Request PDF on ResearchGate Quantum Cryptography II: How to re-use a one-time pad safely even if P=NP When elementary quantum systems, such as polarized photons, are used to transmit digital.
Below is a timeline of notable events related to
BCE
*3500s - The Sumerians develop 'cuneiform' writing and the Egyptians develop 'hieroglyphic' writing.
*1500s - The Phoenicians develop an alphabet
*600-500 - Hebrew scholars make use of simple monoalphabetic substitution ciphers (such as the
*c. 400 - Spartan use of
*c. 400 -
*100-1 CE - Notable Roman ciphers such as the
1 - 1799 CE
![Stephen Wiesner, ‘conjugate Coding (manuscript Ca 1970); Subsequently Published In Sigact News 15:1, 78-88 (1983) Stephen Wiesner, ‘conjugate Coding (manuscript Ca 1970); Subsequently Published In Sigact News 15:1, 78-88 (1983)](https://i1.rgstatic.net/publication/324115273_The_Impact_of_Quantum_Computing_on_Present_Cryptography/links/5abe9f5d0f7e9bfc0459a8d4/largepreview.png)
*801–873 CE -
*1355-1418 -
*1450 - The Chinese develop wooden block
*1450-1520 - The
*1466 -
*1518 -
*1553 - Bellaso invents
*1585 - Vigenère's book on ciphers
*1586 - Cryptanalysis used by spy master Sir
*1641 - Wilkins' 'Mercury' (English book on cryptology)
*1793 -
*1795 -
1800-1899
*1809-14 George Scovell's work on Napoleonic ciphers during the
*1831 -
*1835 -
*1854 -
*c. 1854 -
*1855 - For the English side in
*1883 -
*1885 -
*1894 - The
1900 - 1949
*c 1915 -
* 1917 -
* 1917 -
*1919 -
*1919 -
* 1921 -
*c. 1924 - MI8 (
*c. 1932 - first break of German Army Enigma by
* 1929 - U.S.
* 1931 - 'The American Black Chamber' by
* 1940 - break of Japan's
*
* June 1942 -
* April 1943 -
*April 1943 -
*December 1943 - The
*1944 - patent application filed on
*1946 -
*1948 -
*1949 - Shannon's 'Communication Theory of Secrecy Systems' pub in Bell Labs Technical Journal
1950 - 1999
*1951 - U.S.
*1957 - First production order for
*1964 -
*August 1964 -
*
*
*1968 -
*1969 - The first hosts of
*1970 - Using
*1974? -
*1976 - the
*1976 -
*1977-
*1981 -
*1984 - Based on
*1985 - Walker spy ring uncovered. Remaining KL-7's withdrawn from service.
*1986 - After an increasing number of break-ins to government and corporate computers, United States Congress passes the '
*1988 - First optical chip developed, it uses light instead of electricity to increase processing speed.
*1989 -
*1989 -
*1991 -
*1992 - Release of the movie 'Sneakers', in which security experts are blackmailed into stealing a universal decoder for encryption systems.
*1994 -
*1994 -
*1994 -
*1994 -
*1994 - Russian crackers siphon $10 million from
*1994 - Formerly proprietary, but un-patented,
*1994 - first
*1995 - NSA publishes the
*July 1997 -
*1997 -
* October 1998 -
*October 1999 -
2000 and beyond
*
*March 2000 -
*
*2000 - UK Regulation of Investigatory Powers Act requires anyone to supply their cryptographic key to a duly authorized person on request
*2001 -
*2001 - Scott Fluhrer, Itsik Mantin and
*
*November 2001 -
*2002 -
*August 2002, PGP Corporation formed, purchasing assets from NAI.
*2003 -
*2004 - the hash
*2004 - The first commercial
*2005 - potential for attacks on SHA1 demonstrated
*2005 - agents from the U.S.
*
*2015 - year by which NIST suggests that 80-bit keys be phased out.
ee also
* [http://users.telenet.be/d.rijmenants/en/timeline.htm Timeline of Cipher Machines]