) is an Israeli cryptographer and inventor. He is a co-inventor of the Rivest–Shamir–Adleman (RSA) algorithm (along with Ron Rivest and Len Adleman), a co-inventor of the Feige–Fiat–Shamir identification sc ...
, Israel,
Weizmann Institute
The Weizmann Institute of Science ( ''Machon Weizmann LeMada'') is a Public university, public research university in Rehovot, Israel, established in 1934, fourteen years before the State of Israel was founded. Unlike other List of Israeli uni ...
, inventor of
secret sharing
Secret sharing (also called secret splitting) refers to methods for distributing a secrecy, secret among a group, in such a way that no individual holds any intelligible information about the secret, but when a sufficient number of individuals c ...
.
*
Walter Tuchman. US. led the
Data Encryption Standard development team at IBM and inventor of
Triple DES
In cryptography, Triple DES (3DES or TDES), officially the Triple Data Encryption Algorithm (TDEA or Triple DEA), is a symmetric-key block cipher, which applies the DES cipher algorithm three times to each data block. The 56-bit key of the Dat ...
Asymmetric-key algorithm inventors
*
Leonard Adleman
Leonard Adleman (born December 31, 1945) is an American computer scientist. He is one of the creators of the RSA encryption algorithm, for which he received the 2002 Turing Award. He is also known for the creation of the field of DNA computin ...
, US,
USC USC may refer to:
Education
United States
* Universidad del Sagrado Corazón, Santurce, Puerto Rico
* University of South Carolina, Columbia, South Carolina
** University of South Carolina System, a state university system of South Carolina
* ...
, the 'A' in
RSA.
*
David Chaum
David Lee Chaum (born 1955) is an American computer scientist, List of cryptographers, cryptographer, and inventor. He is known as a pioneer in cryptography and privacy-preserving technologies, and widely recognized as the inventor of Digital cur ...
, US, inventor of
blind signatures.
*
Clifford Cocks
Clifford Christopher Cocks (born 28 December 1950) is a British mathematician and cryptographer. In the early 1970s, while working at the United Kingdom Government Communications Headquarters (GCHQ), he developed an early public-key cryptogra ...
, UK
GCHQ
Government Communications Headquarters (GCHQ) is an intelligence and security organisation responsible for providing signals intelligence (SIGINT) and information assurance (IA) to the government and armed forces of the United Kingdom. Primar ...
first inventor of
RSA, a fact that remained secret until 1997 and so was unknown to
Rivest,
Shamir, and
Adleman.
*
Whitfield Diffie
Bailey Whitfield 'Whit' Diffie ForMemRS (born June 5, 1944) is an American cryptographer and mathematician and one of the pioneers of public-key cryptography along with Martin Hellman and Ralph Merkle. Diffie and Hellman's 1976 paper ''New Dire ...
, US, (public) co-inventor of the
Diffie-Hellman key-exchange protocol.
*
Taher Elgamal, US (born Egyptian), inventor of the
Elgamal discrete log cryptosystem.
*
Shafi Goldwasser
Shafrira Goldwasser (; born 1959) is an Israeli-American computer scientist. A winner of the Turing Award in 2012, she is the RSA Professor of Electrical Engineering and Computer Science at the Massachusetts Institute of Technology; a professor o ...
, US and Israel,
MIT
The Massachusetts Institute of Technology (MIT) is a private research university in Cambridge, Massachusetts, United States. Established in 1861, MIT has played a significant role in the development of many areas of modern technology and sc ...
and
Weizmann Institute
The Weizmann Institute of Science ( ''Machon Weizmann LeMada'') is a Public university, public research university in Rehovot, Israel, established in 1934, fourteen years before the State of Israel was founded. Unlike other List of Israeli uni ...
, co-discoverer of
zero-knowledge proofs, and of
Semantic security
In cryptography, a semantically secure cryptosystem is one where only negligible information about the plaintext can be feasibly extracted from the ciphertext. Specifically, any probabilistic, polynomial-time algorithm (PPTA) that is given the ci ...
.
*
Martin Hellman
Martin Edward Hellman (born October 2, 1945) is an American cryptologist and mathematician, best known for his invention of public-key cryptography in cooperation with Whitfield Diffie and Ralph Merkle. Hellman is a longtime contributor to the ...
, US, (public) co-inventor of the
Diffie-Hellman key-exchange protocol.
*
Neal Koblitz
Neal I. Koblitz (born December 24, 1948) is a Professor of Mathematics at the University of Washington. He is also an adjunct professor with the Centre for Applied Cryptographic Research at the University of Waterloo. He is the creator of hype ...
, independent co-creator of
elliptic curve cryptography
Elliptic-curve cryptography (ECC) is an approach to public-key cryptography based on the algebraic structure of elliptic curves over finite fields. ECC allows smaller keys to provide equivalent security, compared to cryptosystems based on modula ...
.
*
Alfred Menezes, co-inventor of
MQV, an
elliptic curve
In mathematics, an elliptic curve is a smooth, projective, algebraic curve of genus one, on which there is a specified point . An elliptic curve is defined over a field and describes points in , the Cartesian product of with itself. If the ...
technique.
*
Silvio Micali
Silvio Micali (born October 13, 1954) is an Italian computer scientist, professor at the Massachusetts Institute of Technology and the founder of Algorand, a proof-of-stake blockchain cryptocurrency protocol. Micali's research at the MIT Compu ...
, US (born Italian),
MIT
The Massachusetts Institute of Technology (MIT) is a private research university in Cambridge, Massachusetts, United States. Established in 1861, MIT has played a significant role in the development of many areas of modern technology and sc ...
, co-discoverer of
zero-knowledge proofs, and of
Semantic security
In cryptography, a semantically secure cryptosystem is one where only negligible information about the plaintext can be feasibly extracted from the ciphertext. Specifically, any probabilistic, polynomial-time algorithm (PPTA) that is given the ci ...
.
*
Victor Miller, independent co-creator of
elliptic curve cryptography
Elliptic-curve cryptography (ECC) is an approach to public-key cryptography based on the algebraic structure of elliptic curves over finite fields. ECC allows smaller keys to provide equivalent security, compared to cryptosystems based on modula ...
.
*
David Naccache, inventor of the
Naccache–Stern cryptosystem and of the
Naccache–Stern knapsack cryptosystem
The Naccache–Stern Knapsack cryptosystem is an atypical public-key cryptosystem developed by David Naccache and Jacques Stern in 1997. This cryptosystem is deterministic encryption, deterministic, and hence is not semantic security, semantically ...
.
*
Moni Naor
Moni Naor () is an Israeli computer scientist, currently a professor at the Weizmann Institute of Science. Naor received his Ph.D. in 1989 at the University of California, Berkeley. His advisor was Manuel Blum.
He works in various fields of com ...
, co-inventor the Naor–Yung encryption paradigm for
CCA security.
*
Rafail Ostrovsky
Rafail Ostrovsky is a distinguished professor of computer science and mathematics at University of California, Los Angeles, UCLA and a well-known researcher in algorithms and cryptography.
Biography
Rafail Ostrovsky received his Ph.D. from Massa ...
, co-inventor of
Oblivious RAM
An Oblivious RAM (ORAM) simulator is a compiler that transforms an algorithms, algorithm in such a way that the resulting algorithm preserves the Input/output, input-output (computing), output behavior of the original algorithm but the Probability ...
, of single-server
Private Information Retrieval
In cryptography, a private information retrieval (PIR) protocol is a protocol that allows a user to retrieve an item from a server in possession of a database without revealing which item is retrieved. PIR is a weaker version of 1-out-of-''n'' obl ...
, and
proactive cryptosystems.
*
Pascal Paillier, inventor of
Paillier encryption.
*
Michael O. Rabin, Israel, inventor of
Rabin encryption.
*
Ronald L. Rivest, US,
MIT
The Massachusetts Institute of Technology (MIT) is a private research university in Cambridge, Massachusetts, United States. Established in 1861, MIT has played a significant role in the development of many areas of modern technology and sc ...
, the 'R' in
RSA.
*
Adi Shamir
Adi Shamir (; born July 6, 1952) is an Israeli cryptographer and inventor. He is a co-inventor of the Rivest–Shamir–Adleman (RSA) algorithm (along with Ron Rivest and Len Adleman), a co-inventor of the Feige–Fiat–Shamir identification sc ...
, Israel,
Weizmann Institute
The Weizmann Institute of Science ( ''Machon Weizmann LeMada'') is a Public university, public research university in Rehovot, Israel, established in 1934, fourteen years before the State of Israel was founded. Unlike other List of Israeli uni ...
, the 'S' in
RSA.
*
Victor Shoup, US,
NYU Courant, co-inventor of the
Cramer-Shoup cryptosystem.
*
Moti Yung
Mordechai M. "Moti" Yung is a cryptographer and computer scientist known for his work on cryptovirology and kleptography.
Career
Yung earned his PhD from Columbia University in 1988 under the supervision of Zvi Galil. In the past, he worked a ...
, co-inventor of the Naor–Yung encryption paradigm for
CCA security, of
threshold cryptosystem A threshold cryptosystem, the basis for the field of threshold cryptography, is a cryptosystem that protects information by encrypting it and distributing it among a cluster of fault-tolerant computers. The message is encrypted using a public key, ...
s, and
proactive cryptosystems.
Cryptanalysts
*
Joan Clarke, English cryptanalyst and numismatist best known for her work as a code-breaker at Bletchley Park during the Second World War.
*
Ross Anderson, UK.
*
Eli Biham
Eli Biham () is an Israeli cryptographer and cryptanalyst who is a professor at the Technion - Israel Institute of Technology Computer Science department. From 2008 to 2013, Biham was the dean of the Technion Computer Science department, afte ...
, Israel, co-discoverer of
differential cryptanalysis
Differential cryptanalysis is a general form of cryptanalysis applicable primarily to block ciphers, but also to stream ciphers and cryptographic hash functions. In the broadest sense, it is the study of how differences in information input can a ...
and
Related-key attack
In cryptography, a related-key attack is any form of cryptanalysis where the attacker can observe the operation of a cipher under several different keys whose values are initially unknown, but where some mathematical relationship connecting the ...
.
*
Matt Blaze
Matt Blaze is an American researcher who focuses on the areas of secure systems, cryptography, and trust management. He is currently the McDevitt Chair of Computer Science and Law at Georgetown University, and is on the board of directors of the ...
, US.
*
Dan Boneh, US,
Stanford University
Leland Stanford Junior University, commonly referred to as Stanford University, is a Private university, private research university in Stanford, California, United States. It was founded in 1885 by railroad magnate Leland Stanford (the eighth ...
.
*
Niels Ferguson, Netherlands, co-inventor of Twofish and Fortuna.
*
Ian Goldberg, Canada,
University of Waterloo
The University of Waterloo (UWaterloo, UW, or Waterloo) is a Public university, public research university located in Waterloo, Ontario, Canada. The main campus is on of land adjacent to uptown Waterloo and Waterloo Park. The university also op ...
.
*
Lars Knudsen
Lars Ramkilde Knudsen (born 21 February 1962) is a Denmark, Danish researcher in cryptography, particularly interested in the design and cryptanalysis, analysis of block ciphers, cryptographic hash function, hash functions and message authentic ...
, Denmark,
DTU, discovered
integral cryptanalysis.
*
Paul Kocher, US, discovered
differential power analysis
Power analysis is a form of side channel attack in which the attacker studies the power consumption of a cryptographic hardware device. These attacks rely on basic physical properties of the device: semiconductor devices are governed by the l ...
.
*
Mitsuru Matsui, Japan, discoverer of
linear cryptanalysis
In cryptography, linear cryptanalysis is a general form of cryptanalysis based on finding affine
Affine may describe any of various topics concerned with connections or affinities.
It may refer to:
* Affine, a Affinity_(law)#Terminology, relat ...
.
*
Kenny Paterson
Kenneth G. "Kenny" Paterson (born 2 March 1969) is a professor in the Institute of Information Security at ETH Zurich, where he leads the Applied Cryptography Group. Before joining ETH Zurich in April 2019, he was a professor in the Information Se ...
, UK, previously
Royal Holloway, now
ETH Zurich
ETH Zurich (; ) is a public university in Zurich, Switzerland. Founded in 1854 with the stated mission to educate engineers and scientists, the university focuses primarily on science, technology, engineering, and mathematics. ETH Zurich ran ...
, known for several attacks on cryptosystems.
*
David Wagner, US,
UC Berkeley
The University of California, Berkeley (UC Berkeley, Berkeley, Cal, or California), is a public land-grant research university in Berkeley, California, United States. Founded in 1868 and named after the Anglo-Irish philosopher George Berkele ...
, co-discoverer of the
slide and
boomerang attacks.
*
Xiaoyun Wang, the People's Republic of China, known for
MD5
The MD5 message-digest algorithm is a widely used hash function producing a 128-bit hash value. MD5 was designed by Ronald Rivest in 1991 to replace an earlier hash function MD4, and was specified in 1992 as Request for Comments, RFC 1321.
MD5 ...
and
SHA-1
In cryptography, SHA-1 (Secure Hash Algorithm 1) is a hash function which takes an input and produces a 160-bit (20-byte) hash value known as a message digest – typically rendered as 40 hexadecimal digits. It was designed by the United States ...
hash function
A hash function is any Function (mathematics), function that can be used to map data (computing), data of arbitrary size to fixed-size values, though there are some hash functions that support variable-length output. The values returned by a ...
attacks.
*
Alex Biryukov,
University of Luxembourg
The University of Luxembourg (French language, French: ''Université du Luxembourg''; German language, German: ''Universität Luxemburg''; Luxembourgish language, Luxembourgish: ''Universitéit Lëtzebuerg'') is a Public university, public researc ...
, known for
impossible differential cryptanalysis and
slide attack.
*
Moti Yung
Mordechai M. "Moti" Yung is a cryptographer and computer scientist known for his work on cryptovirology and kleptography.
Career
Yung earned his PhD from Columbia University in 1988 under the supervision of Zvi Galil. In the past, he worked a ...
,
Kleptography
Kleptography is the study of stealing information securely and subliminally. The term was introduced by Adam Young and Moti Yung in the Proceedings of Advances in Cryptology – Crypto '96.
Kleptography is a subfield of cryptovirology and is a natu ...
.
*
Bill Buchanan, creator of ASecuritySite - one of the most comprehensive cryptography website in the World.
Algorithmic number theorists
*
Daniel J. Bernstein, US, developed several popular algorithms, fought US government restrictions in ''
Bernstein v. United States
''Bernstein v. United States'' was a series of court cases filed by Daniel J. Bernstein, then a mathematics Ph.D. student at the University of California, Berkeley, challenging U.S. government restrictions on the export of cryptographic sof ...
.''
*
Don Coppersmith, US
*
Dorian M. Goldfeld, US, Along with Michael Anshel and Iris Anshel invented the
Anshel–Anshel–Goldfeld key exchange and the
Algebraic Eraser. They also helped found
Braid Group Cryptography.
*
Victor Shoup, US,
NYU Courant.
Theoreticians
*
Mihir Bellare, US,
UCSD
The University of California, San Diego (UC San Diego in communications material, formerly and colloquially UCSD) is a public land-grant research university in San Diego, California, United States. Established in 1960 near the pre-existing ...
, co-proposer of the
Random oracle
In cryptography, a random oracle is an oracle (a theoretical black box) that responds to every ''unique query'' with a (truly) random response chosen uniformly from its output domain. If a query is repeated, it responds the same way every tim ...
model.
*
Dan Boneh, US,
Stanford
Leland Stanford Junior University, commonly referred to as Stanford University, is a private research university in Stanford, California, United States. It was founded in 1885 by railroad magnate Leland Stanford (the eighth governor of and th ...
.
*
Gilles Brassard
Gilles Brassard is a faculty member of the Université de Montréal, where he has been a Full Professor since 1988 and Canada Research Chair since 2001.
Education and early life
Brassard received a Ph.D. in Computer Science from Cornell Univers ...
, Canada,
Université de Montréal
The Université de Montréal (; UdeM; ) is a French-language public research university in Montreal, Quebec, Canada. The university's main campus is located in the Côte-des-Neiges neighborhood of Côte-des-Neiges–Notre-Dame-de-Grâce on M ...
. Co-inventor of
quantum cryptography
Quantum cryptography is the science of exploiting quantum mechanical properties to perform cryptographic tasks. The best known example of quantum cryptography is quantum key distribution, which offers an information-theoretically secure soluti ...
.
*
Claude Crépeau, Canada,
McGill University
McGill University (French: Université McGill) is an English-language public research university in Montreal, Quebec, Canada. Founded in 1821 by royal charter,Frost, Stanley Brice. ''McGill University, Vol. I. For the Advancement of Learning, ...
.
*
Oded Goldreich
Oded Goldreich (; born 1957) is a professor of computer science at the faculty of mathematics and computer science of the Weizmann Institute of Science, Israel. His research interests lie within the theory of computation and are, specifically, ...
, Israel,
Weizmann Institute
The Weizmann Institute of Science ( ''Machon Weizmann LeMada'') is a Public university, public research university in Rehovot, Israel, established in 1934, fourteen years before the State of Israel was founded. Unlike other List of Israeli uni ...
, author of
Foundations of Cryptography.
*
Shafi Goldwasser
Shafrira Goldwasser (; born 1959) is an Israeli-American computer scientist. A winner of the Turing Award in 2012, she is the RSA Professor of Electrical Engineering and Computer Science at the Massachusetts Institute of Technology; a professor o ...
, US and Israel.
*
Silvio Micali
Silvio Micali (born October 13, 1954) is an Italian computer scientist, professor at the Massachusetts Institute of Technology and the founder of Algorand, a proof-of-stake blockchain cryptocurrency protocol. Micali's research at the MIT Compu ...
, US,
MIT
The Massachusetts Institute of Technology (MIT) is a private research university in Cambridge, Massachusetts, United States. Established in 1861, MIT has played a significant role in the development of many areas of modern technology and sc ...
.
*
Rafail Ostrovsky
Rafail Ostrovsky is a distinguished professor of computer science and mathematics at University of California, Los Angeles, UCLA and a well-known researcher in algorithms and cryptography.
Biography
Rafail Ostrovsky received his Ph.D. from Massa ...
, US,
UCLA
The University of California, Los Angeles (UCLA) is a public land-grant research university in Los Angeles, California, United States. Its academic roots were established in 1881 as a normal school then known as the southern branch of the C ...
.
*
Charles Rackoff, co-discoverer of
zero-knowledge proof
In cryptography, a zero-knowledge proof (also known as a ZK proof or ZKP) is a protocol in which one party (the prover) can convince another party (the verifier) that some given statement is true, without conveying to the verifier any information ...
s.
*
Oded Regev, inventor of
learning with errors
In cryptography, learning with errors (LWE) is a mathematical problem that is widely used to create secure encryption algorithms. It is based on the idea of representing secret information as a set of equations with errors. In other words, LWE is ...
.
*
Phillip Rogaway
Phillip Rogaway (also referred to as Phil Rogaway) is an American cryptographer and former professor of computer science at the University of California, Davis. He graduated from Beverly Hills High School, and later earned a BA in computer scie ...
, US,
UC Davis
The University of California, Davis (UC Davis, UCD, or Davis) is a Public university, public Land-grant university, land-grant research university in Davis, California, United States. It is the northernmost of the ten campuses of the University ...
, co-proposer of the
Random oracle
In cryptography, a random oracle is an oracle (a theoretical black box) that responds to every ''unique query'' with a (truly) random response chosen uniformly from its output domain. If a query is repeated, it responds the same way every tim ...
model.
*
Amit Sahai, US,
UCLA
The University of California, Los Angeles (UCLA) is a public land-grant research university in Los Angeles, California, United States. Its academic roots were established in 1881 as a normal school then known as the southern branch of the C ...
.
*
Victor Shoup, US,
NYU Courant.
*
Gustavus Simmons
Gustavus J. Simmons (born 1930) is a retired cryptographer and former manager of the applied mathematics Department and Senior Fellow at Sandia National Laboratories. He worked primarily with authentication theory, developing cryptographic techn ...
, US,
Sandia,
authentication
Authentication (from ''authentikos'', "real, genuine", from αὐθέντης ''authentes'', "author") is the act of proving an Logical assertion, assertion, such as the Digital identity, identity of a computer system user. In contrast with iden ...
theory.
*
Moti Yung
Mordechai M. "Moti" Yung is a cryptographer and computer scientist known for his work on cryptovirology and kleptography.
Career
Yung earned his PhD from Columbia University in 1988 under the supervision of Zvi Galil. In the past, he worked a ...
, US, Google.
Government cryptographers
*
Clifford Cocks
Clifford Christopher Cocks (born 28 December 1950) is a British mathematician and cryptographer. In the early 1970s, while working at the United Kingdom Government Communications Headquarters (GCHQ), he developed an early public-key cryptogra ...
, UK,
GCHQ
Government Communications Headquarters (GCHQ) is an intelligence and security organisation responsible for providing signals intelligence (SIGINT) and information assurance (IA) to the government and armed forces of the United Kingdom. Primar ...
, secret inventor of the algorithm later known as
RSA.
*
James H. Ellis, UK,
GCHQ
Government Communications Headquarters (GCHQ) is an intelligence and security organisation responsible for providing signals intelligence (SIGINT) and information assurance (IA) to the government and armed forces of the United Kingdom. Primar ...
, secretly proved the possibility of asymmetric encryption.
*
Lowell Frazer, US,
National Security Agency
The National Security Agency (NSA) is an intelligence agency of the United States Department of Defense, under the authority of the director of national intelligence (DNI). The NSA is responsible for global monitoring, collection, and proces ...
*
Laura Holmes, US,
National Security Agency
The National Security Agency (NSA) is an intelligence agency of the United States Department of Defense, under the authority of the director of national intelligence (DNI). The NSA is responsible for global monitoring, collection, and proces ...
*
Julia Wetzel
Julia Wetzel began her National Security Agency (NSA) career as a Special Research Analyst in the Operations unit. In the late 1970s, Wetzel worked with the House Select Committee on Intelligence. In 1989 she was assigned as the NSA's representa ...
, US,
National Security Agency
The National Security Agency (NSA) is an intelligence agency of the United States Department of Defense, under the authority of the director of national intelligence (DNI). The NSA is responsible for global monitoring, collection, and proces ...
*
Malcolm Williamson, UK,
GCHQ
Government Communications Headquarters (GCHQ) is an intelligence and security organisation responsible for providing signals intelligence (SIGINT) and information assurance (IA) to the government and armed forces of the United Kingdom. Primar ...
, secret inventor of the protocol later known as the
Diffie–Hellman key exchange
Diffie–Hellman (DH) key exchangeSynonyms of Diffie–Hellman key exchange include:
* Diffie–Hellman–Merkle key exchange
* Diffie–Hellman key agreement
* Diffie–Hellman key establishment
* Diffie–Hellman key negotiation
* Exponential ke ...
.
Cryptographer businesspeople
*
Bruce Schneier
Bruce Schneier (; born January 15, 1963) is an American cryptographer, computer security professional, privacy specialist, and writer. Schneier is an Adjunct Lecturer in Public Policy at the Harvard Kennedy School and a Fellow at the Berkman ...
, US, CTO and founder of
Counterpane Internet Security, Inc. and cryptography author.
*
Scott Vanstone, Canada, founder of
Certicom and
elliptic curve cryptography
Elliptic-curve cryptography (ECC) is an approach to public-key cryptography based on the algebraic structure of elliptic curves over finite fields. ECC allows smaller keys to provide equivalent security, compared to cryptosystems based on modula ...
proponent.
See also
*
Cryptography
Cryptography, or cryptology (from "hidden, secret"; and ''graphein'', "to write", or ''-logy, -logia'', "study", respectively), is the practice and study of techniques for secure communication in the presence of Adversary (cryptography), ...
References
External links
List of cryptographers' home pages
{{DEFAULTSORT:Cryptographers
Lists of people by occupation
Cryptography lists and comparisons